CN101453326A - Close range wireless communication personal identification method and mobile terminal - Google Patents

Close range wireless communication personal identification method and mobile terminal Download PDF

Info

Publication number
CN101453326A
CN101453326A CNA2007101719943A CN200710171994A CN101453326A CN 101453326 A CN101453326 A CN 101453326A CN A2007101719943 A CNA2007101719943 A CN A2007101719943A CN 200710171994 A CN200710171994 A CN 200710171994A CN 101453326 A CN101453326 A CN 101453326A
Authority
CN
China
Prior art keywords
identification
portable terminal
source end
module
advance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101719943A
Other languages
Chinese (zh)
Inventor
洪智忠
郑文义
何代水
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Appliances Shanghai Corp
Original Assignee
Inventec Appliances Shanghai Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Appliances Shanghai Corp filed Critical Inventec Appliances Shanghai Corp
Priority to CNA2007101719943A priority Critical patent/CN101453326A/en
Publication of CN101453326A publication Critical patent/CN101453326A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a short-range wireless communication identity recognition method between a source end and a destination end. The method comprises: setting safety information related to identity recognition in advance; and acquiring the preset safety information after the source end or the destination end is activated, and stopping identity recognition after the current user is determined to be illegal according to the preset safety information. The invention also discloses a mobile terminal. The method and the mobile terminal improve the safety of identity recognition by setting the safety information related to identity recognition in advance and stopping identity recognition after the current user is determined to be illegal according to the preset safety information.

Description

Close range wireless communication personal identification method and portable terminal
Technical field
The present invention relates to the short distance wireless communication technology field, particularly close range wireless communication personal identification method between source end and the destination and portable terminal.
Background technology
Along with popularizing that portable terminal is used, except realize call by it, other application functions of portable terminal are also more and more.A kind of application wherein is to carry out identification in wireless near field communication, as replace gate inhibition's card of family or company with portable terminal, replaces automotive electronics key etc. with portable terminal.
In the prior art, the flow process that realizes identification in the wireless near field communication by portable terminal comprises the steps: as shown in Figure 1
The destination of step 11, the approaching above-mentioned wireless near field communication of portable terminal.
Identification source end in step 12, the portable terminal is activated by the above-mentioned purpose end.Here, the identification source end in the portable terminal can be radio frequency identification (RFID) module or short-range communication (NFC) module etc., as above-mentioned gate inhibition's card or automotive electronics key etc.; Then Dui Ying destination corresponds to as the RFID receiver of gate control system or Automobile Electronie Lock or NFC receiver etc.
Identification source end in step 13, the portable terminal is communicated by letter with destination, carries out identification.
In above-mentioned prior art, fail safe when the portable terminal with wireless near field communication identity recognition function carries out identification is lower, in case it is lost, pick up the above-mentioned identity recognition function that taker just can use this portable terminal, enter former portable terminal holder's family, company or start automobile of former portable terminal holder etc., cause former portable terminal holder's loss.
Summary of the invention
The object of the present invention is to provide close range wireless communication personal identification method and portable terminal between source end and the destination, can improve the fail safe of identification.
Based on above purpose, the identification in source provided by the invention end and the destination wireless near field communication comprises:
Set in advance the security information relevant with described identification;
After described source end or described destination are activated, obtain the described security information that sets in advance, and determine according to the described security information that sets in advance the active user illegal after, stop to carry out identification.
Described source end can be arranged on the portable terminal that can call out;
Then describedly set in advance the security information relevant and comprise: in advance according to user's input, in described portable terminal or the security number of described identification correspondence is set in the described destination with described identification;
After then described source end or described destination are activated, obtaining the described security information that sets in advance comprises: after described source end is activated, described portable terminal obtains the described security number that is arranged in self, or obtains the described security number that is arranged in the destination by described source end;
And the security information that described basis sets in advance is determined the active user and illegally is: described portable terminal judges whether loCal number is consistent with the described security number that obtains, if inconsistent, it is illegal then to determine the active user.
Described loCal number can be stored in the subscriber identification module; After then described source end was activated, this method further comprised:
Described portable terminal judges whether described subscriber identification module lost efficacy, if lost efficacy, then stops to carry out described identification; Otherwise, carry out the described step of obtaining the security number that sets in advance.
After described portable terminal judged that loCal number and the described security number that obtains be whether consistent, if it is consistent with the described security number that obtains to judge loCal number, then described source end can be communicated by letter with described destination, carries out identification.
Described loCal number can be stored in the subscriber identification module; After then described portable terminal judges that loCal number and the described security number that obtains be whether consistent, if it is consistent with the described security number that obtains to judge loCal number, can judge then whether described subscriber identification module lost efficacy,, then stop to carry out identification if lost efficacy; Otherwise if do not lose efficacy, then described source end is communicated by letter with described destination, carries out identification.
Described source end can be arranged on the portable terminal that can call out;
Then describedly set in advance the security information relevant and comprise: at network side the information whether subscriber identification module of storage loCal number in the described portable terminal lost efficacy is set in advance with described identification;
After then described source end or described destination were activated, obtain the described security information that sets in advance and comprise: after described source end was activated, described portable terminal was communicated by letter with network side, obtained the information whether described subscriber identification module that is arranged on network side lost efficacy;
And the security information that described basis sets in advance is determined the active user and illegally is: whether described portable terminal judges the described information of obtaining for losing efficacy, if it is illegal then to determine the active user.
Whether described portable terminal judges the described information of obtaining for after losing efficacy, is not to lose efficacy if determine, and then described source end can be communicated by letter with described destination, carries out identification.
Described source end be activated can for: described portable terminal near behind the described destination, the source end in the described portable terminal is activated;
Then stop to carry out described identification be: described portable terminal is closed the described source end that is activated.
Described subscriber identification module can be User Recognition (SIM) card.
Described source end can be RFID module or NFC module.
Described portable terminal can be mobile phone.
Portable terminal provided by the invention comprises:
The safety information acquisition module is used to obtain the security information relevant with identification that sets in advance;
Safety control module is used for determining according to the described security information of obtaining whether the active user illegal, and determine the active user illegal after, control identification source end stops to carry out identification;
Identification source end is used for carrying out identification with this destination by wireless near field communication, and stopping to carry out described identification according to the control of described safety control module after being activated by corresponding identification destination.
Further, can comprise in the above-mentioned portable terminal: subscriber identification module is used to store the loCal number of described portable terminal;
The security information that then described safety information acquisition module is obtained comprises: obtain the information whether described subscriber identification module lost efficacy from network side, and/or, obtain the security number of in described portable terminal, importing the identification correspondence of setting in advance according to the user;
Described safety control module is when the security number of described setting and described loCal number are inconsistent, and it is illegal to determine the active user, and control identification source end stops to carry out identification; And/or the information that whether lost efficacy in the described subscriber identification module of obtaining was when losing efficacy, and it is illegal to determine the active user, and control identification source end stops to carry out identification.
Described subscriber identification module can be SIM card.
Described identification source end can be RFID module or NFC module.
Described portable terminal can be mobile phone.
Via as can be known above-mentioned, in the close range wireless communication personal identification method and portable terminal between source of the present invention end and the destination, set in advance the security information relevant with described identification, determine according to the described security information that sets in advance the active user illegal after, stop to carry out identification, thereby improved the fail safe of identification, reduced the loss that to cause for former holder after portable terminal is lost;
In addition, when above-mentioned source end is arranged in the portable terminal, whether the present invention lost efficacy by the subscriber identification module in conjunction with storage loCal number in the portable terminal, and the consistent judgement of number that whether is provided with the user of the number in the subscriber identification module, further improved the fail safe when using portable terminal to carry out identification.
Description of drawings
Fig. 1 is a flow chart of realizing identification in the wireless near field communication in the prior art by portable terminal;
Fig. 2 is the flow chart of close range wireless communication personal identification method first embodiment between source of the present invention end and the destination;
Fig. 3 is the flow chart of close range wireless communication personal identification method second embodiment between source of the present invention end and the destination;
Fig. 4 is the flow chart of close range wireless communication personal identification method the 3rd embodiment between source of the present invention end and the destination;
Fig. 5 is the flow chart of close range wireless communication personal identification method the 4th embodiment between source of the present invention end and the destination;
Fig. 6 is the structural representation of portable terminal first embodiment of the present invention;
Fig. 7 is the structural representation of portable terminal second embodiment of the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
In the close range wireless communication personal identification method between source of the present invention end and the destination, set in advance the security information relevant with described identification; After source end or destination are activated, obtain the described security information that sets in advance, and determine according to the described security information that sets in advance the active user illegal after, stop to carry out identification.
It is distolateral that the security information that above-mentioned identification is relevant can be arranged on the source, and it is distolateral also can be arranged on purpose.Obtain the above-mentioned security information that sets in advance, whether the user illegally judges before the trade of going forward side by side, and can be to carry out in source end one side, also can carry out in destination one side.If the security information that is provided with is not the same side with carrying out what judge, then carry out the side judged by communicating by letter between source end and the destination, obtain the security information that is provided with at opposite side.
Above-mentioned source end or destination can be arranged on the portable terminal that can carry out call, in mobile phone, then can obtain the security information of above-mentioned identification by portable terminal, and carry out the whether illegal judgement of above-mentioned user, below be example with this situation, the invention will be further described by specific embodiment.
Among first embodiment of the close range wireless communication personal identification method between source of the present invention end and the destination, after preventing that portable terminal from losing, pick up the identity recognition function that taker uses this portable terminal, the security number of identification correspondence is set in portable terminal in advance, after this, as shown in Figure 2, specifically comprise the steps: in the identification procedure
Step 21, portable terminal are near destination.
Identity recognition function in step 22, the portable terminal is activated.
Here, in portable terminal, comprise the identification source end that carries out identification, then Dui Ying destination is the receiving system of this identification source end correspondence.These destinations detect corresponding identification source termination near after, activate identification source end by wireless signal, make identification source end electrifying startup, thereby activate the identity recognition function of portable terminal.
Here, identification source end in the portable terminal can be RFID module or NFC module etc., specifically can be applied as the gate inhibition of company card, automotive electronics key, electronic gate key, phonecard etc., then Dui Ying destination corresponds to RFID receiver or NFC receiver etc., specifically can be applied as company's entrance guard device, automotive electronics lock, door lock, cassette telephone set etc.
Step 23, portable terminal judge whether my phone numbers is consistent with the above-mentioned security number that sets in advance, if consistent, then execution in step 24; Otherwise, execution in step 25.Below abbreviate above-mentioned my phone numbers as loCal number.
LoCal number in the portable terminal is a portable terminal with process that the cordless communication network side is communicated by letter in, be used for identifying the identity of using mobile phone users, this loCal number can be stored in the subscriber identification module, offers as operator in user's the SIM card.
Step 24, communicate by letter, carry out identification with the destination of identification.Here, specifically communicate, carry out identification by identification source end and destination in the portable terminal.
Step 25, stop to carry out identification.In this step, specifically can be the identification source end that is activated in closing a terminal, make its stop with destination between communicate by letter, thereby stop to carry out identification.
After identification is stopped, the current holder of portable terminal just can't be again by portable terminal realize unlocking electronic door lock, electronics lock, by the gate inhibition etc., thereby former portable terminal holder's interests have been protected in the fail safe that has improved portable terminal.
Because after portable terminal is lost, the original holder can carry out reporting the loss of telephone number to operator, thereby the subscriber identification module of former storage Subscriber Number was lost efficacy, so in second embodiment of personal identification method of the present invention, by the judgement whether subscriber identification module was lost efficacy, determine whether and to finish identification by portable terminal.
The flow process of personal identification method second embodiment of the present invention specifically comprises the steps: as shown in Figure 3
Step 31, portable terminal are near destination.
Identity recognition function in step 32, the portable terminal is activated.
Being embodied in of these two steps all has detailed description among the embodiment, repeat no more here.Similarly, these two steps among following each personal identification method embodiment all no longer describe in detail.
Step 33, judge whether subscriber identification module lost efficacy, if lost efficacy execution in step 34; Otherwise, execution in step 35.
Because the information whether subscriber identification module in the terminal lost efficacy is arranged on network side by operator, then in this step, terminal and network side are mutual, obtain subscriber identification module, as SIM card, and the information that whether lost efficacy.
Step 34, stop to carry out identification.In this step, specifically can be the identification source end that is activated in closing a terminal, make its stop with destination between communicate by letter, thereby stop to carry out identification.
After identification is stopped, the current holder of portable terminal just can't be again by portable terminal realize unlocking electronic door lock, electronics lock, by the gate inhibition etc., thereby former portable terminal holder's interests have been protected in the fail safe that has improved portable terminal.
Step 35, communicate by letter, carry out identification with the destination of identification.Here, specifically communicate, carry out identification by identification source end and destination in the portable terminal.
In order further to improve the fail safe of portable terminal, in third and fourth embodiment of personal identification method, in conjunction with above-mentioned two embodiment, whether subscriber identification module lost efficacy all judged, thereby further improved the fail safe that portable terminal carries out identification with whether above-mentioned number is consistent.
Among the 3rd embodiment of personal identification method of the present invention, the portable terminal holder is provided with the security number that carries out the identification correspondence in advance in portable terminal.After this, as shown in Figure 4, present embodiment comprises the steps:
Step 41, portable terminal are near destination.
Identity recognition function in step 42, the portable terminal is activated.
Whether the subscriber identification module in step 43, the judgement portable terminal as SIM card, lost efficacy, if lost efficacy execution in step 44; Otherwise, execution in step 45.
Step 44, stop to carry out identification.
LoCal number in step 45, the judgement mobile terminal user identification module, whether consistent with the above-mentioned security number that sets in advance, if consistent, then transfer execution in step 44; Otherwise, execution in step 46.
Step 46, communicate by letter, carry out identification with the destination of identification.
Among the 4th embodiment of personal identification method of the present invention, the portable terminal holder is provided with the security number that carries out the identification correspondence in advance in portable terminal.After this, as shown in Figure 5, present embodiment comprises the steps:
Step 51, portable terminal are near destination.
Identity recognition function in step 52, the portable terminal is activated.
Step 53, portable terminal judge whether the loCal number in the subscriber identification module is consistent with the above-mentioned security number that sets in advance, if consistent, execution in step 55; Otherwise, execution in step 54.
Step 54, stop to carry out identification.
Step 55, judge whether SIM card lost efficacy, if lost efficacy, then then execution in step 54; Otherwise, execution in step 56.
Step 56, communicate by letter, carry out identification with the destination of identification.
More than personal identification method of the present invention is had been described in detail four specific embodiments, again four specific embodiments of portable terminal of the present invention are elaborated below.
The structure of portable terminal first embodiment of the present invention comprises as shown in Figure 6: safety information acquisition module, safety control module and identification source end.Wherein:
The safety information acquisition module is used to obtain the security information relevant with described identification that sets in advance.
Safety control module is used for determining according to the described security information of obtaining whether the active user illegal, and determine the active user illegal after, control identification source end stops to carry out identification.
Identification source end is used for after this source end is activated, and carries out wireless near field communication with the destination of identification, carries out identification, and stops to carry out described identification according to the control of described safety control module.
The structure of portable terminal second embodiment of the present invention as shown in Figure 7, subscriber identification module, safety information acquisition module, safety control module and identification source end.Wherein:
Subscriber identification module is used to store the loCal number of described portable terminal.
The safety information acquisition module is used for obtaining the information whether above-mentioned subscriber identification module lost efficacy from network side.
Safety control module is used for the information that whether lost efficacy according to the subscriber identification module that described safety information acquisition module is obtained, and after determining subscriber identification module and having lost efficacy, control identification source end stops to carry out identification.
Identification source end is used for passing through wireless near field communication with this destination after being activated by corresponding identification destination, carries out identification, and stops to carry out described identification according to the control of described safety control module.
The structure of portable terminal the 3rd embodiment of the present invention is identical with second embodiment, but the signal between the function of each module and each module is as follows alternately:
Subscriber identification module is used to store the loCal number of described portable terminal.
The safety information acquisition module is used for obtaining described portable terminal, imports the security number of the identification correspondence of setting in advance according to the user.
Safety control module is used to judge whether the security number of described setting is consistent with described loCal number, if inconsistent, it is illegal to determine the active user, and control identification source end stops to carry out identification.
Identification source end is used for passing through wireless near field communication with this destination after self being activated by the identification destination of correspondence, carries out identification, and stops to carry out described identification according to the control of described safety control module.
The structure of portable terminal the 4th embodiment of the present invention is identical with second embodiment, but the signal between the function of each module and each module is as follows alternately:
Subscriber identification module is used to store the loCal number of described portable terminal.
The safety information acquisition module is used for obtaining the information whether described subscriber identification module lost efficacy from network side, and obtains the security number of importing the identification correspondence of setting in described portable terminal in advance according to the user.
Safety control module is used for when the security number of described setting and described loCal number are inconsistent, and it is illegal to determine the active user, and control identification source end stops to carry out identification; And when losing efficacy, it is illegal to determine the active user in the information that whether lost efficacy according to the described subscriber identification module of obtaining, and control identification source end stops to carry out identification.
Identification source end is used for passing through wireless near field communication with this destination after self being activated by the identification destination of correspondence, carries out identification, and stops to carry out described identification according to the control of described safety control module.
Among above-mentioned each portable terminal embodiment, identification source end can be RFID module or NFC module, and subscriber identification module can be SIM card.In addition, the portable terminal in the various embodiments described above is specifically as follows mobile phone.
More than be explanation, in concrete implementation process, can carry out suitable improvement, to adapt to the concrete needs of concrete condition method of the present invention to the specific embodiment of the invention.Therefore be appreciated that according to the specific embodiment of the present invention just to play an exemplary role, not in order to restriction protection scope of the present invention.

Claims (16)

1, the close range wireless communication personal identification method between a provenance end and the destination is characterized in that, this method comprises:
Set in advance the security information relevant with described identification;
After described source end or described destination are activated, obtain the described security information that sets in advance, and determine according to the described security information that sets in advance the active user illegal after, stop to carry out identification.
2, method according to claim 1 is characterized in that, described source end is arranged on the portable terminal that can call out;
Describedly set in advance the security information relevant and comprise: in advance according to user's input, in described portable terminal or the security number of described identification correspondence is set in the described destination with described identification;
After described source end or described destination are activated, obtaining the described security information that sets in advance comprises: after described source end is activated, described portable terminal obtains the described security number that is arranged in self, or obtains the described security number that is arranged in the destination by described source end;
The security information that described basis sets in advance is determined the active user: described portable terminal judges whether loCal number is consistent with the described security number that obtains, if inconsistent, it is illegal then to determine the active user.
3, method according to claim 2 is characterized in that, described loCal number is stored in the subscriber identification module; After then described source end was activated, this method further comprised:
Described portable terminal judges whether described subscriber identification module lost efficacy, if lost efficacy, then stops to carry out described identification; Otherwise, carry out the described step of obtaining the security number that sets in advance.
4, method according to claim 2, it is characterized in that, after described portable terminal judges that loCal number and the described security number that obtains be whether consistent, if it is consistent with the described security number that obtains to judge loCal number, then described source end is communicated by letter with described destination, carries out identification.
5, method according to claim 2 is characterized in that, described loCal number is stored in the subscriber identification module; Then described portable terminal if it is consistent with the described security number that obtains to judge loCal number, judges then whether described subscriber identification module lost efficacy, if inefficacy then stops to carry out identification after judging that loCal number and the described security number that obtains be whether consistent; Otherwise if do not lose efficacy, then described source end is communicated by letter with described destination, carries out identification.
6, method according to claim 1 is characterized in that, described source end is arranged on the portable terminal that can call out;
Describedly set in advance the security information relevant and comprise: at network side the information whether subscriber identification module of storage loCal number in the described portable terminal lost efficacy is set in advance with described identification;
After described source end or described destination were activated, obtain the described security information that sets in advance and comprise: after described source end was activated, described portable terminal was communicated by letter with network side, obtained the information whether described subscriber identification module that is arranged on network side lost efficacy;
The security information that described basis sets in advance is determined the active user: described portable terminal judges that whether the described information of obtaining was for losing efficacy, if it is illegal then to determine the active user.
7, method according to claim 6 is characterized in that, whether described portable terminal judges the described information of obtaining for after losing efficacy, is not to lose efficacy if determine, and then described source end is communicated by letter with described destination, carries out identification.
According to arbitrary described method in the claim 2 to 7, it is characterized in that 8, described source end is activated as: described portable terminal is near behind the described destination, and the source end in the described portable terminal is activated;
Then stop to carry out described identification be: described portable terminal is closed the described source end that is activated.
According to claim 3,5,6 or 7 described methods, it is characterized in that 9, described subscriber identification module is the User Recognition SIM card.
10, method according to claim 2 is characterized in that, described portable terminal is a mobile phone.
11, method according to claim 1 is characterized in that, described source end is wireless radio frequency discrimination RFID module or short-range communication NFC module.
12, a kind of portable terminal is characterized in that, this portable terminal comprises:
The safety information acquisition module is used to obtain the security information relevant with identification that sets in advance;
Safety control module is used for determining according to the described security information of obtaining whether the active user illegal, and determine the active user illegal after, control identification source end stops to carry out identification;
Identification source end is used for carrying out identification with this destination by wireless near field communication, and stopping to carry out described identification according to the control of described safety control module after being activated by corresponding identification destination.
13, portable terminal according to claim 12 is characterized in that, further comprises in this portable terminal: subscriber identification module is used to store the loCal number of described portable terminal;
The security information that then described safety information acquisition module is obtained comprises: obtain the information whether described subscriber identification module lost efficacy from network side, and/or, obtain the security number of in described portable terminal, importing the identification correspondence of setting in advance according to the user;
Described safety control module is when the security number of described setting and described loCal number are inconsistent, and it is illegal to determine the active user, and control identification source end stops to carry out identification; And/or the information that whether lost efficacy in the described subscriber identification module of obtaining was when losing efficacy, and it is illegal to determine the active user, and control identification source end stops to carry out identification.
14, portable terminal according to claim 13 is characterized in that, described subscriber identification module is a SIM card.
15, portable terminal according to claim 13 is characterized in that, described identification source end is wireless radio frequency discrimination RFID module or short-range communication NFC module.
16, portable terminal according to claim 13 is characterized in that, described portable terminal is a mobile phone.
CNA2007101719943A 2007-12-06 2007-12-06 Close range wireless communication personal identification method and mobile terminal Pending CN101453326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101719943A CN101453326A (en) 2007-12-06 2007-12-06 Close range wireless communication personal identification method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101719943A CN101453326A (en) 2007-12-06 2007-12-06 Close range wireless communication personal identification method and mobile terminal

Publications (1)

Publication Number Publication Date
CN101453326A true CN101453326A (en) 2009-06-10

Family

ID=40735366

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101719943A Pending CN101453326A (en) 2007-12-06 2007-12-06 Close range wireless communication personal identification method and mobile terminal

Country Status (1)

Country Link
CN (1) CN101453326A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101707772A (en) * 2009-11-10 2010-05-12 宇龙计算机通信科技(深圳)有限公司 Identification method based on NFC and system
CN102054300A (en) * 2009-11-04 2011-05-11 黄金富 Identity authentication system adopting appearance image feature identification technology
CN102348005A (en) * 2010-08-05 2012-02-08 鸿富锦精密工业(深圳)有限公司 Internet protocol (IP) phone and method for performing telephone communication by utilizing same
CN103824012A (en) * 2014-03-05 2014-05-28 许建华 Radio frequency near field user identity recognition of intelligent mobile terminal
CN104066075A (en) * 2013-03-20 2014-09-24 华为终端有限公司 Communication method, device and system based on user identification module
CN104200410A (en) * 2014-08-30 2014-12-10 南京物联传感技术有限公司 NFC (Near Field Communication) hotel room card system and use method thereof
CN104504325A (en) * 2014-12-31 2015-04-08 联想(北京)有限公司 Information handling method and electronic device
CN105592339A (en) * 2014-11-10 2016-05-18 恩智浦有限公司 Media player

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102054300A (en) * 2009-11-04 2011-05-11 黄金富 Identity authentication system adopting appearance image feature identification technology
CN101707772A (en) * 2009-11-10 2010-05-12 宇龙计算机通信科技(深圳)有限公司 Identification method based on NFC and system
CN102348005A (en) * 2010-08-05 2012-02-08 鸿富锦精密工业(深圳)有限公司 Internet protocol (IP) phone and method for performing telephone communication by utilizing same
CN102348005B (en) * 2010-08-05 2014-06-18 鸿富锦精密工业(深圳)有限公司 Internet protocol (IP) phone and method for performing telephone communication by utilizing same
CN104066075A (en) * 2013-03-20 2014-09-24 华为终端有限公司 Communication method, device and system based on user identification module
CN103824012A (en) * 2014-03-05 2014-05-28 许建华 Radio frequency near field user identity recognition of intelligent mobile terminal
CN104200410A (en) * 2014-08-30 2014-12-10 南京物联传感技术有限公司 NFC (Near Field Communication) hotel room card system and use method thereof
CN105592339A (en) * 2014-11-10 2016-05-18 恩智浦有限公司 Media player
CN104504325A (en) * 2014-12-31 2015-04-08 联想(北京)有限公司 Information handling method and electronic device

Similar Documents

Publication Publication Date Title
CN101453326A (en) Close range wireless communication personal identification method and mobile terminal
CN104464040B (en) Car keyless entry system based on smart phone
US8102239B2 (en) Smart key for vehicles and telematics system using the same
US7868733B2 (en) System for identifying an individual in an electronic transaction
CN103313364B (en) Communication system and portable machine
CN101894404B (en) Method for realizing access control, terminal, access control device and access control system
CN102103765A (en) Access control and information display system, method and terminal
CN101459721A (en) Method and device for anti-theft tracking of mobile phone
CN103081370A (en) Securing of a telecommunication device including a near-field communication module
CN106274807A (en) Automobile intelligent control method based on mobile terminal and device
CN102831682A (en) System and method for remotely opening door based on mobile phone short message
CN205193906U (en) Cell -phone system of opening door based on cloud platform
US8041340B2 (en) Personal information protecting method and mobile terminal
EP2193676B1 (en) Mobile phone data security
CN106231534A (en) Mobile terminal and the number of writing thereof and method of disannuling a call, device
CN101877739B (en) Safe mobile phone and implementation method thereof
CN110203169A (en) A method of automobile burglar grade is promoted based on car networking system
CN103605545B (en) Method and system for updating mobile payment card pair and application programs
CN212569880U (en) Door opening system of Bluetooth induction lock
JP2012041713A (en) Remote control system and remote control method of vehicle
CN1477842A (en) Method for preventing user's identification module from being unallovably used
JP2008057112A (en) System and program for management of entry into/exit from room
CN107241714A (en) A kind of method, device and storage medium for setting up communication
CN207625607U (en) A kind of intelligent sliding vehicle system
CN105225105A (en) The method for security protection that NFC pays and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20090610