CN110224713A - A kind of high security intelligence children wrist-watch and its safety protecting method - Google Patents

A kind of high security intelligence children wrist-watch and its safety protecting method Download PDF

Info

Publication number
CN110224713A
CN110224713A CN201910507893.1A CN201910507893A CN110224713A CN 110224713 A CN110224713 A CN 110224713A CN 201910507893 A CN201910507893 A CN 201910507893A CN 110224713 A CN110224713 A CN 110224713A
Authority
CN
China
Prior art keywords
watch
wrist
children
server
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910507893.1A
Other languages
Chinese (zh)
Other versions
CN110224713B (en
Inventor
秦曙光
陈家峰
季英会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Readboy Education Technology Co Ltd
Original Assignee
Readboy Education Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Readboy Education Technology Co Ltd filed Critical Readboy Education Technology Co Ltd
Priority to CN201910507893.1A priority Critical patent/CN110224713B/en
Publication of CN110224713A publication Critical patent/CN110224713A/en
Application granted granted Critical
Publication of CN110224713B publication Critical patent/CN110224713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/385Transceivers carried on the body, e.g. in helmets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/385Transceivers carried on the body, e.g. in helmets
    • H04B2001/3861Transceivers carried on the body, e.g. in helmets carried in a hand or on fingers

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of safety protecting methods based on intelligent children's wrist-watch, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, when needing to read the relevant information of intelligent children's wrist-watch in the server from the background, needs to obtain from third-party authentication end and read permission;The id information in watch device is not recorded in the server, only records the corresponding signature timestamp and License Info of intelligent children's wrist-watch;The present invention is compared with prior art, pass through setting third-party authentication unit and ID setting unit, the family's long message and the elaborate position where children that children will not be obtained by client's attack because of server end, simultaneously, by way of receiving calls and authentication and timing is needed to disconnect SIM card communication acquisition communications records and analyze, hacker will not be allowed to eavesdrop and monitor under parent and the completely unwitting situation of child.

Description

A kind of high security intelligence children wrist-watch and its safety protecting method
Technical field
The present invention relates to information security field field more particularly to a kind of high security intelligence children wrist-watch and its safety are anti- Maintaining method.
Background technique
For all information of child intelligence mobile phone in fact all on background server, each manufacturer increases network savvy in general wristwatch Afterwards, the wrist-watch of parent's mobile phone and child is connected as hinge by background server.Since some manufacturers are to server Attention degree is inadequate or even some manufacturers do not have oneself server, by one piece of the most key clothes of children's telephone wrist-watch Business content is contracted out to other service providers, and safety leaves a question open.Hacker attacks server as node, the factory of server weakness Quotient is then highly susceptible to control.Hacker can utilize the server of loophole inquiry smartwatch connection, so that it may view client's letter Breath, and the geographical location of child, geographical coordinate, daily routines track and the ring of real time monitoring child are directly viewable according to corresponding ID The privacy contents such as border recording.
For malevolent people, attack code is for professional and uncomplicated, and number of site is even all Have issued for code.In reality, the phone number of parent is all binding with the children's telephone wrist-watch of oneself child.So Hacker it is only necessary to know that parent cell-phone number, the ID number of children's telephone wrist-watch can be retrodicted out by this phone number.Each The ID number of children's telephone wrist-watch is all uniquely, after obtaining id number, to directly input attacker, so that it may attack this children The elaborate position of phone wrist-watch, phone wrist-watch under fire will soon be shown.
In addition, hacker not only can precisely grasp the location of wrist-watch using loophole, child can also be completely obtained Daily track route.It means that the location information only grasped originally by parent, having because of the presence of security breaches can It can be obtained by criminal.In addition to this, hacker can also monitor environment locating for children, eavesdrop the dialogue and surrounding of child Sound.As long as hacker can be in parent and the completely unwitting feelings of child that is, wrist-watch is in normal operating condition It is eavesdropped and is monitored under condition, be also equivalent to put a positioning tapping device at home.Hacker controls intelligent hand by program Machine is transferred to, and the children's telephone wrist-watch attacked is constantly in black state, and without any sign, and this side connected can To hear all sound of children's telephone wrist-watch this side.
Meanwhile the preschool child for being in the fast-developing stage recognizes all in superficial layer, more the things of surrounding It does not understand how to protect oneself.Nowadays burning hot market and the image product occurred again and again have allowed this safeguard measure to lose Crypticity, offender can abandon it or even child oneself by every means as long as having found child intelligence wrist-watch also can be because Wrist-watch is removed for a variety of causes.In the prior art, in order to overcome the problems, such as this, when wearable device is in non-working condition When, appearance and modeling, color, material etc. should follow crypticity principle;The dispersion limited attention of child is avoided in moulding, simultaneously For not perfect for social recognition, lack the preschool child of awareness of safety, whether not allowing other people notice that child wears can Wearable device.
Summary of the invention
The present invention is directed at least solve one of the technical problems existing in the prior art.For this purpose, the invention discloses one kind Based on the safety protecting method of intelligent children's wrist-watch, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, When needing to read the relevant information of intelligent children's wrist-watch in the server from the background, need to obtain from third-party authentication end Read weighting limit;The id information in watch device is not recorded in the server, only records the correspondence of intelligent children's wrist-watch Signature timestamp and License Info.
Preferably, the third-party authentication end is home computer, includes in third-party authentication end and intelligent children's hand The consistent cipher code generator of table, when needing to read the relevant information of intelligent children's wrist-watch in the server from the background, By sending the signature key for permitting to generate with the cipher code generator to server, the signature is close at the third-party authentication end Key association intelligent children's wrist-watch and the server shared authentication key, the server pass through in above-mentioned authentication secret Timestamp information of signing carries out Authority Verification.
Preferably, the id information of intelligent children's wrist-watch is the information of dynamic change, and intelligence children's wrist-watch passes through Cipher code generator, SIM card PIN code and timestamp generate dynamic I D information.
Preferably, intelligent children's wrist-watch after needing to verify biological information, then permits connecing when receiving communication request Logical, the biological information includes: one of face information, fingerprint, vocal print, iris or a variety of combinations.
Preferably, for intelligent children's wrist-watch when screen puts out screen, the setting fixed cycle disconnects the connection of SIM card, described Intelligent children's wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, if detecting, suspicious traffic is recorded Then alert is to the server.
The invention also discloses a kind of intelligent children's wrist-watches of high security, comprising: smartwatch, server and third Square verifying end;In server end, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, when needing to read from the background When taking the relevant information of intelligent children's wrist-watch in the server, needs to obtain from third-party authentication end and read permission; Wherein, the id information in watch device is not recorded in the server, only records the corresponding signature of intelligent children's wrist-watch Timestamp and License Info.
Further, the third-party authentication end is home computer, includes in third-party authentication end and intelligent youngster The virgin consistent cipher code generator of wrist-watch, when the relevant information for needing to read intelligent children's wrist-watch in the server from the background When, the third-party authentication end is by sending the signature key for permitting to generate with the cipher code generator to server, the label Intelligence children wrist-watch described in name cipher key associated and the server shared authentication key, the server pass through above-mentioned authentication secret In signature timestamp information carry out Authority Verification.
Further, ID setup module, the id information of intelligence children's wrist-watch are the information of dynamic change, the intelligence Energy children's wrist-watch generates dynamic I D information by cipher code generator, SIM card PIN code and timestamp.
Further, intelligent children's wrist-watch authentication module, intelligence children's wrist-watch are receiving communication request When, after needing to verify biological information, then permit connecting, the biological information include: face information, fingerprint, vocal print, in iris One or more combinations.
Further, anti-abduction module is communicated, for intelligence children's wrist-watch when screen puts out screen, the setting fixed cycle is disconnected The connection of SIM card is opened, intelligence children's wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, if Detect suspicious traffic record then alert to the server.
Compared with prior art, the present invention by setting third-party authentication unit and ID setting unit, it will not be because of service The family's long message and the elaborate position where children that device end is obtained children by client's attack, meanwhile, pass through the needs that receive calls Authentication and timing disconnect the mode that SIM card communication obtains communications records and analyzes, and hacker will not be allowed in parent and child It is eavesdropped and is monitored in sub unwitting situation completely.
Detailed description of the invention
From following description with reference to the accompanying drawings it will be further appreciated that the present invention.Component in figure is not drawn necessarily to scale, But it focuses on and shows in the principle of embodiment.In the figure in different views, identical appended drawing reference is specified to be corresponded to Part.
Fig. 1 is a kind of flow chart of safety protecting method based on intelligent children's terminal of the invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.It needs to illustrate , the detailed description illustrated in conjunction with attached drawing is intended as the description to various configurations, wherein can be real without being intended to indicate that Trample unique configuration of concepts described herein.Installation practice and embodiment of the method documented by herein will be following detailed It is described in thin description, and passes through various frames, module, unit, component, circuit, step, process, algorithm etc. in the accompanying drawings (be referred to as " element ") is shown.These elements can be used electronic hardware, computer software or any combination thereof and come It realizes.It is implemented as hardware or software as these elements, depending on specific application and the design being applied on total system Constraint.If the term in description and claims of this specification and Figure of description uses " first ", " second " etc. Description, this kind description is not use to describe a particular order for distinguishing different objects.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, the presence or addition of element, component and/or its set.It is also understood that the institute in this description of the invention The term used is merely for the sake of being not intended to limit the present invention for the purpose of describing particular embodiments.Such as in description of the invention With it is used in the attached claims like that, other situations unless the context is clearly specified, otherwise singular " one ", "one" and "the" are intended to include plural form.It will be further appreciated that being wanted in description of the invention and appended right Term "and/or" used in book is asked to refer to any combination and all possibility of one or more of associated item listed Combination, and including these combinations.
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Embodiment one
A kind of safety protecting method based on intelligent children's terminal as shown in Figure 1, connects intelligent children's wrist-watch Third-party authentication end is arranged in server, when the relevant information for needing to read intelligent children's wrist-watch in the server from the background When, it needs to obtain from third-party authentication end and reads permission;The id information in watch device is not recorded in the server, is only recorded The corresponding signature timestamp and License Info of intelligence children's wrist-watch.
Preferably, the third-party authentication end is home computer, includes in third-party authentication end and intelligent children's hand The consistent cipher code generator of table, when needing to read the relevant information of intelligent children's wrist-watch in the server from the background, By sending the signature key for permitting to generate with the cipher code generator to server, the signature is close at the third-party authentication end Key association intelligent children's wrist-watch and the server shared authentication key, the server pass through in above-mentioned authentication secret Timestamp information of signing carries out Authority Verification.
Preferably, the id information of intelligent children's wrist-watch is the information of dynamic change, and intelligence children's wrist-watch passes through Cipher code generator, SIM card PIN code and timestamp generate dynamic I D information.
Preferably, intelligent children's wrist-watch after needing to verify biological information, then permits connecing when receiving communication request Logical, the biological information includes: one of face information, fingerprint, vocal print, iris or a variety of combinations.
Preferably, for intelligent children's wrist-watch when screen puts out screen, the setting fixed cycle disconnects the connection of SIM card, described Intelligent children's wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, if detecting, suspicious traffic is recorded Then alert is to the server.
The invention also discloses a kind of intelligent children's wrist-watches of high security, comprising: smartwatch, server and third Square verifying end;In server end, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, when needing to read from the background When taking the relevant information of intelligent children's wrist-watch in the server, needs to obtain from third-party authentication end and read permission; Wherein, the id information in watch device is not recorded in the server, only records the corresponding signature of intelligent children's wrist-watch Timestamp and License Info.
Further, the third-party authentication end is home computer, includes in third-party authentication end and intelligent youngster The virgin consistent cipher code generator of wrist-watch, when the relevant information for needing to read intelligent children's wrist-watch in the server from the background When, the third-party authentication end is by sending the signature key for permitting to generate with the cipher code generator to server, the label Intelligence children wrist-watch described in name cipher key associated and the server shared authentication key, the server pass through above-mentioned authentication secret In signature timestamp information carry out Authority Verification.
Further, ID setup module, the id information of intelligence children's wrist-watch are the information of dynamic change, the intelligence Energy children's wrist-watch generates dynamic I D information by cipher code generator, SIM card PIN code and timestamp.
Further, intelligent children's wrist-watch authentication module, intelligence children's wrist-watch are receiving communication request When, after needing to verify biological information, then permit connecting, the biological information include: face information, fingerprint, vocal print, in iris One or more combinations.
Further, anti-abduction module is communicated, for intelligence children's wrist-watch when screen puts out screen, the setting fixed cycle is disconnected The connection of SIM card is opened, intelligence children's wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, if Detect suspicious traffic record then alert to the server.
Intelligent children's wrist-watch is not limited to the wrist watch shape intelligent terminal of child carrying, further includes other just Formula child intelligence communication device, such as mobile phone, intelligent glasses etc. are taken, these equivalence changes and modification equally fall into right of the present invention It is required that limited range.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
Although describing the present invention by reference to various embodiments above, but it is to be understood that of the invention not departing from In the case where range, many changes and modifications can be carried out.Therefore, be intended to foregoing detailed description be considered as it is illustrative and It is unrestricted, and it is to be understood that following following claims (including all equivalents) is intended to limit spirit and model of the invention It encloses.The above embodiment is interpreted as being merely to illustrate the present invention rather than limit the scope of the invention.It is reading After the content of record of the invention, technical staff can be made various changes or modifications the present invention, these equivalence changes and Modification equally falls into the scope of the claims in the present invention.

Claims (10)

1. a kind of safety protecting method based on intelligent children's wrist-watch, which is characterized in that the clothes connected to intelligent children's wrist-watch Third-party authentication end is arranged in business device, when the relevant information for needing to read intelligent children's wrist-watch in the server from the background When, it needs to obtain from third-party authentication end and reads permission;The id information in watch device is not recorded in the server, is only recorded The corresponding signature timestamp and License Info of intelligence children's wrist-watch.
2. a kind of safety protecting method based on intelligent children's wrist-watch as described in claim 1, which is characterized in that the third Square verifying end is home computer, include in third-party authentication end with the consistent cipher code generator of intelligent children's wrist-watch, when after When platform needs to read the relevant information of intelligent children's wrist-watch in the server, the third-party authentication end passes through transmission The signature key that license and the cipher code generator generate to server, the signature key association intelligent children's wrist-watch and The server shared authentication key, the server carry out permission by the signature timestamp information in above-mentioned authentication secret and test Card.
3. a kind of safety protecting method based on intelligent children's wrist-watch as described in claim 1, which is characterized in that the intelligence The id information of children's wrist-watch is the information of dynamic change, intelligence children's wrist-watch by cipher code generator, SIM card PIN code and Timestamp generates dynamic I D information.
4. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 3, which is characterized in that the intelligence Children's wrist-watch is when receiving communication request, after needing to verify biological information, then permits connecting, the biological information includes: people One of face information, fingerprint, vocal print, iris or a variety of combinations.
5. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 4, which is characterized in that the intelligence For children's wrist-watch when screen puts out screen, the setting fixed cycle disconnects the connection of SIM card, and intelligence children's wrist-watch disconnects SIM card During inquire the log of intelligent children's wrist-watch, alert is to the service if detecting suspicious traffic record Device.
6. a kind of intelligent children's wrist-watch of high security characterized by comprising smartwatch, server and third-party authentication End;In server end, third-party authentication end is arranged in the server connected to intelligent children's wrist-watch, when backstage needs described in reading When the relevant information of intelligent children's wrist-watch in server, needs to obtain from third-party authentication end and read permission;Wherein, institute State the id information not recorded in watch device in server, only record intelligent children's wrist-watch corresponding signature timestamp and License Info.
7. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 6, which is characterized in that the third Square verifying end is home computer, include in third-party authentication end with the consistent cipher code generator of intelligent children's wrist-watch, when after When platform needs to read the relevant information of intelligent children's wrist-watch in the server, the third-party authentication end passes through transmission The signature key that license and the cipher code generator generate to server, the signature key association intelligent children's wrist-watch and The server shared authentication key, the server carry out permission by the signature timestamp information in above-mentioned authentication secret and test Card.
8. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 7, which is characterized in that mould is arranged in ID The id information of block, intelligence children's wrist-watch is the information of dynamic change, and intelligence children's wrist-watch passes through cipher code generator, SIM card PIN code and timestamp generate dynamic I D information.
9. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 8, which is characterized in that intelligent children Wrist-watch authentication module, intelligence children's wrist-watch after needing to verify biological information, then are permitted when receiving communication request It connects, the biological information includes: one of face information, fingerprint, vocal print, iris or a variety of combinations.
10. a kind of safety protecting method based on intelligent children's wrist-watch as claimed in claim 9, which is characterized in that communication is anti- Module is kidnapped, for intelligence children's wrist-watch when screen puts out screen, the setting fixed cycle disconnects the connection of SIM card, the intelligence youngster Virgin wrist-watch inquires the log of intelligent children's wrist-watch during disconnecting SIM card, issues if detecting suspicious traffic record Warning message is to the server.
CN201910507893.1A 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch Active CN110224713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910507893.1A CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910507893.1A CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Publications (2)

Publication Number Publication Date
CN110224713A true CN110224713A (en) 2019-09-10
CN110224713B CN110224713B (en) 2020-09-15

Family

ID=67816763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910507893.1A Active CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Country Status (1)

Country Link
CN (1) CN110224713B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022845A (en) * 2022-06-15 2022-09-06 中国联合网络通信集团有限公司 User contact person identification method, operator platform, device and system

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104769602A (en) * 2012-09-06 2015-07-08 Visa欧洲有限公司 Method and system for verifying an access request
CN104757937A (en) * 2015-03-25 2015-07-08 北京良舟通讯科技有限公司 Wearable device and method for old-age affection care and remote health care nursing
CN105007302A (en) * 2015-06-04 2015-10-28 成都果豆数字娱乐有限公司 Mobile terminal data storage method
CN105323245A (en) * 2015-09-29 2016-02-10 北京元心科技有限公司 Intelligent terminal, authorization method and system thereof
CN105656627A (en) * 2014-11-10 2016-06-08 腾讯数码(天津)有限公司 Identity verification method, device and system
CN105871867A (en) * 2016-04-27 2016-08-17 腾讯科技(深圳)有限公司 Identity authentication method, system and equipment
CN106506168A (en) * 2016-12-07 2017-03-15 北京信任度科技有限公司 A kind of safe method based on biological characteristic long-distance identity-certifying
CN106878233A (en) * 2015-12-10 2017-06-20 联芯科技有限公司 The read method of secure data, security server, terminal and system
CN107770275A (en) * 2017-10-25 2018-03-06 成都猴子软件有限公司 Intelligent bracelet data safe processing system
CN108881471A (en) * 2018-07-09 2018-11-23 北京信息科技大学 A kind of the whole network based on alliance uniformly trusts anchor system and construction method
CN108875411A (en) * 2018-07-11 2018-11-23 成都理工大学 The storage of Intelligent bracelet data and sharing method based on block chain
US20180359093A1 (en) * 2015-02-17 2018-12-13 Visa International Service Association Secure authentication of user and mobile device
CN109273086A (en) * 2018-07-02 2019-01-25 北京市天元网络技术股份有限公司 User health data management system and method
US20190074972A1 (en) * 2015-10-23 2019-03-07 Oracle International Corporation Password-less authentication for access management
CN109714760A (en) * 2019-01-18 2019-05-03 浙江科技学院 A kind of right access control method suitable for smart machine under direct-connected communication environment
CN109815731A (en) * 2018-12-29 2019-05-28 深圳云天励飞技术有限公司 Permission processing method and relevant device

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104769602A (en) * 2012-09-06 2015-07-08 Visa欧洲有限公司 Method and system for verifying an access request
CN105656627A (en) * 2014-11-10 2016-06-08 腾讯数码(天津)有限公司 Identity verification method, device and system
US20180359093A1 (en) * 2015-02-17 2018-12-13 Visa International Service Association Secure authentication of user and mobile device
CN104757937A (en) * 2015-03-25 2015-07-08 北京良舟通讯科技有限公司 Wearable device and method for old-age affection care and remote health care nursing
CN105007302A (en) * 2015-06-04 2015-10-28 成都果豆数字娱乐有限公司 Mobile terminal data storage method
CN105323245A (en) * 2015-09-29 2016-02-10 北京元心科技有限公司 Intelligent terminal, authorization method and system thereof
US20190074972A1 (en) * 2015-10-23 2019-03-07 Oracle International Corporation Password-less authentication for access management
CN106878233A (en) * 2015-12-10 2017-06-20 联芯科技有限公司 The read method of secure data, security server, terminal and system
CN105871867A (en) * 2016-04-27 2016-08-17 腾讯科技(深圳)有限公司 Identity authentication method, system and equipment
CN106506168A (en) * 2016-12-07 2017-03-15 北京信任度科技有限公司 A kind of safe method based on biological characteristic long-distance identity-certifying
CN107770275A (en) * 2017-10-25 2018-03-06 成都猴子软件有限公司 Intelligent bracelet data safe processing system
CN109273086A (en) * 2018-07-02 2019-01-25 北京市天元网络技术股份有限公司 User health data management system and method
CN108881471A (en) * 2018-07-09 2018-11-23 北京信息科技大学 A kind of the whole network based on alliance uniformly trusts anchor system and construction method
CN108875411A (en) * 2018-07-11 2018-11-23 成都理工大学 The storage of Intelligent bracelet data and sharing method based on block chain
CN109815731A (en) * 2018-12-29 2019-05-28 深圳云天励飞技术有限公司 Permission processing method and relevant device
CN109714760A (en) * 2019-01-18 2019-05-03 浙江科技学院 A kind of right access control method suitable for smart machine under direct-connected communication environment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022845A (en) * 2022-06-15 2022-09-06 中国联合网络通信集团有限公司 User contact person identification method, operator platform, device and system
CN115022845B (en) * 2022-06-15 2023-07-07 中国联合网络通信集团有限公司 User contact person identification method, operator platform, device and system

Also Published As

Publication number Publication date
CN110224713B (en) 2020-09-15

Similar Documents

Publication Publication Date Title
CN109729180B (en) Whole system intelligent community platform
Shi et al. Implicit authentication through learning user behavior
Rao et al. The InfoSec handbook: An introduction to information security
Blythe et al. A systematic review of crime facilitated by the consumer Internet of Things
EP2657880A1 (en) Systems and methods for combined physical and cyber data security
Andress Foundations of information security: a straightforward introduction
CN111355732B (en) Link detection method and device, electronic equipment and storage medium
Nayak et al. The InfoSec handbook: An introduction to information security
Haynes et al. A framework for preventing the exploitation of IoT smart toys for reconnaissance and exfiltration
Kumar et al. From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges
CN107169368A (en) A kind of computer system ensured information security
CN106648583A (en) Information processing method and terminal
CN112543184A (en) Block chain-based equipment authentication activation method
CN110224713A (en) A kind of high security intelligence children wrist-watch and its safety protecting method
Stajano Security issues in ubiquitous computing
CN108694329A (en) A kind of mobile intelligent terminal security incident based on software and hardware combining is credible record system and method
CN113747425B (en) RFID label anonymous authentication and key agreement method based on smart city security system
Tayag et al. IoT security: penetration testing of white-label cloud-based IoT camera compromising personal data privacy
Sharifi et al. Security Attacks and Solutions on Ubiquitous Computing Network
Haines Seven deadliest wireless technologies attacks
CN105897768B (en) User and Intelligent hardware correlating method and device, disassociation method and device
CN109150865A (en) A kind of protection, device and the storage medium of mobile terminal APP communications protocol
CN109117618A (en) A kind of secure log control method, apparatus and system
CN108449753A (en) A kind of method that cell phone apparatus reads the data in trusted computation environment
Tang Network and Information Security Characters and Threats

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant