CN103914645A - Identity authentication method and wearing device - Google Patents

Identity authentication method and wearing device Download PDF

Info

Publication number
CN103914645A
CN103914645A CN201410134352.6A CN201410134352A CN103914645A CN 103914645 A CN103914645 A CN 103914645A CN 201410134352 A CN201410134352 A CN 201410134352A CN 103914645 A CN103914645 A CN 103914645A
Authority
CN
China
Prior art keywords
identity information
authentication
authentication devices
wearable equipment
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410134352.6A
Other languages
Chinese (zh)
Inventor
陈龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201410134352.6A priority Critical patent/CN103914645A/en
Publication of CN103914645A publication Critical patent/CN103914645A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses an identity authentication method and a wearing device. The identity authentication method includes detecting whether any authentication device for authenticating identity of the wearing device exists in the preset area or not; if yes, transmitting identity authentication request for the authentication device; receiving operation response information fed back by the authentication device according to the identity authentication request. The identity authentication method in the embodiment is used for authenticating identity by the wearing device and the authentication device, and since the acquired identity information is difficult to fake or duplicate, safety is improved, a complicated step of inputting passwords by users is omitted, convenience is improved, identity authentication is more intelligentized, and user experience is improved.

Description

Auth method and Wearable equipment
Technical field
The present invention relates to field of information security technology, particularly a kind of auth method and Wearable equipment.
Background technology
Along with the development of social informatization process, the field of authentication application is more and more wide, for example: while logining individual Net silver account, need to carry out authentication, need to carry out authentication etc. while withdrawing the money by cash dispenser.At present, traditional auth method major part is that the mode of inputting password by user realizes.
But realizing in process of the present invention, inventor finds that in prior art, at least there are the following problems: input the mode of password based on user, if password is easily too short, cracked by other people; If password is long, be not easy to user's memory, while remembering multiple password, easily produce and obscure and make mistakes.Meanwhile, user, in the time of the upper input of relevant device (as cash dispenser, Intelligent door) password, is easily seen poor stability by other people.
Summary of the invention
The embodiment of the present invention is intended to solve the problems of the technologies described above at least to a certain extent.
For this reason, first object of the present invention is to propose a kind of auth method, and the method can improve the security of authentication, saves user and input the loaded down with trivial details step of password, improves convenience, makes authentication more intelligent, experiences thereby promote user.
Second object of the present invention is to propose a kind of Wearable equipment.
For reaching above-mentioned purpose, according to first aspect present invention embodiment, a kind of auth method is proposed, comprising: detect in predeterminable area whether have the Authentication devices that Wearable equipment is carried out to authentication; If there is described Authentication devices, send authentication request to described Authentication devices; And receive the operation response message that described Authentication devices returns according to described authentication request.
The auth method of the embodiment of the present invention, carry out authentication by Wearable equipment and Authentication devices, because the identity information of collecting is difficult to forge or copy, in having improved security, also save the loaded down with trivial details step that user inputs password, improve convenience, made authentication more intelligent, thereby promoted user's experience.
Second aspect present invention embodiment has proposed a kind of Wearable equipment, comprising: detection module, for detection of whether there being the Authentication devices that Wearable equipment is carried out to authentication in predeterminable area; Sending module, in the time described Authentication devices being detected, sends authentication request to described Authentication devices; And receiver module, the operation response message of returning according to described authentication request for receiving described Authentication devices.
The Wearable equipment of the embodiment of the present invention, carry out authentication by Wearable equipment and Authentication devices, because the identity information of collecting is difficult to forge or copy, in having improved security, also save the loaded down with trivial details step that user inputs password, improve convenience, made authentication more intelligent, thereby promoted user's experience.
Additional aspect of the present invention and advantage in the following description part provide, and part will become obviously from the following description, or recognize by practice of the present invention.
Brief description of the drawings
Above-mentioned and/or the additional aspect of invention and advantage accompanying drawing below combination is understood becoming the description of embodiment obviously and easily, wherein:
Fig. 1 is the process flow diagram of auth method according to an embodiment of the invention.
Fig. 2 is the process flow diagram of the auth method of a specific embodiment according to the present invention.
Fig. 3 is the structural drawing of Wearable equipment according to an embodiment of the invention.
Embodiment
