CN110224713A - A kind of high security intelligence children wrist-watch and its safety protecting method - Google Patents
A kind of high security intelligence children wrist-watch and its safety protecting method Download PDFInfo
- Publication number
- CN110224713A CN110224713A CN201910507893.1A CN201910507893A CN110224713A CN 110224713 A CN110224713 A CN 110224713A CN 201910507893 A CN201910507893 A CN 201910507893A CN 110224713 A CN110224713 A CN 110224713A
- Authority
- CN
- China
- Prior art keywords
- watch
- wrist
- children
- server
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
- H04B1/385—Transceivers carried on the body, e.g. in helmets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
- H04B1/385—Transceivers carried on the body, e.g. in helmets
- H04B2001/3861—Transceivers carried on the body, e.g. in helmets carried in a hand or on fingers
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of safety protecting methods based on intelligent children's wrist-watch, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, when needing to read the relevant information of intelligent children's wrist-watch in the server from the background, needs to obtain from third-party authentication end and read permission;The id information in watch device is not recorded in the server, only records the corresponding signature timestamp and License Info of intelligent children's wrist-watch;The present invention is compared with prior art, pass through setting third-party authentication unit and ID setting unit, the family's long message and the elaborate position where children that children will not be obtained by client's attack because of server end, simultaneously, by way of receiving calls and authentication and timing is needed to disconnect SIM card communication acquisition communications records and analyze, hacker will not be allowed to eavesdrop and monitor under parent and the completely unwitting situation of child.
Description
Technical field
The present invention relates to information security field field more particularly to a kind of high security intelligence children wrist-watch and its safety are anti-
Maintaining method.
Background technique
For all information of child intelligence mobile phone in fact all on background server, each manufacturer increases network savvy in general wristwatch
Afterwards, the wrist-watch of parent's mobile phone and child is connected as hinge by background server.Since some manufacturers are to server
Attention degree is inadequate or even some manufacturers do not have oneself server, by one piece of the most key clothes of children's telephone wrist-watch
Business content is contracted out to other service providers, and safety leaves a question open.Hacker attacks server as node, the factory of server weakness
Quotient is then highly susceptible to control.Hacker can utilize the server of loophole inquiry smartwatch connection, so that it may view client's letter
Breath, and the geographical location of child, geographical coordinate, daily routines track and the ring of real time monitoring child are directly viewable according to corresponding ID
The privacy contents such as border recording.
For malevolent people, attack code is for professional and uncomplicated, and number of site is even all
Have issued for code.In reality, the phone number of parent is all binding with the children's telephone wrist-watch of oneself child.So
Hacker it is only necessary to know that parent cell-phone number, the ID number of children's telephone wrist-watch can be retrodicted out by this phone number.Each
The ID number of children's telephone wrist-watch is all uniquely, after obtaining id number, to directly input attacker, so that it may attack this children
The elaborate position of phone wrist-watch, phone wrist-watch under fire will soon be shown.
In addition, hacker not only can precisely grasp the location of wrist-watch using loophole, child can also be completely obtained
Daily track route.It means that the location information only grasped originally by parent, having because of the presence of security breaches can
It can be obtained by criminal.In addition to this, hacker can also monitor environment locating for children, eavesdrop the dialogue and surrounding of child
Sound.As long as hacker can be in parent and the completely unwitting feelings of child that is, wrist-watch is in normal operating condition
It is eavesdropped and is monitored under condition, be also equivalent to put a positioning tapping device at home.Hacker controls intelligent hand by program
Machine is transferred to, and the children's telephone wrist-watch attacked is constantly in black state, and without any sign, and this side connected can
To hear all sound of children's telephone wrist-watch this side.
Meanwhile the preschool child for being in the fast-developing stage recognizes all in superficial layer, more the things of surrounding
It does not understand how to protect oneself.Nowadays burning hot market and the image product occurred again and again have allowed this safeguard measure to lose
Crypticity, offender can abandon it or even child oneself by every means as long as having found child intelligence wrist-watch also can be because
Wrist-watch is removed for a variety of causes.In the prior art, in order to overcome the problems, such as this, when wearable device is in non-working condition
When, appearance and modeling, color, material etc. should follow crypticity principle;The dispersion limited attention of child is avoided in moulding, simultaneously
For not perfect for social recognition, lack the preschool child of awareness of safety, whether not allowing other people notice that child wears can
Wearable device.
Summary of the invention
The present invention is directed at least solve one of the technical problems existing in the prior art.For this purpose, the invention discloses one kind
Based on the safety protecting method of intelligent children's wrist-watch, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch,
When needing to read the relevant information of intelligent children's wrist-watch in the server from the background, need to obtain from third-party authentication end
Read weighting limit;The id information in watch device is not recorded in the server, only records the correspondence of intelligent children's wrist-watch
Signature timestamp and License Info.
Preferably, the third-party authentication end is home computer, includes in third-party authentication end and intelligent children's hand
The consistent cipher code generator of table, when needing to read the relevant information of intelligent children's wrist-watch in the server from the background,
By sending the signature key for permitting to generate with the cipher code generator to server, the signature is close at the third-party authentication end
Key association intelligent children's wrist-watch and the server shared authentication key, the server pass through in above-mentioned authentication secret
Timestamp information of signing carries out Authority Verification.
Preferably, the id information of intelligent children's wrist-watch is the information of dynamic change, and intelligence children's wrist-watch passes through
Cipher code generator, SIM card PIN code and timestamp generate dynamic I D information.
Preferably, intelligent children's wrist-watch after needing to verify biological information, then permits connecing when receiving communication request
Logical, the biological information includes: one of face information, fingerprint, vocal print, iris or a variety of combinations.
Preferably, for intelligent children's wrist-watch when screen puts out screen, the setting fixed cycle disconnects the connection of SIM card, described
Intelligent children's wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, if detecting, suspicious traffic is recorded
Then alert is to the server.
The invention also discloses a kind of intelligent children's wrist-watches of high security, comprising: smartwatch, server and third
Square verifying end;In server end, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, when needing to read from the background
When taking the relevant information of intelligent children's wrist-watch in the server, needs to obtain from third-party authentication end and read permission;
Wherein, the id information in watch device is not recorded in the server, only records the corresponding signature of intelligent children's wrist-watch
Timestamp and License Info.
Further, the third-party authentication end is home computer, includes in third-party authentication end and intelligent youngster
The virgin consistent cipher code generator of wrist-watch, when the relevant information for needing to read intelligent children's wrist-watch in the server from the background
When, the third-party authentication end is by sending the signature key for permitting to generate with the cipher code generator to server, the label
Intelligence children wrist-watch described in name cipher key associated and the server shared authentication key, the server pass through above-mentioned authentication secret
In signature timestamp information carry out Authority Verification.
Further, ID setup module, the id information of intelligence children's wrist-watch are the information of dynamic change, the intelligence
Energy children's wrist-watch generates dynamic I D information by cipher code generator, SIM card PIN code and timestamp.
Further, intelligent children's wrist-watch authentication module, intelligence children's wrist-watch are receiving communication request
When, after needing to verify biological information, then permit connecting, the biological information include: face information, fingerprint, vocal print, in iris
One or more combinations.
Further, anti-abduction module is communicated, for intelligence children's wrist-watch when screen puts out screen, the setting fixed cycle is disconnected
The connection of SIM card is opened, intelligence children's wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, if
Detect suspicious traffic record then alert to the server.
Compared with prior art, the present invention by setting third-party authentication unit and ID setting unit, it will not be because of service
The family's long message and the elaborate position where children that device end is obtained children by client's attack, meanwhile, pass through the needs that receive calls
Authentication and timing disconnect the mode that SIM card communication obtains communications records and analyzes, and hacker will not be allowed in parent and child
It is eavesdropped and is monitored in sub unwitting situation completely.
Detailed description of the invention
From following description with reference to the accompanying drawings it will be further appreciated that the present invention.Component in figure is not drawn necessarily to scale,
But it focuses on and shows in the principle of embodiment.In the figure in different views, identical appended drawing reference is specified to be corresponded to
Part.
Fig. 1 is a kind of flow chart of safety protecting method based on intelligent children's terminal of the invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.It needs to illustrate
, the detailed description illustrated in conjunction with attached drawing is intended as the description to various configurations, wherein can be real without being intended to indicate that
Trample unique configuration of concepts described herein.Installation practice and embodiment of the method documented by herein will be following detailed
It is described in thin description, and passes through various frames, module, unit, component, circuit, step, process, algorithm etc. in the accompanying drawings
(be referred to as " element ") is shown.These elements can be used electronic hardware, computer software or any combination thereof and come
It realizes.It is implemented as hardware or software as these elements, depending on specific application and the design being applied on total system
Constraint.If the term in description and claims of this specification and Figure of description uses " first ", " second " etc.
Description, this kind description is not use to describe a particular order for distinguishing different objects.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, the presence or addition of element, component and/or its set.It is also understood that the institute in this description of the invention
The term used is merely for the sake of being not intended to limit the present invention for the purpose of describing particular embodiments.Such as in description of the invention
With it is used in the attached claims like that, other situations unless the context is clearly specified, otherwise singular
" one ", "one" and "the" are intended to include plural form.It will be further appreciated that being wanted in description of the invention and appended right
Term "and/or" used in book is asked to refer to any combination and all possibility of one or more of associated item listed
Combination, and including these combinations.
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element
Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move
The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Embodiment one
A kind of safety protecting method based on intelligent children's terminal as shown in Figure 1, connects intelligent children's wrist-watch
Third-party authentication end is arranged in server, when the relevant information for needing to read intelligent children's wrist-watch in the server from the background
When, it needs to obtain from third-party authentication end and reads permission;The id information in watch device is not recorded in the server, is only recorded
The corresponding signature timestamp and License Info of intelligence children's wrist-watch.
Preferably, the third-party authentication end is home computer, includes in third-party authentication end and intelligent children's hand
The consistent cipher code generator of table, when needing to read the relevant information of intelligent children's wrist-watch in the server from the background,
By sending the signature key for permitting to generate with the cipher code generator to server, the signature is close at the third-party authentication end
Key association intelligent children's wrist-watch and the server shared authentication key, the server pass through in above-mentioned authentication secret
Timestamp information of signing carries out Authority Verification.
Preferably, the id information of intelligent children's wrist-watch is the information of dynamic change, and intelligence children's wrist-watch passes through
Cipher code generator, SIM card PIN code and timestamp generate dynamic I D information.
Preferably, intelligent children's wrist-watch after needing to verify biological information, then permits connecing when receiving communication request
Logical, the biological information includes: one of face information, fingerprint, vocal print, iris or a variety of combinations.
Preferably, for intelligent children's wrist-watch when screen puts out screen, the setting fixed cycle disconnects the connection of SIM card, described
Intelligent children's wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, if detecting, suspicious traffic is recorded
Then alert is to the server.
The invention also discloses a kind of intelligent children's wrist-watches of high security, comprising: smartwatch, server and third
Square verifying end;In server end, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, when needing to read from the background
When taking the relevant information of intelligent children's wrist-watch in the server, needs to obtain from third-party authentication end and read permission;
Wherein, the id information in watch device is not recorded in the server, only records the corresponding signature of intelligent children's wrist-watch
Timestamp and License Info.
Further, the third-party authentication end is home computer, includes in third-party authentication end and intelligent youngster
The virgin consistent cipher code generator of wrist-watch, when the relevant information for needing to read intelligent children's wrist-watch in the server from the background
When, the third-party authentication end is by sending the signature key for permitting to generate with the cipher code generator to server, the label
Intelligence children wrist-watch described in name cipher key associated and the server shared authentication key, the server pass through above-mentioned authentication secret
In signature timestamp information carry out Authority Verification.
Further, ID setup module, the id information of intelligence children's wrist-watch are the information of dynamic change, the intelligence
Energy children's wrist-watch generates dynamic I D information by cipher code generator, SIM card PIN code and timestamp.
Further, intelligent children's wrist-watch authentication module, intelligence children's wrist-watch are receiving communication request
When, after needing to verify biological information, then permit connecting, the biological information include: face information, fingerprint, vocal print, in iris
One or more combinations.
Further, anti-abduction module is communicated, for intelligence children's wrist-watch when screen puts out screen, the setting fixed cycle is disconnected
The connection of SIM card is opened, intelligence children's wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, if
Detect suspicious traffic record then alert to the server.
Intelligent children's wrist-watch is not limited to the wrist watch shape intelligent terminal of child carrying, further includes other just
Formula child intelligence communication device, such as mobile phone, intelligent glasses etc. are taken, these equivalence changes and modification equally fall into right of the present invention
It is required that limited range.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from
In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and
It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention
It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading
After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and
Modification equally falls into the scope of the claims in the present invention.
Claims (10)
1. a kind of safety protecting method based on intelligent children's wrist-watch, which is characterized in that the clothes connected to intelligent children's wrist-watch
Third-party authentication end is arranged in business device, when the relevant information for needing to read intelligent children's wrist-watch in the server from the background
When, it needs to obtain from third-party authentication end and reads permission;The id information in watch device is not recorded in the server, is only recorded
The corresponding signature timestamp and License Info of intelligence children's wrist-watch.
2. a kind of safety protecting method based on intelligent children's wrist-watch as described in claim 1, which is characterized in that the third
Square verifying end is home computer, include in third-party authentication end with the consistent cipher code generator of intelligent children's wrist-watch, when after
When platform needs to read the relevant information of intelligent children's wrist-watch in the server, the third-party authentication end passes through transmission
The signature key that license and the cipher code generator generate to server, the signature key association intelligent children's wrist-watch and
The server shared authentication key, the server carry out permission by the signature timestamp information in above-mentioned authentication secret and test
Card.
3. a kind of safety protecting method based on intelligent children's wrist-watch as described in claim 1, which is characterized in that the intelligence
The id information of children's wrist-watch is the information of dynamic change, intelligence children's wrist-watch by cipher code generator, SIM card PIN code and
Timestamp generates dynamic I D information.
4. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 3, which is characterized in that the intelligence
Children's wrist-watch is when receiving communication request, after needing to verify biological information, then permits connecting, the biological information includes: people
One of face information, fingerprint, vocal print, iris or a variety of combinations.
5. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 4, which is characterized in that the intelligence
For children's wrist-watch when screen puts out screen, the setting fixed cycle disconnects the connection of SIM card, and intelligence children's wrist-watch disconnects SIM card
During inquire the log of intelligent children's wrist-watch, alert is to the service if detecting suspicious traffic record
Device.
6. a kind of intelligent children's wrist-watch of high security characterized by comprising smartwatch, server and third-party authentication
End;In server end, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, when backstage needs described in reading
When the relevant information of intelligent children's wrist-watch in server, needs to obtain from third-party authentication end and read permission;Wherein, institute
State the id information not recorded in watch device in server, only record intelligent children's wrist-watch corresponding signature timestamp and
License Info.
7. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 6, which is characterized in that the third
Square verifying end is home computer, include in third-party authentication end with the consistent cipher code generator of intelligent children's wrist-watch, when after
When platform needs to read the relevant information of intelligent children's wrist-watch in the server, the third-party authentication end passes through transmission
The signature key that license and the cipher code generator generate to server, the signature key association intelligent children's wrist-watch and
The server shared authentication key, the server carry out permission by the signature timestamp information in above-mentioned authentication secret and test
Card.
8. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 7, which is characterized in that mould is arranged in ID
The id information of block, intelligence children's wrist-watch is the information of dynamic change, and intelligence children's wrist-watch passes through cipher code generator,
SIM card PIN code and timestamp generate dynamic I D information.
9. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 8, which is characterized in that intelligent children
Wrist-watch authentication module, intelligence children's wrist-watch after needing to verify biological information, then are permitted when receiving communication request
It connects, the biological information includes: one of face information, fingerprint, vocal print, iris or a variety of combinations.
10. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 9, which is characterized in that communication is anti-
Module is kidnapped, for intelligence children's wrist-watch when screen puts out screen, the setting fixed cycle disconnects the connection of SIM card, the intelligence youngster
Virgin wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, issues if detecting suspicious traffic record
Warning message is to the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910507893.1A CN110224713B (en) | 2019-06-12 | 2019-06-12 | Safety protection method and system based on high-safety intelligent child watch |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910507893.1A CN110224713B (en) | 2019-06-12 | 2019-06-12 | Safety protection method and system based on high-safety intelligent child watch |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110224713A true CN110224713A (en) | 2019-09-10 |
CN110224713B CN110224713B (en) | 2020-09-15 |
Family
ID=67816763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910507893.1A Active CN110224713B (en) | 2019-06-12 | 2019-06-12 | Safety protection method and system based on high-safety intelligent child watch |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110224713B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022845A (en) * | 2022-06-15 | 2022-09-06 | 中国联合网络通信集团有限公司 | User contact person identification method, operator platform, device and system |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104769602A (en) * | 2012-09-06 | 2015-07-08 | Visa欧洲有限公司 | Method and system for verifying an access request |
CN104757937A (en) * | 2015-03-25 | 2015-07-08 | 北京良舟通讯科技有限公司 | Wearable device and method for old-age affection care and remote health care nursing |
CN105007302A (en) * | 2015-06-04 | 2015-10-28 | 成都果豆数字娱乐有限公司 | Mobile terminal data storage method |
CN105323245A (en) * | 2015-09-29 | 2016-02-10 | 北京元心科技有限公司 | Intelligent terminal, authorization method and system thereof |
CN105656627A (en) * | 2014-11-10 | 2016-06-08 | 腾讯数码(天津)有限公司 | Identity verification method, device and system |
CN105871867A (en) * | 2016-04-27 | 2016-08-17 | 腾讯科技(深圳)有限公司 | Identity authentication method, system and equipment |
CN106506168A (en) * | 2016-12-07 | 2017-03-15 | 北京信任度科技有限公司 | A kind of safe method based on biological characteristic long-distance identity-certifying |
CN106878233A (en) * | 2015-12-10 | 2017-06-20 | 联芯科技有限公司 | The read method of secure data, security server, terminal and system |
CN107770275A (en) * | 2017-10-25 | 2018-03-06 | 成都猴子软件有限公司 | Intelligent bracelet data safe processing system |
CN108881471A (en) * | 2018-07-09 | 2018-11-23 | 北京信息科技大学 | A kind of the whole network based on alliance uniformly trusts anchor system and construction method |
CN108875411A (en) * | 2018-07-11 | 2018-11-23 | 成都理工大学 | The storage of Intelligent bracelet data and sharing method based on block chain |
US20180359093A1 (en) * | 2015-02-17 | 2018-12-13 | Visa International Service Association | Secure authentication of user and mobile device |
CN109273086A (en) * | 2018-07-02 | 2019-01-25 | 北京市天元网络技术股份有限公司 | User health data management system and method |
US20190074972A1 (en) * | 2015-10-23 | 2019-03-07 | Oracle International Corporation | Password-less authentication for access management |
CN109714760A (en) * | 2019-01-18 | 2019-05-03 | 浙江科技学院 | A kind of right access control method suitable for smart machine under direct-connected communication environment |
CN109815731A (en) * | 2018-12-29 | 2019-05-28 | 深圳云天励飞技术有限公司 | Permission processing method and relevant device |
-
2019
- 2019-06-12 CN CN201910507893.1A patent/CN110224713B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104769602A (en) * | 2012-09-06 | 2015-07-08 | Visa欧洲有限公司 | Method and system for verifying an access request |
CN105656627A (en) * | 2014-11-10 | 2016-06-08 | 腾讯数码(天津)有限公司 | Identity verification method, device and system |
US20180359093A1 (en) * | 2015-02-17 | 2018-12-13 | Visa International Service Association | Secure authentication of user and mobile device |
CN104757937A (en) * | 2015-03-25 | 2015-07-08 | 北京良舟通讯科技有限公司 | Wearable device and method for old-age affection care and remote health care nursing |
CN105007302A (en) * | 2015-06-04 | 2015-10-28 | 成都果豆数字娱乐有限公司 | Mobile terminal data storage method |
CN105323245A (en) * | 2015-09-29 | 2016-02-10 | 北京元心科技有限公司 | Intelligent terminal, authorization method and system thereof |
US20190074972A1 (en) * | 2015-10-23 | 2019-03-07 | Oracle International Corporation | Password-less authentication for access management |
CN106878233A (en) * | 2015-12-10 | 2017-06-20 | 联芯科技有限公司 | The read method of secure data, security server, terminal and system |
CN105871867A (en) * | 2016-04-27 | 2016-08-17 | 腾讯科技(深圳)有限公司 | Identity authentication method, system and equipment |
CN106506168A (en) * | 2016-12-07 | 2017-03-15 | 北京信任度科技有限公司 | A kind of safe method based on biological characteristic long-distance identity-certifying |
CN107770275A (en) * | 2017-10-25 | 2018-03-06 | 成都猴子软件有限公司 | Intelligent bracelet data safe processing system |
CN109273086A (en) * | 2018-07-02 | 2019-01-25 | 北京市天元网络技术股份有限公司 | User health data management system and method |
CN108881471A (en) * | 2018-07-09 | 2018-11-23 | 北京信息科技大学 | A kind of the whole network based on alliance uniformly trusts anchor system and construction method |
CN108875411A (en) * | 2018-07-11 | 2018-11-23 | 成都理工大学 | The storage of Intelligent bracelet data and sharing method based on block chain |
CN109815731A (en) * | 2018-12-29 | 2019-05-28 | 深圳云天励飞技术有限公司 | Permission processing method and relevant device |
CN109714760A (en) * | 2019-01-18 | 2019-05-03 | 浙江科技学院 | A kind of right access control method suitable for smart machine under direct-connected communication environment |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022845A (en) * | 2022-06-15 | 2022-09-06 | 中国联合网络通信集团有限公司 | User contact person identification method, operator platform, device and system |
CN115022845B (en) * | 2022-06-15 | 2023-07-07 | 中国联合网络通信集团有限公司 | User contact person identification method, operator platform, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN110224713B (en) | 2020-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109729180B (en) | Whole system intelligent community platform | |
Shi et al. | Implicit authentication through learning user behavior | |
Rao et al. | The InfoSec handbook: An introduction to information security | |
Blythe et al. | A systematic review of crime facilitated by the consumer Internet of Things | |
EP2657880A1 (en) | Systems and methods for combined physical and cyber data security | |
Andress | Foundations of information security: a straightforward introduction | |
CN111355732B (en) | Link detection method and device, electronic equipment and storage medium | |
Nayak et al. | The InfoSec handbook: An introduction to information security | |
Haynes et al. | A framework for preventing the exploitation of IoT smart toys for reconnaissance and exfiltration | |
Kumar et al. | From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges | |
CN107169368A (en) | A kind of computer system ensured information security | |
CN106648583A (en) | Information processing method and terminal | |
CN112543184A (en) | Block chain-based equipment authentication activation method | |
CN110224713A (en) | A kind of high security intelligence children wrist-watch and its safety protecting method | |
Stajano | Security issues in ubiquitous computing | |
CN108694329A (en) | A kind of mobile intelligent terminal security incident based on software and hardware combining is credible record system and method | |
CN113747425B (en) | RFID label anonymous authentication and key agreement method based on smart city security system | |
Tayag et al. | IoT security: penetration testing of white-label cloud-based IoT camera compromising personal data privacy | |
Sharifi et al. | Security Attacks and Solutions on Ubiquitous Computing Network | |
Haines | Seven deadliest wireless technologies attacks | |
CN105897768B (en) | User and Intelligent hardware correlating method and device, disassociation method and device | |
CN109150865A (en) | A kind of protection, device and the storage medium of mobile terminal APP communications protocol | |
CN109117618A (en) | A kind of secure log control method, apparatus and system | |
CN108449753A (en) | A kind of method that cell phone apparatus reads the data in trusted computation environment | |
Tang | Network and Information Security Characters and Threats |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |