CN104618330B - Method for processing business, device and terminal - Google Patents

Method for processing business, device and terminal Download PDF

Info

Publication number
CN104618330B
CN104618330B CN201410835673.9A CN201410835673A CN104618330B CN 104618330 B CN104618330 B CN 104618330B CN 201410835673 A CN201410835673 A CN 201410835673A CN 104618330 B CN104618330 B CN 104618330B
Authority
CN
China
Prior art keywords
application program
terminal
business
access
business datum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410835673.9A
Other languages
Chinese (zh)
Other versions
CN104618330A (en
Inventor
池玉博
林俊琦
胡方禹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Hongmi Information Technology Co., Ltd
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410835673.9A priority Critical patent/CN104618330B/en
Publication of CN104618330A publication Critical patent/CN104618330A/en
Application granted granted Critical
Publication of CN104618330B publication Critical patent/CN104618330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The disclosure is directed to a kind of method for processing business, device and terminals, belong to field of communication technology.The described method includes: receiving the access request that first terminal is sent;According to the information of application program, judge whether application program has access authority;If application program has access authority, corresponding first business datum of access request is obtained;First business datum is encrypted, encrypted first business datum is back to first terminal.The present invention encrypts the first business datum to be processed that first terminal is sent, and encrypted first business datum is back to first terminal, first terminal is according to encrypted first business datum and server finishing service.Due to being avoided that the application of unauthorized accesses, so that the safety of business processing is higher.In addition, since the teleaction service between server can be handled.Therefore, the flexibility of business processing is higher, and effect is preferable.

Description

Method for processing business, device and terminal
Technical field
This disclosure relates to field of communication technology, in particular to a kind of method for processing business, device and terminal.
Background technique
Wearable device such as Intelligent bracelet etc. is more and more welcomed by the people.Since wearable device is convenient for carrying, because This, gradually incorporates people's lives as a kind of commonly used equipment.For example, being implanted into chip and coil in Intelligent bracelet, pass through nothing Line electricity radio-frequency technique realizes the transmission of the data between equipment, to handle corresponding near field payment transaction.Such as brush bus card.
In implementing the present disclosure, inventor find the relevant technologies the prior art has at least the following problems:
Wearable device can be communicated by data connection with other mobile terminals in the related technology, still, due to Safety is lower, so expansible function is also less, so that the flexibility of business processing is lower, cannot play wearable device Maximum availability.
Summary of the invention
To overcome the problems in correlation technique, present disclose provides a kind of method for processing business, device and terminals.
According to the first aspect of the embodiments of the present disclosure, a kind of method for processing business is provided, is applied in wearable device, This method comprises:
The access request for the near field business that first terminal is sent is received, includes the application for initiating access in the access request The information of program, the information of the application program include at least one of the following: application identities and Apply Names, the near field business Including near field payment transaction and access control system business;
According to the information of the application program, judge whether the application program has access authority;
If the application program has access authority, corresponding first business datum of the access request is obtained from local;
First business datum is encrypted, encrypted first business datum is back to the first terminal.
With reference to first aspect, in the first possible implementation of the first aspect, described according to the application program Information, judge whether the application program has access authority, comprising:
It is searched, is judged according to lookup result described using journey in the application list according to the information of the application program Whether sequence has access authority.
The possible implementation of with reference to first aspect the first, in second of possible implementation of first aspect In, before the information according to the application program is searched in the application list, further includes:
The application list sent in advance by the first terminal is received, is visited in described the application list comprising having Ask the information of the application program of permission;
Alternatively, downloading from a server the Application Column that first terminal is uploaded by user account used in local terminal Table.
With reference to first aspect, in a third possible implementation of the first aspect, described to the first business number According to before being encrypted, further includes:
Receive the corresponding key of the application program that the first terminal is sent, key corresponding to the application program It is stored.
With reference to first aspect, in a fourth possible implementation of the first aspect, the reception first terminal is sent Near field business access request before, the method also includes:
Establish near-field communication NFC connection;
The access request for receiving first terminal and sending, comprising:
By the NFC connection of foundation, the access request that first terminal is sent is received.
Any possible implementation into the 4th kind of possible implementation of first aspect with reference to first aspect, In 5th kind of possible implementation of first aspect, after the access request for receiving first terminal transmission, further includes:
The second business datum obtained after being modified by the first terminal according to first business datum is received, it is right Second business datum is saved.
With reference to first aspect, in the sixth possible implementation of the first aspect, described to obtain the visit from local Ask request corresponding first business datum, comprising:
When the access request is near field payment request, the monetary value being locally stored is obtained;
Alternatively, obtaining the identity information being locally stored when the access request is identity information certification request.
According to the second aspect of an embodiment of the present disclosure, a kind of method for processing business is provided, is applied in terminal, this method Include:
The access request of near field business is sent to wearable device, includes the application journey for initiating access in the access request The information of the information of sequence, the application program includes at least one of the following: application identities and Apply Names, wearable is set by described The standby information according to the application program, judges whether the application program has access authority, and the near field business includes close Field payment transaction and access control system business;
Encrypted first business datum that the wearable device returns is received, according to encrypted first business Data and server finishing service.
In conjunction with second aspect, in the first possible implementation of the second aspect, the method also includes:
It include with access authority in described the application list to the wearable device sending application program listing The information of application program;
Alternatively, uploading the application list to server by user account used in local.
In conjunction with second aspect, in a second possible implementation of the second aspect, the method also includes:
The corresponding key of the application program is sent to the wearable device, by the wearable device to the key It is saved.
It is in the third possible implementation of the second aspect, described to be sent to wearable device in conjunction with second aspect Before the access request of near field business, further includes:
Obtain the password of user's input;
The password is verified, when verification result is to be verified, executes to wearable device and sends near field industry The step of access request of business.
According to the third aspect of an embodiment of the present disclosure, a kind of business processing device is provided, which includes:
First receiving module, the access request of the near field business for receiving first terminal transmission, in the access request Information including initiating the application program of access, the information of the application program include at least one of the following: application identities and answer With title, the near field business includes near field payment transaction and access control system business;
Judgment module judges whether the application program has access authority for the information according to the application program;
Module is obtained, is used for when the application program has access authority, it is corresponding from the local acquisition access request The first business datum;
Encrypted first business datum is back to by return module for encrypting to first business datum The first terminal.
In conjunction with the third aspect, in the first possible implementation of the third aspect, the judgment module, comprising:
Searching unit, for being searched in the application list according to the information of the application program;
Judging unit, for judging whether the application program has access authority according to lookup result.
In conjunction with the first possible implementation of the third aspect, in second of possible implementation of the third aspect In, the judgment module, further includes:
Receiving unit, for receiving the application list sent in advance by the first terminal, the Application Column Information comprising the application program with access authority in table;
Alternatively, download unit, is uploaded for downloading from a server first terminal by user account used in local The application list.
In conjunction with the third aspect, in the third possible implementation of the third aspect, described device further include:
Second receiving module, the corresponding key of the application program sent for receiving the first terminal;
Memory module, for being stored to the corresponding key of the application program.
In conjunction with the third aspect, in the fourth possible implementation of the third aspect, described device further include:
Module is established, for establishing near-field communication NFC connection;
First receiving module receives the access request that first terminal is sent for the NFC connection by establishing.
In conjunction with the third aspect to the third aspect the 5th kind of possible implementation in any possible implementation, In 5th kind of possible implementation of the third aspect, described device further include:
Third receiving module obtains after being modified by the first terminal according to first business datum for reception The second business datum;
Preserving module, for being saved to second business datum.
In conjunction with the third aspect, in the 6th kind of possible implementation of the third aspect, the acquisition module, for working as institute State access request be near field payment request when, obtain the monetary value being locally stored;Alternatively, when the access request is identity letter When ceasing certification request, the identity information being locally stored is obtained.
According to a fourth aspect of embodiments of the present disclosure, a kind of terminal is provided, which includes:
First sending module wraps in the access request for sending the access request of near field business to wearable device The information for initiating the application program of access is included, the information of the application program includes at least one of the following: application identities and application Title judges whether the application program has access authority by the wearable device according to the information of the application program, The near field business includes near field payment transaction and access control system business;
Receiving module, encrypted first business datum returned for receiving the wearable device add according to described The first business datum and server finishing service after close.
In conjunction with fourth aspect, in the first possible implementation of the fourth aspect, the terminal further include:
Third sending module, for the wearable device sending application program listing, in described the application list Information comprising the application program with access authority;
Alternatively, uploading module, for uploading the application list to server by user account used in local.
In conjunction with fourth aspect, in the second possible implementation of the fourth aspect, the terminal further include:
4th sending module, for sending the corresponding key of the application program to the wearable device, by it is described can Wearable device saves the key.
In conjunction with fourth aspect, in the third possible implementation of the fourth aspect, the terminal further include:
Cipher authentication module verifies the password for obtaining the password of user's input;
First sending module is used to execute to wearable device when verification result is to be verified and send near field industry The step of access request of business.
According to a fifth aspect of the embodiments of the present disclosure, a kind of business processing device is provided, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The access request for the near field business that first terminal is sent is received, includes the application for initiating access in the access request The information of program, the information of the application program include at least one of the following: application identities and Apply Names, the near field business Including near field payment transaction and access control system business;
According to the information of the application program, judge whether the application program has access authority;
If the application program has access authority, corresponding first business datum of the access request is obtained from local;
First business datum is encrypted, encrypted first business datum is back to the first terminal.
According to a sixth aspect of an embodiment of the present disclosure, a kind of terminal is provided, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The access request of near field business is sent to wearable device, includes the application journey for initiating access in the access request The information of the information of sequence, the application program includes at least one of the following: application identities and Apply Names, wearable is set by described The standby information according to the application program, judges whether the application program has access authority, and the near field business includes close Field payment transaction and access control system business;
Encrypted first business datum that the wearable device returns is received, according to encrypted first business Data and server finishing service.
According to the 7th of the embodiment of the present disclosure the aspect, a kind of computer readable storage medium is provided, the computer can It reads to be stored with program in storage medium, described program is loaded by processor and executed to realize the business as described in second aspect Reason method.
The technical solution that the embodiment of the present disclosure provides has the benefit that
Judge whether application program has according to the information of application program by receiving the access request that first terminal is sent There is access authority, if application program has access authority, the first business datum to be processed that first terminal is sent is received, to first Business datum is encrypted, and encrypted first business datum is back to first terminal, first terminal is according to encrypted One business datum and server finishing service.Due to can according to the information of application program, judge application program whether access authority, To be avoided that unwarranted application accesses, so that the safety of business processing is higher.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of method for processing business shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of method for processing business shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of method for processing business shown according to an exemplary embodiment.
Fig. 4 is to interact signal between a kind of first terminal and wearable device shown according to an exemplary embodiment Figure.
Fig. 5 is a kind of flow chart of method for processing business shown according to an exemplary embodiment.
Fig. 6 is a kind of flow chart of method for processing business shown according to an exemplary embodiment.
Fig. 7 is a kind of functional schematic of wearable device shown according to an exemplary embodiment.
Fig. 8 is a kind of structural schematic diagram of business processing device shown according to an exemplary embodiment.
Fig. 9 is a kind of structural schematic diagram of judgment module shown according to an exemplary embodiment.
Figure 10 is a kind of structural schematic diagram of judgment module shown according to an exemplary embodiment.
Figure 11 is a kind of structural schematic diagram of business processing device shown according to an exemplary embodiment.
Figure 12 is a kind of structural schematic diagram of business processing device shown according to an exemplary embodiment.
Figure 13 is a kind of structural schematic diagram of business processing device shown according to an exemplary embodiment.
Figure 14 is a kind of structural schematic diagram of terminal shown according to an exemplary embodiment.
Figure 15 is a kind of structural schematic diagram of terminal shown according to an exemplary embodiment.
Figure 16 is a kind of structural schematic diagram of terminal shown according to an exemplary embodiment.
Figure 17 is a kind of structural schematic diagram of terminal shown according to an exemplary embodiment.
Figure 18 is a kind of block diagram of terminal shown according to an exemplary embodiment.
Figure 19 is a kind of structural schematic diagram of wearable device shown according to an exemplary embodiment.
Figure 20 is a kind of structural schematic diagram of wearable device shown according to an exemplary embodiment.
Figure 21 is a kind of structural schematic diagram of wearable device shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
The method for processing business that the embodiment of the present disclosure provides has been related to first terminal, first terminal and wearable device. Wherein, first terminal be can be smart phone, tablet computer, pocket computer on knee etc., first terminal can be read/write Card device etc..First terminal can be interacted by bluetooth and wearable device, and be managed to the application in wearable device, Such as the downloading of application, installation, personalization and deletion.First terminal can be interacted by electromagnetic wave and wearable device, electromagnetism Wave can carry the information for needing interaction.
Fig. 1 is a kind of flow chart of method for processing business shown according to an exemplary embodiment, the method for processing business Applied to wearable device.As shown in Figure 1, the method for processing business includes the following steps.
In a step 101, the access request that first terminal is sent is received, includes the application journey for initiating access in access request The information of sequence.
In a step 102, according to the information of application program, judge whether application program has access authority.
In step 103, if application program has access authority, corresponding first business datum of access request is obtained.
At step 104, the first business datum is encrypted, encrypted first business datum is back to first eventually End.
The method that the embodiment of the present disclosure provides, the access request sent by receiving first terminal, according to application program Information, judges whether application program has access authority, if application program have access authority, receive first terminal send to The first business datum is handled, the first business datum is encrypted, encrypted first business datum is back to first terminal, First terminal is according to encrypted first business datum and server finishing service.Due to that can be sentenced according to the information of application program Disconnected application program whether access authority, to be avoided that unwarranted application accesses, so that the safety of business processing It is higher.
Judge whether application program has access authority according to the information of application program as a kind of alternative embodiment, wraps It includes:
It is searched in the application list according to the information of application program, judges whether application program has according to lookup result There is access authority.
As a kind of alternative embodiment, before being searched in the application list according to the information of application program, further includes:
The application list sent in advance by first terminal is received, includes with access authority in the application list The information of application program;
Alternatively, downloading from a server the Application Column that first terminal is uploaded by user account used in local terminal Table.
As a kind of alternative embodiment, before being encrypted to the first business datum, further includes:
The corresponding key of application program that first terminal is sent is received, the corresponding key of application program is stored.
As a kind of alternative embodiment, before receiving the access request that first terminal is sent, method further include:
Establish near-field communication NFC connection;
Receive the access request that first terminal is sent, comprising:
By the NFC connection of foundation, the access request that first terminal is sent is received.
As a kind of alternative embodiment, by the NFC connection of foundation, after receiving the access request that first terminal is sent, Further include:
The second business datum obtained after being modified by first terminal according to the first business datum is received, to the second business Data are saved.
As a kind of alternative embodiment, corresponding first business datum of access request is obtained, comprising:
When access request is near field payment request, the monetary value of local terminal storage is obtained;
Alternatively, obtaining the identity information of local terminal storage when access request is identity information certification request;
Alternatively, receiving the monetary value to be processed that first terminal is sent when access request is that remote payment is requested;
Alternatively, receiving the authentication information to be processed that first terminal is sent when access request is safety certification request;
Alternatively, receiving the friendship to be processed that first terminal is sent when access request is integrated circuit card IC interaction request Easy information.
All the above alternatives can form alternative embodiment of the invention using any combination, herein no longer It repeats one by one.
Fig. 2 is a kind of flow chart of method for processing business shown according to an exemplary embodiment, the method for processing business Applied to terminal.As shown in Fig. 2, the method for processing business includes the following steps.
In step 201, access request is sent to wearable device, includes the application program for initiating access in access request Information judge whether application program has access authority by wearable device according to application information;
In step 202, if application program has access authority, business datum to be processed is sent to wearable device, by Wearable device encrypts business datum, and encrypted business datum is back to first terminal;
In step 203, the encrypted business datum that wearable device returns is received, according to encrypted business datum With server finishing service.
The method that the embodiment of the present disclosure provides, by the access request sent to wearable device, by wearable device root It is determined according to access request after there is access authority, sends business datum to be processed to wearable device.Wearable device is received to return Business datum after the encryption returned, according to encrypted business datum and server finishing service.Due to that can be sentenced according to access request Disconnected application program whether access authority, to be avoided that unwarranted application accesses, so that the safety of business processing It is higher.
As a kind of alternative embodiment, this method further include:
To wearable device sending application program listing, include the application program with access authority in the application list Information;Alternatively, uploading the application list to server by user account used in local.
As a kind of alternative embodiment, this method further include:
To the corresponding key of wearable device sending application program, key is saved by wearable device.
As a kind of alternative embodiment, before the transmission access request to wearable device, further includes:
Obtain the password of user's input;
The password is verified, when verification result is to be verified, executes to send to access to wearable device and ask The step of asking.
All the above alternatives can form alternative embodiment of the invention using any combination, herein no longer It repeats one by one.
Fig. 3 is a kind of flow chart of method for processing business shown according to an exemplary embodiment, as shown in figure 3, the industry Business processing method is related to wearable device and first terminal, includes the following steps.
In step 301, first terminal sends access request to wearable device, includes initiating access in access request The information of application program.
The present embodiment does not limit first terminal specifically to the mode that wearable device sends access request, including but not It is limited to: bluetooth module can be installed in first terminal and wearable device, first terminal is sent out by bluetooth to wearable device Send access request.It wherein, may include the application information for initiating access in access request, the present embodiment is not in access request Including content make specific limit.The information of application program can be application identities, Apply Names etc., and the present embodiment is not to application The content of the information of program makees specific limit.
For example, wearable device is Intelligent bracelet using first terminal as mobile phone, the information of application program is application program mark For knowledge.When the application program installed on mobile phone needs to access Intelligent bracelet under the operation of user, application program can pass through The information of bluetooth equipment on mobile phone to Intelligent bracelet sending application program.
It should be noted that the access request that first terminal is sent can ask near field payment request, identity information certification It asks, remote payment request, safety certification request and IC (Integrated Circuit Card, integrated circuit card) interaction request, The present embodiment is not especially limited this.
In step 302, wearable device receives the access request that first terminal is sent.
The mode that the present embodiment does not receive the access request that first terminal is sent to wearable device specifically limits, including But it is not limited to: is received according to the mode that first terminal sends access request.For example, when in wearable device and first terminal When portion is fitted with bluetooth module, wearable device can receive the access request that first terminal is sent by bluetooth module.
In addition, first terminal to wearable device send access request before, first terminal can also and wearable device NFC (Near Field Communication, near-field communication) connection is established, the present embodiment is not especially limited this.
Correspondingly, wearable device receive first terminal send access request when, can by the NFC connection of foundation, Receive the access request that first terminal is sent.
In step 303, wearable device judges whether application program has access right according to the information of application program Limit, if so, step 304 is executed, if not, terminating.
The present embodiment, according to the information of application program, judges whether application program has access authority not to wearable device Mode specifically limit, including but not limited to: being searched in the application list according to the information of application program, according to lookup As a result judge whether application program has access authority.Wherein, the application journey with access authority is included in the application list The information of sequence, the present embodiment are not especially limited this.
For example, including answering with access authority in the application list using application information as application program identification For program identification.Wearable device can be searched in the application list according to application program identification, if in application program The mark of application program is found in list, it is determined that the application program has access authority.If in the application list The mark of application program is not found, it is determined that the application program does not have access authority.
In addition, wearable device is before the information according to application program is searched in the application list, first terminal It can be to the preparatory sending application program listing of wearable device, so that wearable device can receive the application that first terminal is sent in advance Program listing.Alternatively, first terminal can upload the application list to server by the user account locally used, thus Wearable device can download from a server the application list of first terminal upload.Certainly, wearable device can also have Other modes for obtaining the application list, the present embodiment are not especially limited this.
It should be noted that the application list of wearable device storage is equivalent to access rule.When there is terminal access When wearable device, wearable device can determine whether the terminal has access authority according to access rule, to avoid not having The terminal of permission accesses, and guarantees the safety of subsequent processing business.Certainly, access rule can also have other forms and Content, the present embodiment are not especially limited this.
In step 304, first terminal sends the first business datum to be processed to wearable device.
When application program has access authority, first terminal can send the first business number to be processed to wearable device According to.Wherein, the first business datum can first be sent from server to first terminal, and first terminal is receiving the of server transmission After one business datum, then by bluetooth to wearable device the first business datum of transmission, the present embodiment is not especially limited this.
From step 301 it is found that first terminal is when sending access request to wearable device, access request can be near field Any one of payment request, identity information certification request, remote payment request, safety certification request and IC interaction request.Cause This sends the content of the first business datum to be processed based on the difference of access request type to wearable device in this step Also not identical.
When access request is safety certification request, first terminal can send certification letter to be processed to wearable device Breath.Wherein, authentication information can be informative abstract, and the present embodiment does not make specific limit to the content of authentication information.
When access request is that remote payment is requested, first terminal can send currency number to be processed to wearable device Value.Wherein, monetary value can buy the spending amount of commodity for user, and the present embodiment does not make the content of authentication information specific It limits.
For example, the first business datum can be user when buying commodity so that type of service is remote payment business as an example Spending amount.In addition, since whether the subsequent terminal for needing to verify this processing payment transaction is legal.Therefore, server exists When sending the corresponding spending amount of this payment transaction to first terminal, it can produce for the subsequent random value verified, and The random value is sent to first terminal, the present embodiment is not especially limited this.Accordingly, may include in the first business datum The corresponding spending amount of this payment transaction can also include the random value that server generates.
When access request is IC interaction request, first terminal can send transaction letter to be processed to wearable device Breath.Wherein, Transaction Information can be recharge amount etc., and the present embodiment does not make specific limit to the content of Transaction Information.
For example, Transaction Information can be the amount of money that user needs to supplement with money for IC so that type of service is IC interactive task as an example.
In step 305, wearable device obtains corresponding first business datum of access request.
The mode that the present embodiment does not obtain corresponding first business datum of access request to wearable device specifically limits, Including but not limited to: receiving the first business datum that first terminal is sent.Wearable device is in receive that first terminal sends the When one business datum, the first business datum that first terminal is sent can be received by bluetooth, the present embodiment is not made this specifically yet It limits.
Since in above-mentioned steps 304, the difference of access request type, the content of the first business datum can not yet Together.Wherein, when access request is that remote payment is requested, wearable device can receive the currency to be processed that first terminal is sent Numerical value.When access request is safety certification request, wearable device can receive the certification letter to be processed that first terminal is sent Breath.When access request is IC interaction request, wearable device can receive the Transaction Information to be processed that first terminal is sent.
It should be noted that wearable device in addition to receive first terminal send the first business datum other than, according to visit Ask the difference of request type, wearable device can also obtain the first business datum being locally stored, and the present embodiment does not make this to have Body limits.Wherein, when access request is near field payment request, wearable device can obtain the monetary value being locally stored.When Access request is identity information certification request, and wearable device can obtain the identity information being locally stored.
Within step 306, wearable device encrypts the first business datum, and encrypted first business datum is returned It is back to first terminal.
It should be noted that " encryption " is the concept of a broad sense in the present invention, in addition to cryptographic calculation (example Such as symmetrical, asymmetric encryption operation), it can also include signature operation (being referred to as authentication operation), therefore, the first industry Business data are also possible to data to be signed.
When user is traded by the application program in terminal, application program may need to carry out data to be signed Signature operation.Therefore, the certificate and key for signature can be stored in wearable device in advance.When need to sign operation when, Terminal sends data to be signed in wearable device and carries out signature operation, and returns to operation result, the present embodiment to this not Make specific limit.
Such as: it can be terminal and data to be signed be transmitted in wearable device, wearable device is carried out using private key Signature, and signed data and public key certificate are returned into wearable device, so that the application program in terminal completes transaction.
In the present invention, Encryption Algorithm of the invention (including signature algorithm) is not limited yet, can be and follow PKI The algorithm of (Public Key Infrastructure, Public Key Infrastructure) standard is also possible to pay the proprietary protocol of manufacturer The lower algorithm for standardizing or providing.
In step 307, first terminal receives the encrypted business datum that wearable device returns, according to encrypted Business datum and server finishing service.
First terminal can receive encrypted first business datum by bluetooth, receive encrypted first business number According to rear, first terminal can be according to encrypted first business datum and server finishing service.With the content in above-mentioned steps 306 Based on, the present embodiment is not made to have to first terminal according to encrypted first business datum and the mode of server finishing service Body limits, and including but not limited to: encrypted first business datum is sent to server by first terminal;Server is according to application The corresponding key of program encrypts the first business datum according to one-way Hash algorithm;Server is whole with first by encrypted result The first business datum after the encryption sent is held to be compared;If the two is identical, the processing of this business is completed.
For example, including user disappearing when buying commodity in the first business datum using type of service as remote payment business Take the random value value that the amount of money and server generate, first terminal sends the first business datum to be processed to wearable device Corresponding application program is A, for the corresponding key of application program A stored in wearable device and server is Key_A.The One terminal initiates payment transaction to server by application program A, and server is by the spending amount of this payment transaction and generation Random value value be sent to first terminal as the first business datum, the first business datum is sent to and can wear by first terminal Wear equipment.After wearable device receives the first business datum of first terminal transmission, can in the first business datum with Machine value value is encrypted according to key Key_A according to one-way Hash algorithm, to obtain encrypted data value_1.It can Encrypted data are back to first terminal by bluetooth by wearable device, and first terminal sends out encrypted data value_1 It send to server.Server side encrypts random value value according to one-way Hash algorithm according to key Key_A, is added Data value_2 after close.If value_1 is identical as both value_2, server can work as spending amount from user account It is deducted in the preceding amount of money, to complete the processing of this business.If value_1 is different from both value_2, illustrate business processing In the process, the first business datum may illegally be distorted by people, so that this business processing fails.
In addition, due in above-mentioned steps 301 into step 307, no NFC (Near Field Communication, Near-field communication) under the premise of function, teleaction service, such as remote payment business can be also completed, so that wearable device exists Under the premise of there is no NFC function, payment transaction can be equally completed.
It should be noted that in the method for processing business process that above-mentioned steps 301 are provided to step 307, what is be related to is The interaction of wearable device and first terminal, the process are mainly used in teleaction service processing scene.For example, first terminal with can Interaction schematic diagram between wearable device can be as shown in Figure 4.
It should be noted that for payment scene and some other secrecy scenes, in terminal to wearable device Before sending access request, another verification process in fact can also be carried out in terminal side, that is to say, this method can also wrap Include: terminal obtains the password of user's input;Terminal verifies the password, when verification result is to be verified, executes The step of sending access request to wearable device.Due to many user settings such as account number cipher or payment cipher, then Terminal can first provide password verification process, input password in terminal by user, when terminal receives the password, triggering and clothes Be engaged in device between password verification process, when determine be verified when, just send the access request to wearable device, with carry out into The certification of one step substantially increases the safety of business, that is to say, after terminal carries out first time certification, by wearable device Second is carried out to authenticate.And for some other scenes, the cipher authentication process can also terminal have been received by It carries out, that is to say after carrying out first time certification by wearable device, by end when business datum after the encryption that wearable device is sent End carries out second and authenticates, and it is not limited in this embodiment of the present disclosure.
Certainly, in a practical situation, wearable device applies also near field business processing scene, the present embodiment to this not Make specific limit.Wherein, business processing scene near field can be generally divided near field payment scene and access control system scene.For door Access control system scene, present embodiments provides a kind of method for processing business, and this method relates generally to wearable device and first terminal Between interaction.Wherein, first terminal can be deposited by corresponding card reader of access control system etc. for reading in wearable device Store up the terminal of information.Referring to Fig. 5, specific method is detailed in subsequent step:
In step 501, wearable device receives the access request that first terminal is sent.
The mode that the present embodiment does not receive the access request that first terminal is sent to wearable device specifically limits, including But be not limited to: whether the distance between detection and first terminal reach pre-determined distance;If detect between first terminal away from From pre-determined distance is reached, then the access request of first terminal is received.It wherein, include the application program for initiating access in access request Information, the present embodiment is not especially limited this.