Describe embodiments of the invention below in detail, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has the element of identical or similar functions from start to finish.Be exemplary below by the embodiment being described with reference to the drawings, be intended to for explaining the present invention, and can not be interpreted as limitation of the present invention.
Auth method and the Wearable equipment of the embodiment of the present invention are described below with reference to accompanying drawing.
Fig. 1 is the process flow diagram of auth method according to an embodiment of the invention.As shown in Figure 1, this auth method comprises:
S101, detects in predeterminable area whether have the Authentication devices that Wearable equipment is carried out to authentication.
Particularly,, can detect predeterminable area and whether have the Authentication devices that Wearable equipment is carried out to authentication in the time dressing state at Wearable equipment.Wherein, wearing state can detect by the temperature sensor of Wearable equipment and/or pressure transducer.Wearable equipment can include but not limited to finger ring, bracelet, glasses, wrist-watch etc.Authentication devices can include but not limited to PC, cash dispenser, intelligent automobile, intelligent door lock etc.Predeterminable area is predefined scope, for example: in the time that Wearable equipment and Authentication devices are in certain scope, Wearable equipment can mate with Authentication devices checking.
In an embodiment of the present invention, whether there is Authentication devices in detection predeterminable area before, when Wearable equipment is in the time dressing state, Wearable equipment can be stored user's identity information.Wherein, identity information is that the sensor of Wearable equipment is collected.Wherein, sensor can comprise: the sensor of collecting the sensor of palmic rate, the sensor of collecting user's body temperature, the sensor of collecting pressure between user and Wearable equipment, the conventional height of collection Wearable equipment.Therefore, user's identity information can comprise pressure, the height etc. between palmic rate, body temperature, user and Wearable equipment.
Particularly, Wearable equipment can detect local user's the identity information of whether having stored.If use for the first time Wearable equipment, Wearable equipment is not stored user's identity information, can within a predetermined period of time, collect user's identity information by sensor, and carry out the processing such as signal amplification, Signal coding, then store user's identity information.Wherein, signal amplification is for the ease of the subscriber identity information of collecting is identified and stored.Signal coding is for the ease of the subscriber identity information of collecting is compressed and mated.To be Wearable equipment collected user's identity information and processed the required time by sensor predetermined amount of time, and Wearable equipment can carry out authentication with Authentication devices and mates after this.
In an embodiment of the present invention, after storage user's identity information, Wearable equipment sends identity information to Authentication devices, so that Authentication devices storage identity information, and make Authentication devices carry out authentication to Wearable equipment according to identity information.
In an embodiment of the present invention, in the time that Wearable equipment Inspection occurs to upgrade to identity information, can send current identity information to Authentication devices.Particularly, because user's identity information can produce cyclical variation along with the variation of time, the user's who collects by sensor identity information also can change to some extent, therefore Wearable equipment can carry out data correction to the user's who collects identity information, and in real time or periodically user's current identity information is sent to the Authentication devices of connection, so that Authentication devices upgrades user's identity information at any time.
S102, if there is Authentication devices, sends authentication request to Authentication devices.
When Wearable equipment Inspection when existing Authentication devices in predeterminable area, can pass through NFC(near field communication (NFC)), WIFI(adopting wireless fidelity technology), one in the various ways such as infrared data exchange, sound wave exchanged form, send authentication request to Authentication devices.Wherein, only need be by Wearable equipment near Authentication devices by NFC technology, and can complete exchanges data without connecting by network, more quick and easy.
S103, the operation response message that Receipt Validation equipment returns according to authentication request.
The authentication request sending according to Wearable equipment at Authentication devices completes after corresponding operation, the operation response message that Wearable equipment can Receipt Validation equipment returns.For example: when user is during near own automobile, only need to trigger Wearable equipment and send identity information to automobile, automobile can mate the identity information receiving with pre-stored identity information, if mate by opening car door.
The auth method of the embodiment of the present invention, carry out authentication by Wearable equipment and Authentication devices, because the identity information of collecting is difficult to forge or copy, in having improved security, also save the loaded down with trivial details step that user inputs password, improve convenience, made authentication more intelligent, thereby promoted user's experience.
Fig. 2 is the process flow diagram of the auth method of a specific embodiment according to the present invention.As shown in Figure 2, this auth method comprises:
S201, sends authentication request to intelligent automobile.
