CN104301886A - Short message reading method and system, terminal and wearable device - Google Patents

Short message reading method and system, terminal and wearable device Download PDF

Info

Publication number
CN104301886A
CN104301886A CN201410564209.0A CN201410564209A CN104301886A CN 104301886 A CN104301886 A CN 104301886A CN 201410564209 A CN201410564209 A CN 201410564209A CN 104301886 A CN104301886 A CN 104301886A
Authority
CN
China
Prior art keywords
wearable device
terminal
note
key
authentication information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410564209.0A
Other languages
Chinese (zh)
Inventor
林晨
何飞
齐飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201410564209.0A priority Critical patent/CN104301886A/en
Publication of CN104301886A publication Critical patent/CN104301886A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/33Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a short message reading method and system, a terminal and a wearable device. The method applied to the terminal side comprises the steps that the terminal randomly produces a secret key to encrypt a short message after receiving the short message; the terminal sends the secret key and authentication information of the wearable device bound with the terminal to the wearable device to be authenticated; the terminal receives an authentication success message returned by the wearable device, wherein the message carries with the secret key; the terminal decrypts the short message according to the secret key and displays the short message for a user. According to the short message reading method and system, the terminal and the wearable device, the wearable device is utilized to conduct secondary authentication on the short message received by the terminal, and accordingly the risk that the short message is obtained by a non-terminal user is avoided.

Description

A kind of note read method and system, terminal, wearable device
Technical field
The present invention relates to the communications field, be specifically related to a kind of note read method and system, terminal, wearable device.
Background technology
Short message service with its simply and easily edit mode and the vast scope of application be subject to the welcome of users, also adopt by other third-party application, as the propelling movement note of number of site, notifying messages.Such as, the ticket booking notice of 12306 is also sent by note.While short message service is widely used, the privacy of note and fail safe also need to be protected.
For mobile phone short message verification code, mobile phone short message verification be enterprise to a voucher of consumer (user), carry out identity verification by the identifying code of SMS content.Be commonly used to each large online transaction system (as Web bank, quick payment etc.) and website registration at present, give the relevant checking of the safety such as password for change.
Current verification code verification mode is the phone number that user passes through to fill in oneself, click " acquisition identifying code ", website or third party application regularly generate short message verification code, and the phone number of user and identifying code content are sent to identifying code SMS platform by short-message verification interface, identifying code SMS platform is to through a series of judgement and by (account balance afterwards, whether content closes rule, whether phone number closes rule, operator belonging to phone number), identifying code is submitted to the server of respective operator, identifying code note is issued to the mobile phone of user by operator.
And after mobile phone receives identifying code note, be presented in face of cellie in mode expressly, lack the verification of further user identity.In whole system, phone number becomes unique verification of user identity.Although a lot of system be provided in input validation code after other authentication process itselfs (as input password, obligate information etc.), if other illegal use person understands these information, equally cannot avoid stolen risk.And a lot of system has the function being given for change password by identifying code, make the status of identifying code higher than other passwords, and when user mobile phone lose, stolen or SIM card number stolen time, lawless person can obtain relevant identifying code by SIM card and all kinds of accounts of user are verified, the operation such as solution is tied up, the interests of user are suffered damage.At present, the SIM card of losing only can be made identifying code is received by the mode of reporting the loss phone number in time, but cannot avoid this type of circumstances from happening before reporting the loss, the risk that mobile phone identifying code is obtained by non-end-user cannot be evaded, the fail safe of all kinds of account of user when identifying code is verified cannot be ensured.
Summary of the invention
The technical issues that need to address of the present invention are to provide a kind of note read method and system, terminal, wearable device, evade the risk that note is obtained by non-end-user, and the interests of protection user are without prejudice.
In order to solve the problems of the technologies described above, the invention provides a kind of note read method, being applied to end side, comprising:
After terminal receives note, random generation one key, to this SMS encryption;
Described terminal is by described key and be sent to described wearable device with the authentication information of the wearable device of described terminal binding and carry out certification;
Described terminal receives the message of the authentication success that described wearable device returns, and carries described key in described message;
Described terminal is note deciphering according to described double secret key, and is shown to user.
Further, before terminal receives note, described method also comprises:
After described terminal and described wearable device carry out near-field communication pairing, obtain the authentication information of described wearable device, bind with described wearable device; Described authentication information comprises: the device number of described wearable device.
Further, described note is the identifying code note that third-party platform sends; The term of validity of described key is greater than the term of validity of described identifying code note; Described method also comprises:
After described terminal receives note, judge whether described note is the identifying code note that described third-party platform sends, and if so, then produces a key at random, to this identifying code SMS encryption.
In order to solve the problems of the technologies described above, present invention also offers a kind of note read method, being applied to wearable device side, comprising:
Wearable device receives the key of terminal transmission and the authentication information of wearable device;
Described wearable device carries out certification according to described authentication information to described terminal, after certification is passed through, described key is back to terminal.
Further, before described wearable device receives the key of terminal transmission and the authentication information of wearable device, described method also comprises:
After described wearable device and described terminal carry out near-field communication pairing, send the authentication information of described wearable device to described terminal, with described terminal binding.
Further, described authentication information comprises: the device number of described wearable device; Described wearable device carries out certification according to described authentication information to described terminal, comprising:
Described wearable device judges whether the device number of described wearable device can match with local equipment number, and if so, then certification is passed through, otherwise certification is not passed through.
In order to solve the problems of the technologies described above, present invention also offers a kind of terminal, comprising:
First receiver module, for receiving note, and is sent to encrypting module;
Encrypting module, for after described receiver module receives described note, random generation one key, to this SMS encryption;
Authentication module, for by described key be sent to described wearable device with the authentication information of the wearable device of described terminal binding and carry out certification;
Second receiver module, for receiving the message of the authentication success that wearable device returns, carries key in described message;
Deciphering module, for note deciphering described in the double secret key that carries in the message of authentication success that returns according to described wearable device, and is shown to user.
Further, also comprise:
Binding module, before receiving note at described receiver module, carries out near-field communication pairing with described wearable device, obtains the authentication information of described wearable device, bind with described wearable device; Described authentication information comprises: the device number of described wearable device.
Further, described note is the identifying code note that third-party platform sends; The term of validity of described key is greater than the term of validity of described identifying code note;
Described encrypting module, also for after described receiver module receives described note, judges whether described note is the identifying code note that described third-party platform sends, and if so, then produces a key at random, to this identifying code SMS encryption.
In order to solve the problems of the technologies described above, present invention also offers a kind of wearable device, comprising:
Receiver module, the key sent for receiving terminal and the authentication information of wearable device;
Authentication module, for carrying out certification according to described authentication information to described terminal;
Sending module, for after certification is passed through, is back to terminal by described key.
Further, also comprise:
Binding module, for receive at described receiver module terminal send key and wearable device authentication information before, after carrying out near-field communication pairing with described terminal, send the authentication information of described wearable device to described terminal, with described terminal binding.
Further, described authentication information comprises: the device number of described wearable device;
Described authentication module, for carrying out certification according to described authentication information to described terminal, comprising:
Judge whether the device number of described wearable device can match with local equipment number, and if so, then certification is passed through, otherwise certification is not passed through.
In order to solve the problems of the technologies described above, present invention also offers a kind of note reading system, comprising: terminal as above and wearable device as above.
Compared with prior art; note read method provided by the invention and system, terminal, wearable device; the interactivity of wearable device and terminal is utilized to make can carry out transfer of data between wearable device and terminal; the note that wearable device can receive terminal carries out secondary checking; thus evade the risk that note obtained by non-end-user; such as, improve the fail safe of all kinds of account of user when identifying code is verified, the interests of protection user are without prejudice.
Accompanying drawing explanation
Fig. 1 is the flow chart of the note read method being applied to end side in embodiment;
Fig. 2 is the flow chart of the note read method being applied to wearable device side in embodiment;
Fig. 3 is the structure chart of terminal in embodiment;
Fig. 4 is the structure chart of wearable device in embodiment.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, hereinafter will be described in detail to embodiments of the invention by reference to the accompanying drawings.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combination in any mutually.
Embodiment:
As shown in Figure 1, present embodiments provide a kind of note read method, be applied to end side, comprise the following steps:
S101: after terminal receives note, random generation one key, to this SMS encryption;
Preferably, this note can be the identifying code note that third-party platform sends, and whenever receiving a note, then produces a key, and key is before capped, and loses efficacy.
Wherein, as the preferred mode of one, one encryption inbox can be set in terminal, described note is put into encryption inbox, with the encryption of this key pair encryption case, also to the deciphering of this encryption case when deciphering, make user can read the note of encrypting in inbox.
Wherein, before terminal receives note, described method also comprises:
After described terminal and described wearable device carry out near-field communication pairing, obtain the authentication information of described wearable device, described authentication information comprises: the device number of described wearable device, and/or the cryptographic algorithm preset is sent to described wearable device, now, described terminal and described wearable device are bound, binding refers to that described terminal only allows this wearable device to carry out certification to it, even if other wearable devices receive the authentication information that described terminal sends and also cannot authenticate and pass through, if user wants to select other wearable devices to carry out certification, then need the wearable device unbind first will bound.
Described near-field communication can be Bluetooth communication, NFC communication etc.Described terminal and wearable device are all provided with Bluetooth communication device, can Bluetooth pairing be passed through, then carry out transfer of data.Wearable device can be Intelligent bracelet, intelligent necklace, Intelligent key chain, intelligent watch etc.
After SMS encryption, user just cannot directly read this note, if do not have the wearable device bound, such as, is not user, or this lost terminal, use the people of terminal cannot directly read this note, ensure that the fail safe of note.
S102: by described key be sent to described wearable device with the authentication information of the wearable device of described terminal binding and carry out certification;
Wherein, before step S102, because be near-field communication, must have to enter terminal with the wearable device of terminal binding can in transmission range, such as, intelligent watch with user on hand, general terminal, as cellphone subscriber in use, fix in the scope that near-field communication allows with the transmission range one of intelligent watch, such as, pass through Bluetooth communication, first will carry out Bluetooth pairing, the wearable device then to binding sends authentication information and key.A terminal only can be bound with a wearable device, namely carries out certification by a wearable device, but wearable device can with one or more terminal binding, namely a wearable device can provide authentication service for multiple terminal.
Wherein, as the preferred mode of one, default cryptographic algorithm can be adopted to be encrypted to described key with the authentication information of the wearable device of described terminal binding, the ciphertext after encryption is sent to described wearable device and carry out certification.
After the ciphertext of wearable device after receiving described encryption, then need first according to the cryptographic algorithm deciphering preset, and then carry out certification.
Certainly, also can not encrypt and directly key and authentication information are sent to wearable device and carry out certification, the fail safe of encryption is higher.
S103: described terminal receives the message of the authentication success that described wearable device returns, carries described key in described message;
S104: described terminal is note deciphering according to described double secret key, and is shown to user.
Wherein, as the preferred mode of one, described note is the identifying code note that third-party platform sends; The term of validity of described key is greater than the term of validity of described identifying code note;
Described method also comprises:
After described terminal receives note, judge whether described note is the identifying code note that described third-party platform sends, and if so, then produces a key at random, to this identifying code SMS encryption.
Wherein, the RM of identifying code note is: number and short message content according to sending note identify, number and the common number of general third-party platform are had any different, such as, the number of China Merchants Bank is generally with 95555 endings, and short message content, general identifying code is 4-6 position continuous number and short message content comprises " checking ", if the number and the short message content that send note have above feature, then think identifying code note.
If do not have the wearable device of pairing and binding to enter the transmission range of terminal in the term of validity of key, then this identifying code lost efficacy and automatically deleted.
In the present embodiment, user only can read identifying code note in two kinds of situations below: a kind of is receive the key that wearable device returns, to the identifying code note deciphering of encryption, another situation is that key expiration lost efficacy, but, setting in the present embodiment is generally, the term of validity of identifying code note is shorter than the key term of validity, so when in the present embodiment during key expiration, identifying code note also can be expired, like this, identifying code note just fails, the transaction of user account cannot be used for as Web bank etc., so, user just needs again to obtain identifying code note to third-party platform, then repeat step S101 ~ S104.
In the present embodiment, described terminal and described wearable device adopt the mode of near-field communication to transmit data.
As shown in Figure 2, present embodiments provide a kind of note read method, be applied to wearable device side, comprise the following steps:
S201: wearable device receives the key of terminal transmission and the authentication information of wearable device;
Wherein, also comprised before step S201:
After described wearable device and described terminal carry out near-field communication pairing, send the authentication information of described wearable device to described terminal, and/or obtain the cryptographic algorithm preset to described terminal, with described terminal binding.
A terminal only can bind a wearable device, namely carries out certification by a wearable device, but a wearable device can by one or more terminal binding, and namely a wearable device can provide authentication service for multiple terminal.
Described near-field communication can be Bluetooth communication, NFC communication etc.Described terminal and wearable device are all provided with Bluetooth communication device, can Bluetooth pairing be passed through, then carry out transfer of data.Wearable device can be bracelet, necklace, intelligent watch etc.The authentication information of described wearable device comprises: the device number of described wearable device.
S202: described wearable device carries out certification according to described authentication information to described terminal, after certification is passed through, is back to terminal by described key.
Wherein, described wearable device carries out certification according to described authentication information to described terminal, comprising:
Described wearable device judges whether the device number of described wearable device can match with local equipment number, and if so, then certification is passed through, otherwise certification is not passed through.
Wherein, if the described key of terminal transmission received in step S201 and the authentication information of wearable device are encrypted cipher text;
Then in step s 201, after wearable device receives the key of terminal transmission and the authentication information of wearable device, described method also comprises:
According to described default cryptographic algorithm, described encrypted cipher text is decrypted, obtains the authentication information of described key and described wearable device.
In the present embodiment, described terminal and described wearable device adopt the mode of near-field communication to transmit data.
As shown in Figure 3, present embodiments provide a kind of terminal, comprising:
First receiver module, for receiving note and being sent to encrypting module;
Encrypting module, for after described receiver module receives described note, random generation one key, to this SMS encryption;
Authentication module, for by described key be sent to described wearable device with the authentication information of the wearable device of described terminal binding and carry out certification;
Second receiver module, for receiving the message of the authentication success that described wearable device returns, carries described key in described message;
Deciphering module, for note deciphering described in the described double secret key that carries in the message of authentication success that returns according to described wearable device, and is shown to user.
Wherein, as the preferred mode of one, the terminal of the present embodiment also comprises:
Binding module, before receiving note at described receiver module, carry out near-field communication pairing with described wearable device, obtain the authentication information of described wearable device, and/or the cryptographic algorithm preset is sent to described wearable device, bind with described wearable device; Described authentication information comprises: the device number of described wearable device.
Wherein, described authentication module, for by described key be sent to described wearable device with the authentication information of the wearable device of described terminal binding and carry out certification, comprising:
Adopt the cryptographic algorithm preset to be encrypted to described key with the authentication information of the wearable device of described terminal binding, the ciphertext after encryption is sent to described wearable device and carries out certification.
As the preferred mode of one, described note is the identifying code note that third-party platform sends; The term of validity of described key is greater than the term of validity of described identifying code note;
Described encrypting module, also for after described receiver module receives described note, judges whether described note is the identifying code note that described third-party platform sends, and if so, then produces a key at random, to this identifying code SMS encryption.
As shown in Figure 4, present embodiments provide a kind of wearable device, comprising:
Receiver module, the key sent for receiving terminal and the authentication information of wearable device;
Authentication module, for carrying out certification according to described authentication information to described terminal;
Sending module, for after certification is passed through, is back to terminal by described key.
Wherein, as the preferred mode of one, the terminal of the present embodiment also comprises:
Binding module, for receive at described receiver module terminal send key and wearable device authentication information before, after carrying out near-field communication pairing with described terminal, the authentication information of described wearable device is sent to described terminal, and/or obtain the cryptographic algorithm preset to described terminal, with described terminal binding.
As the preferred mode of one, the authentication information of the key that the terminal that described wearable device receives sends and wearable device is encrypted cipher text;
Described receiver module, also for receive at described wearable device terminal send key and wearable device authentication information after, according to described default cryptographic algorithm, described encrypted cipher text is decrypted, obtains the authentication information of described key and described wearable device.
Wherein, described authentication information comprises: the device number of described wearable device;
Described authentication module, for carrying out certification according to described authentication information to described terminal, comprising:
Judge whether the device number of described wearable device can match with local equipment number, and if so, then certification is passed through, otherwise certification is not passed through.
In addition, the present embodiment additionally provides a kind of note reading system, comprising: terminal as above and wearable device as above.
As can be seen from above-described embodiment; relative to prior art; the note read method provided in above-described embodiment and system, terminal, wearable device; the interactivity of wearable device and terminal is utilized to make can carry out transfer of data between wearable device and terminal; the note that wearable device can receive terminal carries out secondary checking, thus evades the risk that note is acquired, such as; improve the fail safe of all kinds of account of user when identifying code is verified, the interests of protection user are without prejudice.
Along with the rise of wearable device, increasing people also has the equipment of the such as body-worn such as Intelligent bracelet, intelligent watch besides a cellular phone.Be compared to mobile phone, the feature of carrying next to the skin of wearable device makes the stolen possibility of the loss of equipment much smaller than mobile phone.And the interactivity of wearable device and mobile phone makes can carry out transfer of data between wearable device and mobile phone.By wearable device, secondary checking is carried out to the identifying code that mobile phone receives, the risk that mobile phone identifying code is acquired can be evaded, improve the fail safe of all kinds of account of user when identifying code is verified.
The all or part of step that one of ordinary skill in the art will appreciate that in said method is carried out instruction related hardware by program and is completed, and described program can be stored in computer-readable recording medium, as read-only memory, disk or CD etc.Alternatively, all or part of step of above-described embodiment also can use one or more integrated circuit to realize.Correspondingly, each module/unit in above-described embodiment can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
The foregoing is only the preferred embodiments of the present invention, be not intended to limit protection scope of the present invention.According to summary of the invention of the present invention; also can there be other various embodiments; when not deviating from the present invention's spirit and essence thereof; those of ordinary skill in the art are when making various corresponding change and distortion according to the present invention; within the spirit and principles in the present invention all; any amendment of doing, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (13)

1. a note read method, is applied to end side, comprising:
After terminal receives note, random generation one key, to this SMS encryption;
Described terminal is by described key and be sent to described wearable device with the authentication information of the wearable device of described terminal binding and carry out certification;
Described terminal receives the message of the authentication success that described wearable device returns, and carries described key in described message;
Described terminal is note deciphering according to described double secret key, and is shown to user.
2. the method for claim 1, is characterized in that:
Before terminal receives note, described method also comprises:
After described terminal and described wearable device carry out near-field communication pairing, obtain the authentication information of described wearable device, bind with described wearable device; Described authentication information comprises: the device number of described wearable device.
3. the method for claim 1, is characterized in that:
Described note is the identifying code note that third-party platform sends; The term of validity of described key is greater than the term of validity of described identifying code note; Described method also comprises:
After described terminal receives note, judge whether described note is the identifying code note that described third-party platform sends, and if so, then produces a key at random, to this identifying code SMS encryption.
4. a note read method, is applied to wearable device side, comprises:
Wearable device receives the key of terminal transmission and the authentication information of wearable device;
Described wearable device carries out certification according to described authentication information to described terminal, after certification is passed through, described key is back to terminal.
5. method as claimed in claim 4, is characterized in that:
Before described wearable device receives the key of terminal transmission and the authentication information of wearable device, described method also comprises:
After described wearable device and described terminal carry out near-field communication pairing, send the authentication information of described wearable device to described terminal, with described terminal binding.
6. method as claimed in claim 4, is characterized in that:
Described authentication information comprises: the device number of described wearable device; Described wearable device carries out certification according to described authentication information to described terminal, comprising:
Described wearable device judges whether the device number of described wearable device can match with local equipment number, and if so, then certification is passed through, otherwise certification is not passed through.
7. a terminal, comprising:
First receiver module, for receiving note and being sent to encrypting module;
Encrypting module, for after described receiver module receives described note, random generation one key, to this SMS encryption;
Authentication module, for by described key be sent to described wearable device with the authentication information of the wearable device of described terminal binding and carry out certification;
Second receiver module, for receiving the message of the authentication success that wearable device returns, carries described key in described message;
Deciphering module, for note deciphering described in the described double secret key that carries in the message of authentication success that returns according to described wearable device, and is shown to user.
8. terminal as claimed in claim 7, is characterized in that: also comprise:
Binding module, before receiving note at described receiver module, carries out near-field communication pairing with described wearable device, obtains the authentication information of described wearable device, bind with described wearable device; Described authentication information comprises: the device number of described wearable device.
9. terminal as claimed in claim 7, is characterized in that:
Described note is the identifying code note that third-party platform sends; The term of validity of described key is greater than the term of validity of described identifying code note;
Described encrypting module, also for after described receiver module receives described note, judges whether described note is the identifying code note that described third-party platform sends, and if so, then produces a key at random, to this identifying code SMS encryption.
10. a wearable device, comprising:
Receiver module, the key sent for receiving terminal and the authentication information of wearable device;
Authentication module, for carrying out certification according to described authentication information to described terminal;
Sending module, for after certification is passed through, is back to terminal by described key.
11. wearable devices as claimed in claim 10, is characterized in that: also comprise:
Binding module, for receive at described receiver module terminal send key and wearable device authentication information before, after carrying out near-field communication pairing with described terminal, send the authentication information of described wearable device to described terminal, with described terminal binding.
12. wearable devices as claimed in claim 10, is characterized in that:
Described authentication information comprises: the device number of described wearable device;
Described authentication module, for carrying out certification according to described authentication information to described terminal, comprising:
Judge whether the device number of described wearable device can match with local equipment number, and if so, then certification is passed through, otherwise certification is not passed through.
13. 1 kinds of note reading systems, comprising: the terminal as described in claim 7 ~ 9 and the wearable device as described in claim 10 ~ 12.
CN201410564209.0A 2014-10-21 2014-10-21 Short message reading method and system, terminal and wearable device Pending CN104301886A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410564209.0A CN104301886A (en) 2014-10-21 2014-10-21 Short message reading method and system, terminal and wearable device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410564209.0A CN104301886A (en) 2014-10-21 2014-10-21 Short message reading method and system, terminal and wearable device

Publications (1)

Publication Number Publication Date
CN104301886A true CN104301886A (en) 2015-01-21

Family

ID=52321408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410564209.0A Pending CN104301886A (en) 2014-10-21 2014-10-21 Short message reading method and system, terminal and wearable device

Country Status (1)

Country Link
CN (1) CN104301886A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660494A (en) * 2015-02-11 2015-05-27 任宝刚 Communication system
CN105022948A (en) * 2015-07-28 2015-11-04 广东欧珀移动通信有限公司 Control method of intelligent watch, intelligent watch and terminal
WO2016150028A1 (en) * 2015-03-24 2016-09-29 百度在线网络技术(北京)有限公司 Method, device, and system used for mobile authentication
WO2018059303A1 (en) * 2016-09-30 2018-04-05 中兴通讯股份有限公司 Method and device for encrypting and decrypting information in short message
CN109558261A (en) * 2018-11-20 2019-04-02 广东小天才科技有限公司 A kind of the abnormal log acquisition methods and system of wearable device
CN110365484A (en) * 2015-03-17 2019-10-22 阿里巴巴集团控股有限公司 A kind of data processing method of equipment certification, apparatus and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701605A (en) * 2013-12-24 2014-04-02 北京握奇智能科技有限公司 Data authentication method and device
CN103714299A (en) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 Method and system for encryption and decryption of file of mobile terminal
CN103824012A (en) * 2014-03-05 2014-05-28 许建华 Radio frequency near field user identity recognition of intelligent mobile terminal
CN103914772A (en) * 2014-03-31 2014-07-09 深圳小木科技有限公司 Wireless authentication method, system and device for mobile payment
US20140258133A1 (en) * 2009-10-27 2014-09-11 At&T Mobility Ii Llc Secure Mobile-Based Financial Transactions
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140258133A1 (en) * 2009-10-27 2014-09-11 At&T Mobility Ii Llc Secure Mobile-Based Financial Transactions
CN103701605A (en) * 2013-12-24 2014-04-02 北京握奇智能科技有限公司 Data authentication method and device
CN103714299A (en) * 2013-12-25 2014-04-09 北京握奇数据系统有限公司 Method and system for encryption and decryption of file of mobile terminal
CN103824012A (en) * 2014-03-05 2014-05-28 许建华 Radio frequency near field user identity recognition of intelligent mobile terminal
CN103914772A (en) * 2014-03-31 2014-07-09 深圳小木科技有限公司 Wireless authentication method, system and device for mobile payment
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660494A (en) * 2015-02-11 2015-05-27 任宝刚 Communication system
CN104660494B (en) * 2015-02-11 2018-11-27 深圳市奔跑科技有限公司 A kind of communication system
CN110365484A (en) * 2015-03-17 2019-10-22 阿里巴巴集团控股有限公司 A kind of data processing method of equipment certification, apparatus and system
CN110365484B (en) * 2015-03-17 2023-01-20 创新先进技术有限公司 Data processing method, device and system for equipment authentication
WO2016150028A1 (en) * 2015-03-24 2016-09-29 百度在线网络技术(北京)有限公司 Method, device, and system used for mobile authentication
CN105022948A (en) * 2015-07-28 2015-11-04 广东欧珀移动通信有限公司 Control method of intelligent watch, intelligent watch and terminal
WO2018059303A1 (en) * 2016-09-30 2018-04-05 中兴通讯股份有限公司 Method and device for encrypting and decrypting information in short message
CN107889102A (en) * 2016-09-30 2018-04-06 中兴通讯股份有限公司 The method and apparatus of information encryption and decryption in a kind of short message
CN107889102B (en) * 2016-09-30 2021-04-02 中兴通讯股份有限公司 Method and device for encrypting and decrypting information in short message
CN109558261A (en) * 2018-11-20 2019-04-02 广东小天才科技有限公司 A kind of the abnormal log acquisition methods and system of wearable device
CN109558261B (en) * 2018-11-20 2022-05-03 广东小天才科技有限公司 Method and system for acquiring abnormal log of wearable device

Similar Documents

Publication Publication Date Title
US10333721B2 (en) Secure information transmitting system and method for personal identity authentication
CN103812871B (en) Development method and system based on mobile terminal application program security application
CN101164086B (en) Methods, system and mobile device capable of enabling credit card personalization using a wireless network
CN101583124B (en) Authentication method and system of subscriber identity module and terminal
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CN101641976B (en) An authentication method
CN102945526B (en) A kind of device and method for improving mobile equipment on-line safety of payment
CN104301886A (en) Short message reading method and system, terminal and wearable device
US20080022089A1 (en) Security system for handheld wireless devices using-time variable encryption keys
CN101677269B (en) Method and system for transmitting keys
JP2013514556A (en) Method and system for securely processing transactions
CN101262349A (en) SMS-based identity authentication method and device
CN102056077B (en) Method and device for applying smart card by key
CN103136668A (en) Terminal payment method, terminal and payment platform
CN1977559B (en) Method and system for protecting information exchanged during communication between users
CN108228211B (en) Smart card, and method and system for safely updating data of smart card
CN102790767A (en) Information safety control method, information safety display equipment and electronic trading system
CN105407467A (en) Short message encryption methods, devices and system
WO2013054073A1 (en) System for secure id authentication
CN101861595A (en) A method for secure transactions
CN106027560A (en) Intelligent terminal oriented security transmission method and system
CN102460491A (en) A method for secure transactions
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN103945348A (en) Asymmetrical secret key short message encryption method and system
CN105574720A (en) Secure information processing method and secure information processing apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150121

RJ01 Rejection of invention patent application after publication