Whether the present embodiment does not reach the mode of pre-determined distance to the distance between wearable device detection and first terminal Make specific restriction, including but not limited to: coil is previously provided with inside wearable device, and first terminal can provide alternation magnetic ?;The energy for the alternating magnetic field that first terminal provides is received by coil;The energy that coil inside wearable device receives When amount can drive the chip operation inside wearable device, it is determined that the distance between wearable device and first terminal reach Pre-determined distance.Wherein, coil is closer at a distance from first terminal, and the energy that the coil inside wearable device receives is bigger.
In step 502, wearable device judges whether application program has access right according to the information of application program Limit, if so, step 503 is executed, if not, terminating.
The present embodiment, according to the information of application program, judges whether application program has access authority not to wearable device Mode specifically limit, detailed process can refer to the content in the corresponding embodiment of above-mentioned Fig. 3 in step 303, herein no longer It repeats.
In step 503, if application program has access authority, wearable device obtains corresponding first industry of access request Business data.
The mode that the present embodiment does not obtain corresponding first business datum of access request to wearable device specifically limits, Including but not limited to: when detecting that the distance between first terminal reaches pre-determined distance, obtaining the first industry being locally stored Business data.
It should be noted that since the present embodiment is mainly used near field business scenario, it, can in above-mentioned steps 501 The access request that wearable device receives can be near field payment request, or identity information certification request, the present embodiment This is not especially limited.Correspondingly, when access request is near field payment request, wearable device, which can obtain, to be locally stored Monetary value.When access request is identity information certification request, wearable device can obtain the identity information being locally stored, this reality It applies example and this is also not especially limited.
In step 504, wearable device encrypts the first business datum, and encrypted first business datum is returned It is back to first terminal.
The mode that the present embodiment does not encrypt wearable device to the first business datum specifically limits, detailed process It can refer to the content in the corresponding embodiment of above-mentioned Fig. 3 in step 306, details are not described herein again.
Encrypted first business datum is back to the mode of first terminal about wearable device, the present embodiment is to this It is not especially limited, including but not limited to: the first business datum is sent to by first terminal by bluetooth.
Wherein, first terminal is after receiving the first business datum, if the first business datum is identity information, first terminal The identity information is searched in the identity information library being locally stored.Believe when finding the identity in the identity information library being locally stored When breath, determine that the identity information is legal.When not finding the identity information in the identity information library being locally stored, the body is determined Part information is illegal.
For example, by taking application scenarios are gate inhibition as an example, it can the relevant Mifare of pre-loaded access control system in wearable device Using.When user using wearable device close to access control system when, the identity information in wearable device can be read in access control system, And the identity information in wearable device is searched in the identity information library being locally stored.If in the identity information library being locally stored In find the identity information, determine that the identity information is legal, then user can pass through gate inhibition.If in the identity information being locally stored The identity information is not found in library, determines that the identity information is illegal, then user cannot pass through gate inhibition.
Scene is paid near field, present embodiments provides a kind of method for processing business, this method relates generally to wearable Interaction between equipment and first terminal.Wherein, first terminal can pay card reader etc. near field.Referring to Fig. 6, specific method It is detailed in subsequent step:
In step 601, wearable device receives the access request that first terminal is sent.
The mode that the present embodiment does not receive the access request that first terminal is sent to wearable device specifically limits, specifically Process can refer to the content in the corresponding embodiment of above-mentioned Fig. 5 in step 501, and details are not described herein again.
In step 602, wearable device judges whether application program has access right according to the information of application program Limit, if so, step 503 is executed, if not, terminating.
The present embodiment, according to the information of application program, judges whether application program has access authority not to wearable device Mode specifically limit, detailed process can refer to the content in the corresponding embodiment of above-mentioned Fig. 5 in step 502, herein no longer It repeats.
In step 603, if application program has access authority, wearable device obtains corresponding first industry of access request Business data.
The mode that the present embodiment does not obtain corresponding first business datum of access request to wearable device specifically limits, Detailed process can refer to the content in the corresponding embodiment of above-mentioned Fig. 5 in step 503, and details are not described herein again.
It should be noted that since current implement scene is that near field pays scene, the first business datum can be goods Coin numerical value, the present embodiment do not make specific limit to the content of the first business datum.
In step 604, wearable device encrypts the first business datum, and encrypted first business datum is returned It is back to first terminal.
The present embodiment does not encrypt wearable device to the first business datum, and encrypted first business datum is returned The mode for being back to first terminal specifically limits, and detailed process can refer to interior in step 504 in the corresponding embodiment of above-mentioned Fig. 5 Hold, details are not described herein again.
In step 605, wearable device reception obtains after being modified by first terminal according to the first business datum Second business datum saves the second business datum.
Wherein, first terminal, can be according to the corresponding data of current business, to the first industry after receiving the first business datum Business data are modified, and the second business datum obtained after modification is back to wearable device.
In addition, first terminal, can be according to current after receiving monetary value when the first business datum is monetary value The cost amount of money of business is deducted from monetary value, is obtained modified monetary value and is back to wearable device.
For example, by taking application scenarios are near field payment as an example.When user using wearable device close to payment system when, payment Payment of balance's data in wearable device can be read in system, are detained from payment of balance's data according to the cost amount of money of current business It removes, to obtain modified payment of balance's data, and modified payment of balance's data are back to wearable device.
Wearable device can save the second business datum after receiving the second business datum.Wherein, wearable When equipment saves the second business datum, the first business datum being locally stored originally, the present embodiment pair can be replaced simultaneously This is not especially limited.
It should be noted that read/write card device can also be arranged in wearable device, to IC (Integrated Circuit Card, integrated circuit card) it is read out, the present embodiment is not especially limited this.In addition, reading the same of IC card When, the data read can also be sent to first terminal by bluetooth, data be shown by first terminal, this implementation Example is not especially limited this.For example, can be read in bus card or bank IC card by the card reader in wearable device Balance data, and be transmitted to mobile phone.Mobile phone receive wearable device transmission balance data after, can be shown, from And prompt user.
Certainly, wearable device can also receive the more new data of first terminal transmission, pass through read/write according to more new data Card device rewrites the data stored in IC card, and the present embodiment is not especially limited this.For example, user can be defeated by mobile phone Enter the amount of money for needing to supplement with money, after wearable device receives the recharge amount of mobile phone transmission, read/write card is passed through according to recharge amount Device supplements the remaining sum of bus card or bank IC card with money.
In addition, NFC antenna would generally be placed in wearable device due to when handling near field business.Therefore, when wearable When equipment is internally provided with battery, it can be realized by NFC antenna and wireless charging is carried out to battery, the present embodiment is not made this specifically It limits.
Wearable device multiple functions under different application scene are given in above-mentioned steps, if near field is paid, Mifare1 Gate function, remote payment, safety certification, NFC reading and writing IC card and wireless charging etc., the function that wearable device can be realized can As shown in Figure 7.
The method that the embodiment of the present disclosure provides, the access request that wearable device is sent by receiving first terminal, according to The information of application program, judges whether application program has access authority, if application program has access authority, receives first eventually The first business datum to be processed sent is held, the first business datum is encrypted, encrypted first business datum is returned To first terminal, first terminal is according to encrypted first business datum and server finishing service.Due to can according to apply journey The information of sequence, judge application program whether access authority, to be avoided that unwarranted application accesses, so that at business The safety of reason is higher.
Fig. 8 is a kind of business processing device schematic diagram shown according to an exemplary embodiment, referring to Fig. 8, the device packet It includes the first receiving module 801, judgment module 802, obtain module 803 and return module 804.
First receiving module 801 is configured as receiving the access request that first terminal is sent, and includes hair in access request Play the information of the application program of access;
The judgment module 802 is configured as the information according to application program, judges whether application program has access authority;
The acquisition module 803 be configured as when application program have access authority when, receive first terminal send wait locate Manage the first business datum;
The return module 804 is configured as encrypting the first business datum, and encrypted first business datum is returned It is back to first terminal.
In one embodiment, referring to Fig. 9, which includes searching unit 8021 and judging unit 8022.
The searching unit 8021 is configured as being searched in the application list according to the information of application program;
The judging unit 8022 is configured as judging whether application program has access authority according to lookup result.
In one embodiment, referring to Figure 10, which further includes receiving unit 8023 or download unit 8024。
Receiving unit 8023 is configured as receiving the application list sent in advance by first terminal, the application list In comprising with access authority application program information;
Alternatively, download unit 8024, which is configured as downloading from a server first terminal, passes through user's account used in local Number upload the application list.
In one embodiment, referring to Figure 11, which further includes the second receiving module 805 and memory module 806.
Second receiving module 805 is configured as receiving the corresponding key of application program that first terminal is sent;
The memory module 806 is configured as storing the corresponding key of application program.
In one embodiment, referring to Figure 12, which further includes establishing module 807.
This is established module 807 and is configured as establishing near-field communication NFC connection;
First receiving module 801 is configured as the NFC connection by foundation, receives the access that first terminal is sent and asks It asks.
In one embodiment, referring to Figure 13, which further includes third receiving module 808 and preserving module 809.
The third receiving module 808 is configured as obtaining after reception is modified by first terminal according to the first business datum The second business datum;
The preserving module 809 is configured as saving the second business datum.
In one embodiment, which is configured as obtaining this when access request is near field payment request The monetary value of ground storage;Alternatively, obtaining the identity information being locally stored when access request is identity information certification request;Or Person receives the monetary value to be processed that first terminal is sent when access request is that remote payment is requested;Alternatively, when access When request is safety certification request, the authentication information to be processed that first terminal is sent is received;Alternatively, when access request is integrated When circuit card IC interaction request, the Transaction Information to be processed that first terminal is sent is received.
The device that the embodiment of the present disclosure provides, the access request sent by receiving first terminal, according to application program Information, judges whether application program has access authority, if application program have access authority, receive first terminal send to The first business datum is handled, the first business datum is encrypted, encrypted first business datum is back to first terminal, First terminal is according to encrypted first business datum and server finishing service.Due to that can be sentenced according to the information of application program Disconnected application program whether access authority, to be avoided that unwarranted application accesses, so that the safety of business processing It is higher.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Figure 14 is a kind of schematic diagram of terminal shown according to an exemplary embodiment, referring to Fig.1 4, which includes the One sending module 1401, the second sending module 1402 and receiving module 1403.
First sending module 1401 is configured as sending access request to wearable device, includes hair in the access request The information for playing the application program of access judges described using journey by the wearable device according to the information of the application program Whether sequence has access authority;
Second sending module 1402 is configured as when the application program has access authority, to the wearable device Business datum to be processed is sent, the business datum is encrypted by the wearable device, by encrypted business datum It is back to first terminal;
Receiving module 1403 is configured as receiving the encrypted business datum that the wearable device returns, according to encryption Business datum and server finishing service afterwards.
In one embodiment, referring to Figure 15, which further includes third sending module 1404 or uploading module 1405.
The third sending module 1404 is configured as to the wearable device sending application program listing, described to apply journey Information comprising the application program with access authority in sequence table;
The uploading module 1405 is configured as through user account used in local, uploads Application Column to server Table.
In one embodiment, referring to Figure 16, which further includes the 4th sending module 1406.
4th sending module 1406 is configured as sending the corresponding key of the application program to the wearable device, The key is saved by the wearable device.
In one embodiment, referring to Figure 17, which further includes cipher authentication module 1407.
The cipher authentication module 1407 is configured as obtaining the password of user's input, verifies to the password;
First sending module 1401 is configured as executing to send to wearable device and visiting when verification result is to be verified The step of asking request.
The terminal that the embodiment of the present disclosure provides, by the access request sent to wearable device, by wearable device root After there is access authority according to access request judgement, business datum to be processed is sent to wearable device.Wearable device is received to return Business datum after the encryption returned, according to encrypted business datum and server finishing service.Due to can be according to application program Information, judge application program whether access authority, to be avoided that unwarranted application accesses, so that business processing Safety is higher.
Figure 18 is a kind of block diagram of terminal 1800 for being handled business shown according to an exemplary embodiment. For example, terminal 1800 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, plate Equipment, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig.1 8, terminal 1800 may include following one or more components: processing component 1802, memory 1804, Power supply module 1806, multimedia component 1808, audio component 1810, the interface of I/O (Input/Output, input/output) 1812, sensor module 1814 and communication component 1816.
The integrated operation of the usual controlling terminal 1800 of processing component 1802, such as with display, telephone call, data communication, Camera operation and record operate associated operation.Processing component 1802 may include one or more processors 1820 to execute Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1802 may include one or more moulds Block, convenient for the interaction between processing component 1802 and other assemblies.For example, processing component 1802 may include multi-media module, To facilitate the interaction between multimedia component 1808 and processing component 1802.
Memory 1804 is configured as storing various types of data to support the operation in terminal 1800.These data Example includes the instruction of any application or method for operating in terminal 1800, contact data, telephone book data, Message, picture, video etc..Memory 1804 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as SRAM (Static Random Access Memory, static random access memory), EEPROM (Electrically-Erasable Programmable Read-Only Memory, the read-only storage of electrically erasable Device), EPROM (Erasable Programmable Read Only Memory, Erasable Programmable Read Only Memory EPROM), PROM (Programmable Read-Only Memory, programmable read only memory), and ROM (Read-Only Memory, it is read-only to deposit Reservoir), magnetic memory, flash memory, disk or CD.
Power supply module 1806 provides electric power for the various assemblies of terminal 1800.Power supply module 1806 may include power management System, one or more power supplys and other with for terminal 1800 generate, manage, and distribute the associated component of electric power.
Multimedia component 1808 includes the screen of one output interface of offer between terminal 1800 and user.Some In embodiment, screen may include LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch Panel, Touch panel).If screen includes touch panel, screen may be implemented as touch screen, to receive input letter from the user Number.Touch panel includes one or more touch sensors to sense the gesture on touch, slide, and touch panel.Touch sensing Device can not only sense the boundary of a touch or slide action, but also detect the duration relevant with touch or slide and Pressure.In some embodiments, multimedia component 1808 includes a front camera and/or rear camera.Work as terminal 1800 are in operation mode, and such as in a shooting mode or a video mode, front camera and/or rear camera can receive outside Multi-medium data.Each front camera and rear camera can be a fixed optical lens system or have focal length And optical zoom ability.
Audio component 1810 is configured as output and/or input audio signal.For example, audio component 1810 includes one MIC (Microphone, microphone), when terminal 1800 is in operation mode, such as call model, logging mode and speech recognition mould When formula, microphone is configured as receiving external audio signal.The received audio signal can be further stored in memory 1804 or via communication component 1816 send.In some embodiments, audio component 1810 further includes a loudspeaker, for defeated Audio signal out.
I/O interface 1812 provides interface, above-mentioned peripheral interface module between processing component 1802 and peripheral interface module It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and Locking press button.
Sensor module 1814 includes one or more sensors, and the state for providing various aspects for terminal 1800 is commented Estimate.For example, sensor module 1814 can detecte the state that opens/closes of terminal 1800, the relative positioning of component, such as group Part is the display and keypad of terminal 1800, and sensor module 1814 can also detect 1,800 1 groups of terminal 1800 or terminal The position change of part, the existence or non-existence that user contacts with terminal 1800,1800 orientation of terminal or acceleration/deceleration and terminal 1800 temperature change.Sensor module 1814 may include proximity sensor, be configured to connect in not any physics It is detected the presence of nearby objects when touching.Sensor module 1814 can also include optical sensor, such as CMOS (Complementary Metal Oxide Semiconductor, complementary metal oxide) or CCD (Charge-coupled Device, Charged Couple Element) imaging sensor, for being used in imaging applications.In some embodiments, which can also wrap Include acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1816 is configured to facilitate the communication of wired or wireless way between terminal 1800 and other equipment.Eventually End 1800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.It is exemplary at one In embodiment, communication component 1816 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, communication component 1816 further includes (Near Field Communication, the near field NFC Communication) module, to promote short range communication.For example, RFID (Radio Frequency can be based in NFC module Identification, radio frequency identification) technology, IrDA (Infra-red Data Association, Infrared Data Association) skill Art, UWB (Ultra Wideband, ultra wide band) technology, BT (Bluetooth, bluetooth) technology and other technologies are realized.
In the exemplary embodiment, terminal 1800 can be by one or more ASIC (Application Specific Integrated Circuit, application specific integrated circuit), DSP (Digital signal Processor, at digital signal Manage device), DSPD (Digital signal Processor Device, digital signal processing appts), PLD (Programmable Logic Device, programmable logic device), FPGA) (Field Programmable Gate Array, field programmable gate Array), controller, microcontroller, microprocessor or other electronic components realize, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 1804 of instruction, above-metioned instruction can be executed by the processor 1820 of terminal 1800 to complete the above method.Example Such as, non-transitorycomputer readable storage medium can be ROM, RAM (Random Access Memory, random access memory Device), CD-ROM (Compact Disc Read-Only Memory, compact disc read-only memory), tape, floppy disk and light data deposit Store up equipment etc..
The terminal that the embodiment of the present disclosure provides, by the access request sent to wearable device, by wearable device root After there is access authority according to access request judgement, business datum to be processed is sent to wearable device.Wearable device is received to return Business datum after the encryption returned, according to encrypted business datum and server finishing service.Due to can be according to application program Information, judge application program whether access authority, to be avoided that unwarranted application accesses, so that business processing Safety is higher.
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of mobile terminal When row, so that mobile terminal is able to carry out a kind of method for processing business, method includes:
Access request is sent to wearable device, includes the information for initiating the application program of access in access request, by can Wearable device judges whether application program has access authority according to the information of application program;
If application program has access authority, business datum to be processed is sent to wearable device, by wearable device pair Business datum is encrypted, and encrypted business datum is back to first terminal;
The encrypted business datum that wearable device returns is received, is completed according to encrypted business datum and server Business.
The non-transitorycomputer readable storage medium that the embodiment of the present disclosure provides, passes through the visit sent to wearable device It asks request, after there is access authority according to access request judgement by wearable device, sends business to be processed to wearable device Data.Business datum after the encryption that reception wearable device returns, according to encrypted business datum and server finishing service. Due to can according to the information of application program, judge application program whether access authority, thus be avoided that it is unwarranted apply into Row access, so that the safety of business processing is higher.
Figure 19 is a kind of wearable device schematic diagram shown according to an exemplary embodiment, referring to Fig.1 9, this is wearable Equipment includes master controller 1901, NFC controller 1902, eSE (Embedded Secure Element, embedded-type security mould Block) 1903 and antenna 1904.
Wherein, master controller 1901, NFC controller 1902 and eSE1903 are sequentially connected, antenna 1904 and NFC controller 1902 connections.
As a kind of alternative embodiment, referring to fig. 20, which further includes bluetooth module 1905;
Wherein, bluetooth module 1905 is connect with NFC controller 1902.
As a kind of alternative embodiment, referring to fig. 21, which further includes NFC reader 1906;
Wherein, NFC reader 1906 is connect with bluetooth module 1905.
The wearable device that the embodiment of the present disclosure provides, the access request sent by receiving first terminal, according to application The information of program, judges whether application program has access authority, if application program has access authority, receives first terminal hair The first business datum to be processed sent, encrypts the first business datum, and encrypted first business datum is back to One terminal, first terminal is according to encrypted first business datum and server finishing service.Due to can be according to application program Information, judge application program whether access authority, to be avoided that unwarranted application accesses, so that business processing Safety is higher.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (25)

1. a kind of method for processing business, which is characterized in that be applied in wearable device, which comprises
The access request for the near field business that first terminal is sent is received, includes the application program for initiating access in the access request Information, the information of the application program includes at least one of the following: that application identities and Apply Names, the near field business include Near field payment transaction and access control system business;
According to the information of the application program, judge whether the application program has access authority;
If the application program has access authority, corresponding first business datum of the access request is obtained from local;
First business datum is encrypted, encrypted first business datum is back to the first terminal.
2. the method according to claim 1, wherein the information according to the application program, described in judgement Whether application program has access authority, comprising:
It is searched in the application list according to the information of the application program, judges that the application program is according to lookup result It is no that there is access authority.
3. according to the method described in claim 2, it is characterized in that, the information according to the application program is in application program Before being searched in list, further includes:
The application list sent in advance by the first terminal is received, includes that there is access right in described the application list The information of the application program of limit;
Alternatively, downloading from a server the application list that first terminal is uploaded by user account used in local.
4. the method according to claim 1, wherein it is described first business datum is encrypted before, Further include:
The corresponding key of the application program that the first terminal is sent is received, the corresponding key of the application program is carried out Storage.
5. the method according to claim 1, wherein the access for receiving the near field business that first terminal is sent Before request, the method also includes:
Establish near-field communication NFC connection;
The access request for receiving first terminal and sending, comprising:
By the NFC connection of foundation, the access request that first terminal is sent is received.
6. according to claim 1 to method described in any one of 5 claims, which is characterized in that the reception first terminal hair After the access request sent, further includes:
The second business datum obtained after being modified by the first terminal according to first business datum is received, to described Second business datum is saved.
7. the method according to claim 1, wherein described obtain the access request corresponding first from local Business datum, comprising:
When the access request is near field payment request, the monetary value being locally stored is obtained;
Alternatively, obtaining the identity information being locally stored when the access request is identity information certification request.
8. a kind of method for processing business, which is characterized in that be applied in terminal, which comprises
The access request of near field business is sent to wearable device, includes the application program for initiating access in the access request The information of information, the application program includes at least one of the following: application identities and Apply Names, by the wearable device root According to the information of the application program, judge whether the application program has access authority, the near field business includes near field branch Business and access control system business are paid, and there is access authority in the application program, it is corresponding from the local acquisition access request The first business datum, first business datum is encrypted, encrypted first business datum is back to the end End;
Encrypted first business datum that the wearable device returns is received, according to encrypted first business datum With server finishing service.
9. according to the method described in claim 8, it is characterized in that, the method also includes:
To the wearable device sending application program listing, include the application with access authority in described the application list The information of program;
Alternatively, uploading the application list to server by user account used in local.
10. according to the method described in claim 8, it is characterized in that, the method also includes:
The corresponding key of the application program is sent to the wearable device, the key is carried out by the wearable device It saves.
11. according to the method described in claim 8, it is characterized in that, the access for sending near field business to wearable device Before request, further includes:
Obtain the password of user's input;
The password is verified, when verification result is to be verified, executes to wearable device and sends near field business The step of access request.
12. a kind of business processing device, which is characterized in that described device includes:
First receiving module, the access request of the near field business for receiving first terminal transmission include in the access request The information of the application program of access is initiated, the information of the application program includes at least one of the following: application identities and application name Claim, the near field business includes near field payment transaction and access control system business;
Judgment module judges whether the application program has access authority for the information according to the application program;
Module is obtained, for when the application program has access authority, obtains the access request corresponding the from local One business datum;
Encrypted first business datum is back to described by return module for encrypting to first business datum First terminal.
13. device according to claim 12, which is characterized in that the judgment module, comprising:
Searching unit, for being searched in the application list according to the information of the application program;
Judging unit, for judging whether the application program has access authority according to lookup result.
14. device according to claim 13, which is characterized in that the judgment module, further includes:
Receiving unit, for receiving the application list sent in advance by the first terminal, in described the application list Information comprising the application program with access authority;
Alternatively, download unit, is answered for downloading from a server first terminal by what user account used in local uploaded Use program listing.
15. device according to claim 12, which is characterized in that described device further include:
Second receiving module, the corresponding key of the application program sent for receiving the first terminal;
Memory module, for being stored to the corresponding key of the application program.
16. device according to claim 12, which is characterized in that described device further include:
Module is established, for establishing near-field communication NFC connection;
First receiving module receives the access request that first terminal is sent for the NFC connection by establishing.
17. device described in any one of 2 to 16 claims according to claim 1, which is characterized in that described device further include:
Third receiving module, for receive modified by the first terminal according to first business datum after obtain Two business datums;
Preserving module, for being saved to second business datum.
18. device according to claim 12, which is characterized in that the acquisition module, for being when the access request When the payment request of near field, the monetary value being locally stored is obtained;Alternatively, when the access request is identity information certification request When, obtain the identity information being locally stored.
19. a kind of terminal, which is characterized in that the terminal includes:
First sending module includes hair in the access request for sending the access request of near field business to wearable device The information of the application program of access is played, the information of the application program includes at least one of the following: application identities and Apply Names, By the wearable device according to the information of the application program, judge whether the application program has access authority, it is described Near field business includes near field payment transaction and access control system business, and has access authority in the application program, is obtained from local Corresponding first business datum of the access request is taken, first business datum is encrypted, by encrypted first industry Business data are back to the terminal;
Receiving module, encrypted first business datum returned for receiving the wearable device, after the encryption The first business datum and server finishing service.
20. terminal according to claim 19, which is characterized in that the terminal further include:
Third sending module, for including in described the application list to the wearable device sending application program listing The information of application program with access authority;
Alternatively, uploading module, for uploading the application list to server by user account used in local.
21. terminal according to claim 19, which is characterized in that the terminal further include:
4th sending module, for sending the corresponding key of the application program to the wearable device, by described wearable Equipment saves the key.
22. terminal according to claim 19, which is characterized in that the terminal further include:
Cipher authentication module verifies the password for obtaining the password of user's input;
First sending module is used to execute to wearable device when verification result is to be verified and send near field business The step of access request.
23. a kind of business processing device characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The access request for the near field business that first terminal is sent is received, includes the application program for initiating access in the access request Information, the information of the application program includes at least one of the following: that application identities and Apply Names, the near field business include Near field payment transaction and access control system business;
According to the information of the application program, judge whether the application program has access authority;
If the application program has access authority, corresponding first business datum of the access request is obtained from local;
First business datum is encrypted, encrypted first business datum is back to the first terminal.
24. a kind of terminal characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The access request of near field business is sent to wearable device, includes the application program for initiating access in the access request The information of information, the application program includes at least one of the following: application identities and Apply Names, by the wearable device root According to the information of the application program, judge whether the application program has access authority, the near field business includes near field branch Business and access control system business are paid, and there is access authority in the application program, it is corresponding from the local acquisition access request The first business datum, first business datum is encrypted, encrypted first business datum is back to the end End;
Encrypted first business datum that the wearable device returns is received, according to encrypted first business datum With server finishing service.
25. a kind of computer readable storage medium, which is characterized in that it is stored with program in the computer readable storage medium, Described program is loaded by processor and is executed to realize such as the described in any item method for processing business of claim 8 to 11.
CN201410835673.9A 2014-12-26 2014-12-26 Method for processing business, device and terminal Active CN104618330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410835673.9A CN104618330B (en) 2014-12-26 2014-12-26 Method for processing business, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410835673.9A CN104618330B (en) 2014-12-26 2014-12-26 Method for processing business, device and terminal

Publications (2)

Publication Number Publication Date
CN104618330A CN104618330A (en) 2015-05-13
CN104618330B true CN104618330B (en) 2018-12-25

Family

ID=53152606

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410835673.9A Active CN104618330B (en) 2014-12-26 2014-12-26 Method for processing business, device and terminal

Country Status (1)

Country Link
CN (1) CN104618330B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160145962A (en) * 2015-06-11 2016-12-21 에스케이플래닛 주식회사 User equipment for reverse NFC payment, NFC payment terminal, system comprising the same, control method thereof and computer readable medium having computer program recorded therefor
CN105636038B (en) * 2015-07-31 2019-03-08 宇龙计算机通信科技(深圳)有限公司 Information security management method, intelligent wearable device and the terminal of intelligent wearable device
CN105678553A (en) 2015-08-05 2016-06-15 腾讯科技(深圳)有限公司 Method, device and system for processing order information
WO2017024957A1 (en) * 2015-08-10 2017-02-16 阿里巴巴集团控股有限公司 Method and device for data processing
CN106470386A (en) * 2015-08-19 2017-03-01 中兴通讯股份有限公司 A kind of near-field communication data transmission method and device
CN105224855B (en) * 2015-08-31 2019-01-15 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN105426938A (en) * 2015-11-16 2016-03-23 珠海格力电器股份有限公司 Information acquisition method and device for air conditioners, mobile communication terminal and air conditioner server
CN105791282B (en) * 2016-02-29 2019-03-22 宇龙计算机通信科技(深圳)有限公司 A kind of method for protecting privacy, mobile terminal and wearable device
CN106790178B (en) * 2016-12-30 2019-10-25 网宿科技股份有限公司 Anti-intrusion authentication method, system and device
CN108021967B (en) * 2017-12-05 2022-08-26 北京小米移动软件有限公司 Method and device for copying intelligent card and computer readable storage medium
DE102018102608A1 (en) * 2018-02-06 2019-08-08 Endress+Hauser Conducta Gmbh+Co. Kg Method for user management of a field device
CN109361745A (en) * 2018-10-06 2019-02-19 朱晓鼎 A method of the network flow replacement based on cloud is locally stored
CN111553447B (en) * 2020-04-26 2023-05-02 重庆蓝数软件有限公司 Communication data conversion method and device and data processing terminal
CN111818368B (en) * 2020-07-06 2022-07-22 聚好看科技股份有限公司 Method for managing display device authority, mobile terminal and server
CN113127929B (en) * 2021-04-30 2024-03-01 天翼安全科技有限公司 Data desensitizing method, desensitizing rule processing method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455913A (en) * 2013-08-26 2013-12-18 天地融科技股份有限公司 NFC payment method, device, system and mobile terminal
WO2014003406A2 (en) * 2012-06-25 2014-01-03 주식회사 씽크풀 Nfc secure digital system, pair system constituting pair therewith, and method for providing same
CN103582169A (en) * 2012-08-10 2014-02-12 财团法人工业技术研究院 Multilayer network connection communication system, intelligent terminal device and communication method thereof
CN103793816A (en) * 2014-02-18 2014-05-14 中国联合网络通信集团有限公司 NFC equipment payment method and NFC equipment
CN103902882A (en) * 2014-03-18 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Terminal and method for protecting user information against leakage
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014003406A2 (en) * 2012-06-25 2014-01-03 주식회사 씽크풀 Nfc secure digital system, pair system constituting pair therewith, and method for providing same
CN103582169A (en) * 2012-08-10 2014-02-12 财团法人工业技术研究院 Multilayer network connection communication system, intelligent terminal device and communication method thereof
CN103455913A (en) * 2013-08-26 2013-12-18 天地融科技股份有限公司 NFC payment method, device, system and mobile terminal
CN103793816A (en) * 2014-02-18 2014-05-14 中国联合网络通信集团有限公司 NFC equipment payment method and NFC equipment
CN103902882A (en) * 2014-03-18 2014-07-02 宇龙计算机通信科技(深圳)有限公司 Terminal and method for protecting user information against leakage
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device

Also Published As

Publication number Publication date
CN104618330A (en) 2015-05-13

Similar Documents

Publication Publication Date Title
CN104618330B (en) Method for processing business, device and terminal
US10977642B2 (en) Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
CN109842605B (en) Card binding method and terminal
CN104243484B (en) Information interacting method and device, electronic equipment
CN104219058B (en) Authentication, identification authorization method and device
TWI496025B (en) Accessory and accessory interfacing system and interfacing method
CN109493488A (en) Smart card authentication method, smart lock, smart card, system and device
CN109146470A (en) Generate the method and device of payment code
CN106104601A (en) Virtual card Activiation method and device
CN106157025A (en) The mobile terminal safety method of payment of identity-based card and system
CN104933555B (en) Moade setting method and device
KR20120116902A (en) A personalized multifunctional access device possessing an individualized form of authenticating and controlling data exchange
CN105847243A (en) Method and device for accessing smart camera
CN101809977A (en) Updating mobile devices with additional elements
CN105868983A (en) Information output control method and device and intelligent terminal
CN104852911A (en) Safety verification method, device and system
FR2993382A1 (en) SECURE ELECTRONIC ENTITY FOR THE AUTHORIZATION OF A TRANSACTION
CN104093119B (en) unlocking method and device
CN114172544B (en) Method for copying smart card, electronic equipment and storage medium
CN105631254A (en) Unlocking method and unlocking device
CN104217328A (en) Multi-verification payment method and multi-verification payment device
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN108696361A (en) Configuration method, generation method and the device of smart card
CN104125267A (en) Account protection method, device and terminal equipment
CN104331672A (en) Method and device for performing confidential treatment on pictures upon bracelet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20191218

Address after: 200232 room 3813, floor 3, No. 2879, Longteng Avenue, Xuhui District, Shanghai

Patentee after: Shanghai Hongmi Information Technology Co., Ltd

Address before: 100085, Haidian District, Beijing Qinghe Street No. 68, Huarun colorful city shopping center two, 13 layers

Patentee before: Xiaomi Technology Co., Ltd.