Particularly, when user is during near own intelligent automobile, the intelligent finger ring of wearing is carried out to touch action, can initiate checking to intelligent automobile and ask.Now, intelligent finger ring can send to user's personal information (identify label ID and password) on intelligent automobile.
In the time that user wears upper intelligent finger ring for the first time, intelligent finger ring can by sensor detect user body temperature and and user finger between pressure, then automatically open identification verification function.Now cannot mate with intelligent automobile, therefore enter initial phase.First,, by being connected to user's smart mobile phone, initial identity information is input to intelligent finger ring.Same, by same method, initial identity information is input to intelligent automobile.Then, carry out the collection of personal biological information by wearing intelligent finger ring.By the collection of a period of time, the personal biological information of collecting is stored.Then, personal biological information is sent in intelligent automobile.Because, user's personal biological information can produce along with the variation of time cyclical variation, therefore when intelligent finger ring is always in the time wearing state, intelligent finger ring can, according to the personal biological information of storage before, carry out data correction to current personal biological information.
S202, intelligent automobile, according to authentication request, returns to operation response message.
Intelligent automobile can be according to authentication request, detects pre-stored at local personal biological information.If the current personal biological information carrying in authentication request is with pre-stored consistent at local personal biological information, authentication is passed through, and intelligent automobile is opened car door automatically.
In like manner, the method also can be applied to other scenes, such as, authentication on the equipment such as intelligent door lock.
The auth method of the embodiment of the present invention, initiates authentication request by the Intelligent finger hoop intelligent automobile of wearing, and intelligent automobile is opened car door after intelligent finger ring is proved to be successful automatically, has realized the intellectuality of authentication.In addition, by personal biological information, identity is verified, improved the security of authentication.In addition, wear the authentication mode of intelligent finger ring and carry out authentication with respect to input numerical ciphers, convenient, quick, thus promote user's experience.
In order to realize above-described embodiment, the present invention also proposes a kind of Wearable equipment.
Fig. 3 is the structural drawing of Wearable equipment according to an embodiment of the invention.As shown in Figure 3, this Wearable equipment comprises: detection module 110, sending module 120, receiver module 130 and memory module 140.
Detection module 110 is for detection of whether there being the Authentication devices that Wearable equipment is carried out to authentication in predeterminable area.
Particularly, Wearable equipment is in the time dressing state, and detection module 110 can detect predeterminable area and whether have the Authentication devices that Wearable equipment is carried out to authentication.Wherein, wearing state can detect by the temperature sensor of Wearable equipment and/or pressure transducer.Wearable equipment can include but not limited to finger ring, bracelet, glasses, wrist-watch etc.Authentication devices can include but not limited to PC, cash dispenser, intelligent automobile, intelligent door lock etc.Predeterminable area is predefined scope, for example: in the time that Wearable equipment and Authentication devices are in certain scope, Wearable equipment can mate with Authentication devices checking.
Sending module 120, in the time Authentication devices being detected, sends authentication request to Authentication devices.
When detection module 110 detects there is Authentication devices in predeterminable area time, sending module 120 can pass through NFC(near field communication (NFC)), WIFI(adopting wireless fidelity technology), one in the various ways such as infrared data exchange, sound wave exchanged form, send authentication request to Authentication devices.Wherein, only need be by Wearable equipment near Authentication devices by NFC technology, and can complete exchanges data without connecting by network, more quick and easy.
In an embodiment of the present invention, after Wearable device storage user's identity information, sending module 120 also can send identity information to Authentication devices, so that Authentication devices storage identity information, and make Authentication devices carry out authentication to Wearable equipment according to identity information.
In an embodiment of the present invention, in the time that Wearable equipment Inspection occurs to upgrade to identity information, sending module 120 can send current identity information to Authentication devices.Particularly, because user's identity information can produce cyclical variation along with the variation of time, the user's who collects by sensor identity information also can change to some extent, therefore Wearable equipment can carry out data correction to the user's who collects identity information, sending module 120 in real time or periodically user's current identity information is sent to the Authentication devices of connection so that Authentication devices upgrades user's identity information at any time.
The operation response message that receiver module 130 returns according to authentication request for Receipt Validation equipment.
The authentication request sending according to Wearable equipment at Authentication devices completes after corresponding operation, the operation response message that receiver module 130 can Receipt Validation equipment returns.For example: when user is during near own automobile, only need to trigger Wearable equipment and send identity information to automobile, automobile can mate the identity information receiving with pre-stored identity information, if mate by opening car door.
Memory module 140 at Wearable equipment in dressing when state, detect this locality and whether stored user's identity information, if user's identity information is collected in not storage within a predetermined period of time, the identity information of collecting is processed, and identity information after treatment is stored.
In an embodiment of the present invention, before detection module 110 detects and whether has Authentication devices in predeterminable area, when Wearable equipment is in the time dressing state, memory module 140 can be stored user's identity information.Wherein, identity information is that the sensor of Wearable equipment is collected.Wherein, sensor can comprise: the sensor of collecting the sensor of palmic rate, the sensor of collecting user's body temperature, the sensor of collecting pressure between user and Wearable equipment, the conventional height of collection Wearable equipment.Therefore, user's identity information can comprise pressure, the height etc. between palmic rate, body temperature, user and Wearable equipment.
Particularly, memory module 140 can detect local user's the identity information of whether having stored.If use for the first time Wearable equipment, memory module 140 is not stored user's identity information, can within a predetermined period of time, collect user's identity information by sensor, and carry out the processing such as signal amplification, Signal coding, then store user's identity information.Wherein, signal amplification is for the ease of the subscriber identity information of collecting is identified and stored.Signal coding is for the ease of the subscriber identity information of collecting is compressed and mated.To be Wearable equipment collected user's identity information and processed the required time by sensor predetermined amount of time, and Wearable equipment can carry out authentication with Authentication devices and mates after this.
The Wearable equipment of the embodiment of the present invention, carry out authentication by Wearable equipment and Authentication devices, because the identity information of collecting is difficult to forge or copy, in having improved security, also save the loaded down with trivial details step that user inputs password, improve convenience, made authentication more intelligent, thereby promoted user's experience.
Any process of otherwise describing in process flow diagram or at this or method are described and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
The logic and/or the step that in process flow diagram, represent or otherwise describe at this, for example, can be considered to the sequencing list of the executable instruction for realizing logic function, may be embodied in any computer-readable medium, use for instruction execution system, device or equipment (as computer based system, comprise that the system of processor or other can and carry out the system of instruction from instruction execution system, device or equipment instruction fetch), or use in conjunction with these instruction execution systems, device or equipment.With regard to this instructions, " computer-readable medium " can be anyly can comprise, device that storage, communication, propagation or transmission procedure use for instruction execution system, device or equipment or in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wirings, portable computer diskette box (magnetic device), random-access memory (ram), ROM (read-only memory) (ROM), the erasable ROM (read-only memory) (EPROM or flash memory) of editing, fiber device, and portable optic disk ROM (read-only memory) (CDROM).In addition, computer-readable medium can be even paper or other the suitable medium that can print described program thereon, because can be for example by paper or other media be carried out to optical scanning, then edit, decipher or process in electronics mode and obtain described program with other suitable methods if desired, be then stored in computer memory.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple steps or method can realize with being stored in software or the firmware carried out in storer and by suitable instruction execution system.For example, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic for data-signal being realized to the logic gates of logic function, there is the special IC of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a kind of computer-readable recording medium, this program, in the time carrying out, comprises step of embodiment of the method one or a combination set of.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing module, can be also that the independent physics of unit exists, and also can be integrated in a module two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.If described integrated module realizes and during as production marketing independently or use, also can be stored in a computer read/write memory medium using the form of software function module.
The above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
In the description of this instructions, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure, material or the feature of this embodiment or example description.In this manual, the schematic statement of above-mentioned term is not necessarily referred to identical embodiment or example.And specific features, structure, material or the feature of description can be with suitable mode combination in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, those having ordinary skill in the art will appreciate that: in the situation that not departing from principle of the present invention and aim, can carry out multiple variation, amendment, replacement and modification to these embodiment, scope of the present invention is by claim and be equal to and limit.

Claims (10)

1. an auth method, is characterized in that, comprising:
Detect in predeterminable area and whether have the Authentication devices that Wearable equipment is carried out to authentication;
If there is described Authentication devices, send authentication request to described Authentication devices; And
Receive the operation response message that described Authentication devices returns according to described authentication request.
2. method according to claim 1, is characterized in that, described to described Authentication devices transmission authentication request, comprising:
Send described authentication request by one or more in the exchange of near field communication (NFC) NFC, adopting wireless fidelity technology WIFI, infrared data, sound wave exchanged form to described Authentication devices.
3. method according to claim 1, is characterized in that, before whether there is Authentication devices, also comprises in described detection predeterminable area:
At described Wearable equipment in dressing when state, detect this locality and whether stored user's identity information, if described user's identity information is collected in not storage within a predetermined period of time, identity information to the described user who collects is processed, and identity information after treatment is stored.
4. method according to claim 3, is characterized in that, described identity information after treatment is stored after, also comprise:
Send described identity information to described Authentication devices, so that described Authentication devices is stored described identity information, and carry out authentication according to described identity information.
5. method according to claim 4, is characterized in that, sends described identity information to described Authentication devices, comprising:
Detect when described identity information occurs to upgrade, send current identity information to described Authentication devices.
6. a Wearable equipment, is characterized in that, comprising:
Detection module, for detection of whether there being the Authentication devices that Wearable equipment is carried out to authentication in predeterminable area;
Sending module, in the time described Authentication devices being detected, sends authentication request to described Authentication devices; And
Receiver module, the operation response message of returning according to described authentication request for receiving described Authentication devices.
7. Wearable equipment according to claim 6, is characterized in that, described sending module, specifically for:
Send described authentication request by one or more in the exchange of near field communication (NFC) NFC, adopting wireless fidelity technology WIFI, infrared data, sound wave exchanged form to described Authentication devices.
8. Wearable equipment according to claim 6, is characterized in that, described Wearable equipment, also comprises:
Memory module, be used at described Wearable equipment in the time dressing state, detect local user's the identity information of whether having stored, if not storage, collect within a predetermined period of time described user's identity information, identity information to the described user who collects is processed, and identity information after treatment is stored.
9. Wearable equipment according to claim 8, is characterized in that, described sending module, also for:
Described identity information after treatment is stored after, send described identity information to described Authentication devices so that described Authentication devices is stored described identity information, and carry out authentication according to described identity information.
10. Wearable equipment according to claim 9, is characterized in that, described sending module, specifically for:
Detect when described identity information occurs to upgrade, send current identity information to described Authentication devices.
CN201410134352.6A 2014-04-03 2014-04-03 Identity authentication method and wearing device Pending CN103914645A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410134352.6A CN103914645A (en) 2014-04-03 2014-04-03 Identity authentication method and wearing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410134352.6A CN103914645A (en) 2014-04-03 2014-04-03 Identity authentication method and wearing device

Publications (1)

Publication Number Publication Date
CN103914645A true CN103914645A (en) 2014-07-09

Family

ID=51040320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410134352.6A Pending CN103914645A (en) 2014-04-03 2014-04-03 Identity authentication method and wearing device

Country Status (1)

Country Link
CN (1) CN103914645A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243165A (en) * 2014-08-28 2014-12-24 电子科技大学 Intelligent movable terminal privacy protection system and method based on intelligent bracelet
CN104468524A (en) * 2014-11-14 2015-03-25 小米科技有限责任公司 Permission verification method and device
CN104468329A (en) * 2014-12-02 2015-03-25 小米科技有限责任公司 Member adding method and device based on instant messaging
CN104751035A (en) * 2015-03-26 2015-07-01 广东欧珀移动通信有限公司 Unlocking method and device of intelligent terminal
CN104794381A (en) * 2015-03-24 2015-07-22 百度在线网络技术(北京)有限公司 Method, device, equipment and system used for authentication
CN104967592A (en) * 2014-10-09 2015-10-07 腾讯科技(深圳)有限公司 Identity verification method, apparatus and system
CN105005893A (en) * 2015-07-28 2015-10-28 Tcl移动通信科技(宁波)有限公司 Payment password input processing method based on mobile terminal and system thereof
CN105096430A (en) * 2015-08-31 2015-11-25 宇龙计算机通信科技(深圳)有限公司 Car door open control method, device and system
CN105373002A (en) * 2015-11-03 2016-03-02 重庆码头联智科技有限公司 Safety certificate control method based on smart band gyroscope
CN105430149A (en) * 2014-09-12 2016-03-23 酷派软件技术(深圳)有限公司 Terminal user identity determination method and apparatus
CN105446998A (en) * 2014-07-28 2016-03-30 联想(北京)有限公司 Data processing method and electronic device
CN105469024A (en) * 2014-09-12 2016-04-06 神盾股份有限公司 Wearable device and control method thereof
CN105578616A (en) * 2015-12-27 2016-05-11 深圳市银河风云网络系统股份有限公司 Wi-Fi connection state based method for determining user identity
CN106793163A (en) * 2016-12-22 2017-05-31 上海摩软通讯技术有限公司 Wearable device, communication system and communication means
CN107241328A (en) * 2017-06-07 2017-10-10 黄俊生 Electronic equipment method for opening and closing and system
US9819652B2 (en) 2014-09-25 2017-11-14 Xiaomi Inc. Information interaction methods and devices
CN108063767A (en) * 2017-12-26 2018-05-22 苏州麦迪斯顿医疗科技股份有限公司 A kind of online test method, device, computer and storage medium
CN108197929A (en) * 2017-11-27 2018-06-22 拉卡拉支付股份有限公司 The safe payment method and device of a kind of wearable device
TWI672612B (en) * 2014-07-31 2019-09-21 南韓商三星電子股份有限公司 Wearable device,method of generating encryption key and non-transitory computer-readable recording medium
CN111507704A (en) * 2020-04-13 2020-08-07 佛山职业技术学院 NFC-based payment method, system and storage medium
US10762233B2 (en) 2014-07-31 2020-09-01 Samsung Electronics Co., Ltd. Method and device for encrypting or decrypting content
WO2021218337A1 (en) * 2020-04-30 2021-11-04 深圳壹账通智能科技有限公司 Information verification method and apparatus, and electronic device and storage medium

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105446998A (en) * 2014-07-28 2016-03-30 联想(北京)有限公司 Data processing method and electronic device
TWI672612B (en) * 2014-07-31 2019-09-21 南韓商三星電子股份有限公司 Wearable device,method of generating encryption key and non-transitory computer-readable recording medium
US10762233B2 (en) 2014-07-31 2020-09-01 Samsung Electronics Co., Ltd. Method and device for encrypting or decrypting content
CN104243165A (en) * 2014-08-28 2014-12-24 电子科技大学 Intelligent movable terminal privacy protection system and method based on intelligent bracelet
CN105430149A (en) * 2014-09-12 2016-03-23 酷派软件技术(深圳)有限公司 Terminal user identity determination method and apparatus
CN105469024A (en) * 2014-09-12 2016-04-06 神盾股份有限公司 Wearable device and control method thereof
CN105430149B (en) * 2014-09-12 2019-02-01 酷派软件技术(深圳)有限公司 A kind of terminal user identity determines method and device
US9819652B2 (en) 2014-09-25 2017-11-14 Xiaomi Inc. Information interaction methods and devices
CN104967592A (en) * 2014-10-09 2015-10-07 腾讯科技(深圳)有限公司 Identity verification method, apparatus and system
CN104967592B (en) * 2014-10-09 2018-07-27 腾讯科技(深圳)有限公司 Auth method, device and its system
CN104468524A (en) * 2014-11-14 2015-03-25 小米科技有限责任公司 Permission verification method and device
CN104468329A (en) * 2014-12-02 2015-03-25 小米科技有限责任公司 Member adding method and device based on instant messaging
CN104468329B (en) * 2014-12-02 2018-02-02 小米科技有限责任公司 Member adding method and device based on instant messaging
CN104794381A (en) * 2015-03-24 2015-07-22 百度在线网络技术(北京)有限公司 Method, device, equipment and system used for authentication
CN104751035A (en) * 2015-03-26 2015-07-01 广东欧珀移动通信有限公司 Unlocking method and device of intelligent terminal
CN105005893A (en) * 2015-07-28 2015-10-28 Tcl移动通信科技(宁波)有限公司 Payment password input processing method based on mobile terminal and system thereof
CN105005893B (en) * 2015-07-28 2019-01-29 Tcl移动通信科技(宁波)有限公司 A kind of payment cipher input processing method and system based on mobile terminal
CN105096430A (en) * 2015-08-31 2015-11-25 宇龙计算机通信科技(深圳)有限公司 Car door open control method, device and system
CN105373002A (en) * 2015-11-03 2016-03-02 重庆码头联智科技有限公司 Safety certificate control method based on smart band gyroscope
CN105578616A (en) * 2015-12-27 2016-05-11 深圳市银河风云网络系统股份有限公司 Wi-Fi connection state based method for determining user identity
CN106793163A (en) * 2016-12-22 2017-05-31 上海摩软通讯技术有限公司 Wearable device, communication system and communication means
CN107241328A (en) * 2017-06-07 2017-10-10 黄俊生 Electronic equipment method for opening and closing and system
CN107241328B (en) * 2017-06-07 2020-06-12 黄俊生 Electronic equipment opening and closing method and system
CN108197929A (en) * 2017-11-27 2018-06-22 拉卡拉支付股份有限公司 The safe payment method and device of a kind of wearable device
CN108063767A (en) * 2017-12-26 2018-05-22 苏州麦迪斯顿医疗科技股份有限公司 A kind of online test method, device, computer and storage medium
CN111507704A (en) * 2020-04-13 2020-08-07 佛山职业技术学院 NFC-based payment method, system and storage medium
CN111507704B (en) * 2020-04-13 2023-11-07 佛山职业技术学院 NFC-based payment method, system and storage medium
WO2021218337A1 (en) * 2020-04-30 2021-11-04 深圳壹账通智能科技有限公司 Information verification method and apparatus, and electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN103914645A (en) Identity authentication method and wearing device
US11295298B2 (en) Control system and method
EP3276556B1 (en) Method and electronic device for payment using biometric authentication
KR101666187B1 (en) Care provider terminal, method and computer readable medium for protecting care information
US9826400B2 (en) Method and apparatus that facilitates a wearable identity manager
US9800570B1 (en) Method of persistent authentication with disablement upon removal of a wearable device
CN103106736B (en) A kind of identity identifying method, terminal and server
CN105447691A (en) E-card transaction authorization based on geographic location
KR20160137613A (en) Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
US20150382190A1 (en) Enhanced secure identity generation
CN105447969A (en) Messaging customer mobile device when electronic bank card used
KR20180055209A (en) Method and electronic device for payment using agent device
US9721082B2 (en) Computing devices having access control
CN106464694A (en) Security adjustments in mobile devices
CN105447696A (en) Automatic notification of transaction by bank card to customer device
CN104778587A (en) Safety payment method and device
CN104363589A (en) Identity authentication method, device and terminal
CN106464502A (en) Methods and systems for authentication of a communication device
CN109872143A (en) Payment information binding method, device, mobile terminal and system
CN105005893A (en) Payment password input processing method based on mobile terminal and system thereof
CN103580867A (en) Trading method and trading system
US20240119455A1 (en) Piezoelectric biometric card security
CN108932486A (en) Finger print matching method, device and electronic device
CN107358127B (en) A kind of recognition methods and system of legal chip
CN104778586A (en) Safety payment method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140709