CN111311790A - Rapid matching method and system for passwords - Google Patents
Rapid matching method and system for passwords Download PDFInfo
- Publication number
- CN111311790A CN111311790A CN202010054932.XA CN202010054932A CN111311790A CN 111311790 A CN111311790 A CN 111311790A CN 202010054932 A CN202010054932 A CN 202010054932A CN 111311790 A CN111311790 A CN 111311790A
- Authority
- CN
- China
- Prior art keywords
- matching
- password
- character
- preset
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The application discloses a rapid password matching method, which comprises the following steps: the device receives a first password character; the equipment compares the first password character with a preset character; and when the matching relation between the first password character and the preset character meets a first preset rule, unlocking the equipment. Compared with the prior art, the method has the following beneficial effects: the password matching method has the advantages that the password is input and matched in the password inputting process, a user directly outputs a matching result when inputting is completed or after clicking a submit key, and the problems that in the prior art, the matching speed is low and the user experience is not good are solved.
Description
Technical Field
The application relates to the field of intelligent locks, in particular to a quick password matching method.
Background
Smart locks are gaining increasing consumer popularity with their more convenient, and more secure advanced capabilities. The unlocking mode of the intelligent lock has various modes, and password unlocking is the most basic unlocking mode.
Traditional intelligence lock, password input design is comparatively simple, as long as need input all assorted passwords alright unblock promptly. However, in the prior art, matching is started only after the user inputs the password and clicks the submit key. Therefore, the problem of long matching time exists inevitably, and the experience of the user is poor. Furthermore, if the operation performance of a master control of the intelligent lock is poor and simultaneously supports a password (such as an apartment door lock) capable of creating 1000+, there is a serious hysteresis in matching the input result.
Disclosure of Invention
The main objective of the present application is to provide a method for quickly matching a password, which includes:
the device receives a first password character;
the equipment compares the first password character with a preset character;
and when the matching relation between the first password character and the preset character meets a first preset rule, unlocking the equipment.
Optionally, the first password character is a 1-bit first password character, the device continuously compares the 1-bit first password character for multiple times, and when the comparison result of multiple times meets a preset condition, the device is unlocked.
Optionally, the preset character is multiple sets of first password information pre-stored in the device, and each set of the first password information includes: the password comprises a first password, a first password length and a first password state, wherein the first password comprises all the 1-bit first password characters.
Optionally, the first cryptographic state comprises: active or activated, inactive or deactivated, and null states.
Optionally, the comparing, by the device, the first password character with a preset character includes:
the device compares the first password character with a preset character according to a preset matching format, wherein the matching format comprises: the first password, the matching state, the matching digit and the first password length;
when the equipment receives 1-bit first password character, comparing the 1-bit first password character with first passwords in all the first password information, wherein the first passwords are valid or corresponding to activation;
when the matching is successful, the matching digit changes according to a second preset rule, otherwise, the matching digit is reset;
when the relation between the matching digit and the first password length accords with a third preset rule, changing the matching state to a first matching success state;
and when the matching state is a first matching success state, the equipment is unlocked.
Optionally, when the matching relationship between the first password character and the preset character satisfies a first preset rule, the unlocking the device includes:
the matching state is a first matching success state;
the device receives an unlocking request;
the device is unlocked.
Optionally, when the matching relationship between the first password character and the preset character satisfies a first preset rule, the unlocking the device includes:
the matching state is a first matching success state;
the device continues to receive a second password character, and the matching state is changed into a second matching success state;
the device receives the unlocking request;
the device is unlocked.
Optionally, when the device receives the unlocking request, the data of which the matching state is the first matching success state and the second matching success state is called.
According to another aspect of the present application, there is also provided a system for fast matching of passwords, comprising:
a receiving module for receiving a first password character by a device;
the comparison module is used for comparing the first password character with a preset character by the equipment;
and the unlocking module is used for unlocking the equipment when the matching relation between the first password character and the preset character meets a first preset rule.
The application also discloses a computer device, which comprises a memory, a processor and a computer program stored in the memory and capable of being executed by the processor, wherein the processor realizes the method of any one of the above items when executing the computer program.
Compared with the prior art, the method has the following beneficial effects:
the password matching method has the advantages that the password is input and matched in the password inputting process, a user directly outputs a matching result when inputting is completed or after clicking a submit key, and the problems that in the prior art, the matching speed is low and the user experience is not good are solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a flow diagram of a method for rapid matching of passwords according to one embodiment of the present application;
FIG. 2 is a diagram of a cryptographic storage data format according to one embodiment of the present application;
FIG. 3 is a table 2. a diagram of a cryptographic storage data format, according to one embodiment of the present application;
FIG. 4 is a stored list of 100 sets of passwords according to one embodiment of the present application;
FIG. 5 is a list of matching data loaded in memory according to one embodiment of the present application;
FIG. 6 is a schematic diagram of a computer device according to one embodiment of the present application;
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1, an embodiment of the present application provides a method for fast matching a password, including:
s2: the device receives a first password character;
s4: the equipment compares the first password character with a preset character;
s6: and when the matching relation between the first password character and the preset character meets a first preset rule, unlocking the equipment.
The present application uses a door lock as an example, but not limited thereto, and any device that needs to input a password to open is within the scope of the present application. In addition, the password in the present application is exemplified by numbers, and is not limited thereto, and any character or byte or character string that can be used for inputting the password is within the scope of the present application.
In order to save the comparison time, the user can start the correct comparison operation when inputting the password. For example, the password of the door lock has six digits, which is 123456. In this embodiment, the comparison is performed every time two passwords are input. When a user inputs 1 and 2 on the door lock, the door lock starts comparison work, the 1 and 2 are compared with the first bit and the second bit of the prestored password, and when the comparison is successful, the first bit is marked to be successfully matched, and the second bit is marked to be successfully matched. When the comparison is unsuccessful, the door lock does nothing or is marked as unsuccessful. The user inputs 1, 2, 3, 4, 5, 6. When all the input passwords are successfully matched with the prestored passwords, the door lock is opened, or when one or more passwords are successfully matched, the door lock is opened. The coded lock does not need to wait until all six passwords are input and then starts the comparison work, but the comparison work is completed by dividing the comparison work for several times. Therefore, the information amount of the coded lock processed at one time is reduced, namely, the time of single comparison is shortened, and the time of waiting for opening the door by a user after all the codes are input is shortened.
However, this is not a limitation. The skilled person in the art can set the number of password characters compared each time according to actual conditions, two or three digits can be compared each time, and even an indefinite number of password characters can be compared each time. Therefore, the first password character described in the present embodiment does not refer to a single character, but one of the components of the entire password. The number of the bits of the whole password is reduced, and the aim of grouping and comparing the whole password can be achieved. All falling within the scope of the claims of the present application.
In an embodiment of the application, the first password character is a 1-bit first password character, the device continuously compares the 1-bit first password character for multiple times, and when the comparison result of the multiple times meets a preset condition, the device is unlocked.
In this embodiment, there is only a 1-bit password in the composition. For example, when a user inputs 1 on the door lock, the door lock starts comparison work, 1 is compared with the first digit of the pre-stored password, and when the comparison is successful, the first digit is marked to be successfully matched. When the comparison is unsuccessful, the door lock does nothing or is marked as unsuccessful. The user inputs 1, 2, 3, 4, 5, 6. When all the input passwords are successfully matched with the prestored passwords, the door lock is opened, or when one or more passwords are successfully matched, the door lock is opened.
As shown in fig. 2, in an embodiment of the present application, the preset characters are multiple sets of first password information pre-stored in the device, where each set of the first password information includes: the password comprises a first password, a first password length and a first password state, wherein the first password comprises all the 1-bit first password characters. Where StorePwd represents the storage format of the password.
The first password bit stores the password itself (e.g. 123456), the first password length stores the number of bits occupied by the password (e.g. 6 bits), and the first password status is various statuses (e.g. valid or activated, invalid or deactivated and null) of the password itself stored in the first password.
When the password lock receives the password for inputting, the password input by the user is compared with the password stored in the first password, and when the matching is successful, the password lock is unlocked.
In an embodiment of the present application, the comparing, by the device, the first password character with a preset character includes:
the device compares the first password character with a preset character according to a preset matching format, wherein the matching format comprises: the first password, the matching state, the matching bit number, and the first password length (see fig. 3). The matching format of the password is represented by MatchPwd.
When the equipment receives 1-bit first password character, comparing the 1-bit first password character with first passwords in all the first password information, wherein the first passwords are valid or corresponding to activation;
when the matching is successful, the matching digit changes according to a second preset rule, otherwise, the matching digit is reset;
when the relation between the matching digit and the first password length accords with a third preset rule, changing the matching state to a first matching success state;
and when the matching state is a first matching success state, the equipment is unlocked.
For example, the current combination lock supports the storage of 100 sets of cryptographic data (as shown in FIG. 4), and the device currently stores cryptographic information as shown in the table below, where StorePwd0, 2, 97, 99 are valid and none are otherwise valid.
The cipher lock loads the stored ciphers into the memory and converts the ciphers into MatchPwd format, if the cipher state is valid, the matching state is set to 0, otherwise, the matching state is set to an invalid/forbidden state 0xFF, and meanwhile, the number of the matching bits is cleared to 0. And loading the matching data list in the memory according to the algorithm rule, as shown in fig. 5.
When a user types a password, the input number is compared with the password with a non-invalid matching state in the MatchPwd 1-n list every time, the number of digits of the matched password corresponds to a matching digit field (if the current matching digit is 0, the number of digits of the matched password is 1 st digit of the compared password), if the matching is successful, the number of the matched digit is increased by 1, otherwise, the number of digits is clear by 0. However, this is not a limitation, i.e. the time is not always counted from 0, and 1 is added every time the pairing is successful. The rules may be varied by those skilled in the art depending on the actual situation. For example, 2 or another number at a time, or an indefinite number at a time, and may even start with a number (e.g., 10) and decrease by 1 every time it succeeds. All falling within the scope of the claims of the present application.
And (3) adding 1 to the matching state value when the matching digit is equal to the password length as the user sequentially keys in the password, and clearing 0 the matching digit. The combination lock is then unlocked. However, it is not limited thereto, and those skilled in the art can change the rule according to actual requirements. For example, when one or more of the user-entered passwords are the same as the preset password, the unlocking is performed. In addition, other numbers may be added to or otherwise changed in the matching state value. That is, the matching state value can distinguish the state when the unlocking condition is reached and the state when the unlocking condition is not reached. Likewise, the matching bit number may or may not be clear of 0. When the value is not clear from 0, the counting can be continued or the recording mode can be changed to other recording modes, as long as the value can trigger to change the matching state value when the next number (for example, 12) meeting the unlocking condition is reached. All of which are intended to be encompassed by the present application.
In an embodiment of the present application, when a matching relationship between the first password character and the preset character satisfies a first preset rule, the unlocking the device includes:
the matching state is a first matching success state;
the device receives an unlocking request;
the device is unlocked.
For example, after the user has input all the passwords, the password lock executes the unlocking action only when the user needs to click the submit button to request triggering of the unlocking action.
In an embodiment of the present application, when a matching relationship between the first password character and the preset character satisfies a first preset rule, the unlocking the device includes:
the matching state is a first matching success state;
the device continues to receive a second password character, and the matching state is changed into a second matching success state;
the device receives the unlocking request;
the device is unlocked.
For example, when the user has finished entering 123456, the user does not stop, but continues to enter other numbers (e.g., 78) before clicking on the submit button. The code actually received by the combination lock at this time comprises two parts: the actual password (123456, i.e., the first password) + the interference password (78, the second password). At which point the match status changes from 1 to 2 (i.e., adds 1 to the status value that has been successfully matched). At this time, the user clicks the submit button, and the coded lock retrieves the data related to the number corresponding to the matching state values 1 and 2 (greater than 0). Therefore, the user can be ensured not to know what the real password of the user is even if someone peeps when inputting the password.
According to an embodiment of the present application, there is also provided a system for quickly matching a password, including:
a receiving module for receiving a first password character by a device;
the comparison module is used for comparing the first password character with a preset character by the equipment;
and the unlocking module is used for unlocking the equipment when the matching relation between the first password character and the preset character meets a first preset rule.
Compared with the prior art, the method has the following beneficial effects:
the password matching method has the advantages that the password is input and matched in the password inputting process, a user directly outputs a matching result when inputting is completed or after clicking a submit key, and the problems that in the prior art, the matching speed is low and the user experience is not good are solved.
Referring to fig. 6, the present application further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of the above methods when executing the computer program.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. A quick matching method for passwords is characterized by comprising the following steps:
the device receives a first password character;
the equipment compares the first password character with a preset character;
and when the matching relation between the first password character and the preset character meets a first preset rule, unlocking the equipment.
2. The method for matching passwords rapidly as claimed in claim 1, wherein the first password character is a 1-bit first password character, the device continuously compares the 1-bit first password character for a plurality of times, and when the comparison result of the plurality of times meets a preset condition, the device is unlocked.
3. The method for matching passwords quickly as claimed in claim 2, wherein the preset characters are a plurality of groups of first password information pre-stored by the device, and each group of the first password information includes: the password comprises a first password, a first password length and a first password state, wherein the first password comprises all the 1-bit first password characters.
4. The method for fast matching of passwords according to claim 3, wherein the first password state comprises: active or activated, inactive or deactivated, and null states.
5. The method of claim 4, wherein the comparing the first password character with a predetermined character by the device comprises:
the device compares the first password character with a preset character according to a preset matching format, wherein the matching format comprises: the first password, the matching state, the matching digit and the first password length;
when the equipment receives 1-bit first password character, comparing the 1-bit first password character with first passwords in all the first password information, wherein the first passwords are valid or corresponding to activation;
when the matching is successful, the matching digit changes according to a second preset rule, otherwise, the matching digit is reset;
when the relation between the matching digit and the first password length accords with a third preset rule, changing the matching state to a first matching success state;
and when the matching state is a first matching success state, the equipment is unlocked.
6. The method for rapidly matching passwords according to claim 5, wherein when the matching relationship between the first password character and the preset character meets a first preset rule, the unlocking of the device comprises:
the matching state is a first matching success state;
the device receives an unlocking request;
the device is unlocked.
7. The method for rapidly matching passwords according to claim 6, wherein when the matching relationship between the first password character and the preset character meets a first preset rule, the unlocking of the device comprises:
the matching state is a first matching success state;
the device continues to receive a second password character, and the matching state is changed into a second matching success state;
the device receives the unlocking request;
the device is unlocked.
8. The method for matching passwords rapidly as claimed in claim 7, wherein when the device receives the unlock request, the data of which the matching states are a first matching success state and a second matching success state is invoked.
9. A system for rapid matching of passwords, comprising:
a receiving module for receiving a first password character by a device;
the comparison module is used for comparing the first password character with a preset character by the equipment;
and the unlocking module is used for unlocking the equipment when the matching relation between the first password character and the preset character meets a first preset rule.
10. A computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of claims 1-8 when executing the computer program.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010054932.XA CN111311790A (en) | 2020-01-17 | 2020-01-17 | Rapid matching method and system for passwords |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010054932.XA CN111311790A (en) | 2020-01-17 | 2020-01-17 | Rapid matching method and system for passwords |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN111311790A true CN111311790A (en) | 2020-06-19 |
Family
ID=71150947
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010054932.XA Pending CN111311790A (en) | 2020-01-17 | 2020-01-17 | Rapid matching method and system for passwords |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111311790A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113535987A (en) * | 2021-09-13 | 2021-10-22 | 杭州涂鸦信息技术有限公司 | Linkage rule matching method and related device |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103051454A (en) * | 2012-12-19 | 2013-04-17 | 天地融科技股份有限公司 | Electronic equipment and password authentication method thereof |
| CN104182678A (en) * | 2014-04-24 | 2014-12-03 | 东莞盛世科技电子实业有限公司 | Password verification device and password verification method |
| CN106096385A (en) * | 2016-06-24 | 2016-11-09 | Tcl移动通信科技(宁波)有限公司 | A kind of unlocking processing method based on mobile terminal and system |
| CN109257747A (en) * | 2018-11-19 | 2019-01-22 | Tcl移动通信科技(宁波)有限公司 | Mobile terminal WIFI connection processing method, mobile terminal and storage medium |
-
2020
- 2020-01-17 CN CN202010054932.XA patent/CN111311790A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103051454A (en) * | 2012-12-19 | 2013-04-17 | 天地融科技股份有限公司 | Electronic equipment and password authentication method thereof |
| CN104182678A (en) * | 2014-04-24 | 2014-12-03 | 东莞盛世科技电子实业有限公司 | Password verification device and password verification method |
| CN106096385A (en) * | 2016-06-24 | 2016-11-09 | Tcl移动通信科技(宁波)有限公司 | A kind of unlocking processing method based on mobile terminal and system |
| CN109257747A (en) * | 2018-11-19 | 2019-01-22 | Tcl移动通信科技(宁波)有限公司 | Mobile terminal WIFI connection processing method, mobile terminal and storage medium |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113535987A (en) * | 2021-09-13 | 2021-10-22 | 杭州涂鸦信息技术有限公司 | Linkage rule matching method and related device |
| CN113535987B (en) * | 2021-09-13 | 2022-01-21 | 杭州涂鸦信息技术有限公司 | Linkage rule matching method and related device |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12328382B2 (en) | Method for controlling the flow execution of a generated script of a blockchain transaction | |
| Zuckerman | Simulating BPP using a general weak random source | |
| Volpano et al. | Verifying secrets and relative secrecy | |
| Millen | Finite-state noiseless covert channels | |
| US10715320B2 (en) | Password generation with key and derivation parameter | |
| US20130298223A1 (en) | Methods and computing devices for password verification | |
| CN107181600B (en) | Password login authentication method and system, user equipment and authentication server | |
| Ciaramella et al. | Neural network techniques for proactive password checking | |
| EP0543304B1 (en) | Method and system for access validation in a computer system | |
| CN111311790A (en) | Rapid matching method and system for passwords | |
| CN116527258B (en) | Unlocking method, device, equipment and storage medium of coded lock | |
| US20140047555A1 (en) | Method and system for securing a software program | |
| KR20190122430A (en) | Method of de-mixing for Bitcoin mixing services | |
| CN109858229A (en) | Terminal and its dynamic unlocking method, memory | |
| Tao et al. | From online to non-iid batch learning | |
| CN116132977A (en) | Mouse safety encryption authentication method | |
| CN107577927A (en) | A kind of unlocking screen method, the device and intelligent terminal with store function | |
| CN113742672A (en) | Information security protection method and device | |
| CN117556411B (en) | Password generation method, password generation device, and readable storage medium | |
| Mowbray | Causal security | |
| CN110766840A (en) | Access control password setting method and device | |
| CN113158165B (en) | Method and device for rapidly locking application of Android terminal | |
| JP2007310819A (en) | Password generation method with improved resistance to password analysis and authentication device using this password | |
| CN114285552B (en) | N-th voting method and device based on block chain | |
| CN109639882A (en) | Screen locking control method, screen locking control device and mobile terminal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200619 |