CN104794381A - Method, device, equipment and system used for authentication - Google Patents

Method, device, equipment and system used for authentication Download PDF

Info

Publication number
CN104794381A
CN104794381A CN201510131538.0A CN201510131538A CN104794381A CN 104794381 A CN104794381 A CN 104794381A CN 201510131538 A CN201510131538 A CN 201510131538A CN 104794381 A CN104794381 A CN 104794381A
Authority
CN
China
Prior art keywords
user
authentication
wearable electronic
mobile device
biological information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510131538.0A
Other languages
Chinese (zh)
Inventor
郭杏荣
叶璨
王继平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201510131538.0A priority Critical patent/CN104794381A/en
Publication of CN104794381A publication Critical patent/CN104794381A/en
Priority to PCT/CN2015/092887 priority patent/WO2016150154A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention aims to provide a method, device, equipment and system used for authentication. According to the method, a matching relationship is established via mobile equipment and one or more pieces of wearable electronic equipment; the mobile equipment performs identity authentication on a user based on biological feature information of the user by the aid of the wearable electronic equipment. The wearable electronic equipment can be provided with one or more sensors used for collecting the biological feature information of the user. Hereon, the invention provides a brand-new identity authentication scheme which can be used for multiple purposes such as payment and account login.

Description

A kind of method for certification, device, equipment and system
Technical field
The present invention relates to mobile internet technical field, particularly relate to a kind of technology for certification.
Background technology
Along with rise and the prosperity of mobile Internet, O2O, ecommerce and internet finance, people more and more use mobile phone to pay to complete online and offline.The large shopping to thousands of unit, the little cab fare to dozens of yuan, mobile payment is ubiquitous.
Existing mobile payment scheme mainly comprises following several:
1, payment is completed in mobile phone A pp.User inputs payment cipher and completes payment, and such as Alipay, micro-letter pay and all adopt the program.
2, the modes of payments of NFC is utilized, such as Apple Pay.
3, barcode scanning pays.Namely mobile phone A pp produces Quick Response Code, and by completing payment to the scanning of this Quick Response Code.
4, digital certificate equipment.As bank equipment such as " the U shields " that adopt, connect mobile phone with USB or audio port, guarantee safety of payment by this hardware.
But such scheme all has corresponding shortcoming:
Scheme 1,2,3 all relies on the safety of user mobile phone.Once mobile phone is lost, then there is high risk.And according to Beijing Metro Lost & Found statistics, between 2007 to 2011 years, mobile phone is as losing the accounting of article between 16%-27%.In addition, mobile phone is also easier to be used by other people in the careless situation of owner.Once this situation occurs, the safety of payment that only dependence payment cipher ensures just has very large leak and hidden danger.Malicious person can crack the payment cipher of original subscriber by various technological means.
Scheme 4, the security of digital certificate equipment is higher, but digital certificate equipment is also easily lost.Such as mobile phone, U shield etc. are often placed in a handbag by female user, once packet loss, and the fall of whole defence line.
Therefore, consider above-mentioned defect, existing mobile payment scheme is difficult to possess comprehensive safety guarantee, thus causes the interests of user to incur loss.
Summary of the invention
The object of this invention is to provide a kind of method for certification, device, equipment and system.
According to an aspect of the present invention, provide a kind of method for carrying out certification at mobile device end, wherein, the method comprises:
-set up matching relationship with one or more wearable electronic;
Wherein, the method also comprises:
-based on the biological information of user, authentication is carried out to described user by described wearable electronic.
According to another aspect of the present invention, additionally provide a kind of method for carrying out certification at wearable electronic end, wherein, the method comprises:
-set up matching relationship with mobile device;
Wherein, the method also comprises:
-auxiliary described mobile device carries out authentication based on the biological information of user to described user.
According to a further aspect of the invention, additionally provide a kind of device for carrying out certification at mobile device end, wherein, this device comprises:
-for setting up the device of matching relationship with one or more wearable electronic;
Wherein, this device also comprises:
-for carrying out the device of authentication to described user based on the biological information of user by described wearable electronic.
According to a further aspect of the invention, additionally provide a kind of at the device of wearable electronic end for certification, wherein, this device comprises:
-for setting up the device of matching relationship with mobile device;
Wherein, this device also comprises:
-based on the biological information of user, described user is carried out to the device of authentication for auxiliary described mobile device.
According to another aspect of the present invention, additionally provide a kind of mobile device for certification, comprise device as above.
According to a further aspect of the invention, additionally provide a kind of wearable electronic for certification, comprise device as above.
According to a further aspect of the invention, additionally provide a kind of system for certification, comprise mobile device as above and wearable electronic as above.
Compared with prior art, the present invention sets up matching relationship by mobile device and one or more wearable electronic, and carries out authentication based on the biological information of user to this user by wearable electronic by mobile device.Wherein, wearable electronic can have the sensor of one or more biological information for gathering user by device.At this, the present invention proposes a kind of brand-new identity verification scheme, it can be used to multiple use, and such as payment, account log in.Relative to the mobile device such as mobile phone, panel computer, wearable electronic is not easily lost.Therefore, by wearable electronic is introduced identity verification scheme, the security of the operation of the identity-based certifications such as the solution of the present invention can improve payment, account logs in.Further, the biological information of user is also introduced identity verification scheme by the present invention.Even if when wearable electronic, mobile device any one or two device losses, if can not obtain the biological information of the secured user preset, authentication also cannot be passed through.The security of the operation of the identity-based certifications such as this improves payment further, account logs in.
And, the present invention only can also carry out authentication when determining that wearable electronic is in wearing state, thus improve the operating environment that mobile device and wearable electronic carry out authentication, and further increase payment, the security of the operation of the identity-based certification such as account logs in.
And, the present invention can also by mobile device or wearable electronic according to the connection status with opposite equip., safety certification is carried out to opposite equip., and when opposite equip. through safety certification time, the biological information matched with wearable electronic based on user by mobile device carries out authentication to this user, thus improve mobile device and the mutual safety and reliability of wearable electronic, and further increase payment, the security of the operation of the identity-based certification such as account logs in.
Accompanying drawing explanation
By reading the detailed description done non-limiting example done with reference to the following drawings, other features, objects and advantages of the present invention will become more obvious:
Fig. 1 illustrates a kind of according to an embodiment of the invention being matched with wearable electronic by mobile device, to realize the method flow diagram of certification;
Fig. 2 illustrates a kind of according to an embodiment of the invention mobile device for certification and wearable electronic device schematic diagram.
In accompanying drawing, same or analogous Reference numeral represents same or analogous parts.
Embodiment
Before in further detail exemplary embodiment being discussed, it should be mentioned that some exemplary embodiments are described as the process or method described as process flow diagram.Although operations is described as the process of order by process flow diagram, many operations wherein can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be rearranged.Described process can be terminated when its operations are completed, but can also have the additional step do not comprised in the accompanying drawings.Described process can correspond to method, function, code, subroutine, subroutine etc.
Within a context alleged " computer equipment ", also referred to as " computer ", refer to the intelligent electronic device that can be performed the predetermined process such as numerical evaluation and/or logical calculated process by operation preset program or instruction, it can comprise processor and storer, the programmed instruction that prestores in memory is performed to perform predetermined process process by processor, or perform predetermined process process by the hardware such as ASIC, FPGA, DSP, or combined by said two devices and realize.Computer equipment includes but not limited to server, PC, notebook computer, panel computer, smart mobile phone etc.
The method (some of them are illustrated by process flow diagram) discussed herein can be implemented by hardware, software, firmware, middleware, microcode, hardware description language or its combination in any.When implementing by software, firmware, middleware or microcode, program code or code segment in order to implement necessary task can be stored in machine or computer-readable medium (such as storage medium).(one or more) processor can implement necessary task.
Concrete structure disclosed herein and function detail are only representational, and are the objects for describing exemplary embodiment of the present invention.But the present invention can carry out specific implementation by many replacement forms, and should not be construed as only being limited to the embodiments set forth herein.
Should be understood that, although may have been used term " first ", " second " etc. here to describe unit, these unit should not limit by these terms.These terms are used to be only used to a unit and another unit to distinguish.For example, when not deviating from the scope of exemplary embodiment, first module can be called as second unit, and second unit can be called as first module similarly.Here used term "and/or" comprise one of them or more any and all combinations of listed associated item.
Should be understood that, when a unit is called as " connection " or " coupling " to another unit, it can directly connect or be coupled to another unit described, or can there is temporary location.On the other hand, " when being directly connected " or " directly coupled " to another unit, then there is not temporary location when a unit is called as.Should explain in a comparable manner the relation be used between description unit other words (such as " and be in ... between " compared to " and be directly in ... between ", " with ... contiguous " compared to " and with ... be directly close to " etc.).
Here used term is only used to describe specific embodiment and be not intended to limit exemplary embodiment.Unless context refers else clearly, otherwise singulative used here " ", " one " are also intended to comprise plural number.It is to be further understood that, the existence of the feature that term used here " comprises " and/or " comprising " specifies to state, integer, step, operation, unit and/or assembly, and do not get rid of and there is or add other features one or more, integer, step, operation, unit, assembly and/or its combination.
Also it should be mentioned that and to replace in implementation at some, the function/action mentioned can according to being different from occurring in sequence of indicating in accompanying drawing.For example, depend on involved function/action, in fact the two width figure in succession illustrated can perform simultaneously or sometimes can perform according to contrary order substantially.
Below in conjunction with accompanying drawing, the present invention is described in further detail.
The present invention can be matched with wearable electronic by mobile device and realize.Particularly, mobile device and wearable electronic set up matching relationship; Subsequently, the biological information that mobile device matches with wearable electronic based on user carries out authentication to this user.
Wherein, described wearable electronic includes but not limited to as equipment such as intelligent watch, intelligent glasses, Intelligent bracelet, and other can be fixed on arbitrarily the smart machine on human body, as intelligent ring, intelligent necklace etc.Described mobile device includes but not limited to non-wearable electronic such as such as mobile phone, panel computer etc., and/or as the wearable electronic such as intelligent watch, Intelligent bracelet.Such as, when described mobile device is mobile phone, then certification involved in the present invention is the certification between non-wearable electronic and wearable electronic; If when described mobile device is Intelligent bracelet, then certification involved in the present invention is the certification between wearable electronic and wearable electronic.
Preferably, the solution of the present invention can by installing and the APP run in mobile device realization and the APP run in wearable electronic matches with installation.Further, the solution of the present invention also can by installing and the functional module running on the APP in mobile device realization and the functional module running on the APP in wearable electronic matches with installation.
Fig. 1 illustrates a kind of according to an embodiment of the invention being matched with wearable electronic by mobile device, to realize the method flow diagram of certification.In step sl, mobile device 1 and wearable electronic 2 set up matching relationship; In step s 2, the biological information that mobile device 1 matches with wearable electronic 2 based on user carries out authentication to this user.
Particularly, in step sl, mobile device 1 and wearable electronic 2 set up matching relationship.
Mobile device 1 and wearable electronic 2 can based on one or more wireless transmission protocols, wireless connections pipeline is set up between mobile device 1 and wearable electronic 2, both are mutually mated in connection, thus makes can carry out data interaction between mobile device 1 and wearable electronic 2.Wherein, described wireless transmission protocol such as Bluetooth protocol, WIFI agreement etc.
At this, set up matching relationship such as: its device id is sent to wearable electronic 2 by mobile device 1, wearable electronic 2 confirms the device id of mobile device 1, and this mobile device 1 is added trust list, thus allows this mobile device 1 to send data to wearable electronic 2; Then, its device id is sent to mobile device 1 by wearable electronic 2, mobile device 1 confirms the device id of wearable electronic 2, and this wearable electronic 2 is added trust list, thus allows this wearable electronic 2 to send data to mobile device 1.At this, the process of described confirmation device id can confirm automatically based on the affirmation mode preset (as allowed arbitrary equipment to mate, or allowing the equipment etc. with specific ID or specific identifier), also can based on user's manual confirmation.
Such as, when adopting Bluetooth protocol as wireless transmission protocol, the pairing mode of bluetooth equipment can be adopted, mutual by one or many, mobile device 1 and the device identification of wearable electronic 2 are sent to counterpart device, and the relation that breaks the wall of mistrust between the two, to make can carry out data transmission between the two.
At this, preferably, the described process setting up matching relationship can be set up after via security protocol encryption, and after described matching relationship is set up, follow-up data transmission also can be carried out via after security protocol encryption.
In step s 2, the biological information that mobile device 1 matches with wearable electronic 2 based on user carries out authentication to this user.
At this, " mobile device 1 matches with wearable electronic 2 " means mobile device 1 by wearable electronic 2, wearable electronic 2 mobility-aid apparatus 1.Such as, the biological information of user that mobile device 1 can gather by wearable electronic 2 carries out authentication to user.And for example, wearable electronic 2 gathers the biological information of user, and carries out authentication to user accordingly, and then authentication result is sent to mobile device 1, to complete the authentication to user.
The biological information of user includes but not limited to various collection or the information of measurable characterizing individual physiological property or behavior.Biological information such as fingerprint, electrocardio fingerprint, face, iris, heart rate, the temperature etc. of user.
Because the biological information of user can characterizing individual physiological property or behavior, therefore, the biological information of user can be used to carry out authentication to user.
Whether licensed described authentication mean user identity whether safety or checking.
Biological information based on user can carry out according to predefined mode the step that user carries out authentication.Such as, by the biological information of energy unique identification user, as electrocardio fingerprint, authentication is carried out to user.Particularly, the electrocardio fingerprint of the user collected can be used to compare with the safety of preserving in advance or licensed safe electrocardio fingerprint, if unanimously, then the authentication of this user is passed through; If inconsistent, then the authentication of this user is not passed through.And for example, also authentication can be carried out simply by bio-identification to user.Particularly, when collecting user's heart rate, then the authentication of this user is passed through; When not collecting user's heart rate, then the authentication of this user is not passed through.
Wherein, wearable electronic 2 can have following at least any one sensor by device, and gathers the biological information of user by the sensor of institute's device:
1) fingerprint sensor.
At this, fingerprint sensor can gather the fingerprint of user.
User can in advance by the one or more fingerprint of fingerprint sensor typing of wearable electronic 2, and by this (s) fingerprint be set as security fingerprint.
Subsequently, the fingerprint of fingerprint sensor Real-time Collection can be used to compare with security fingerprint, if unanimously, then the authentication of this user is passed through; If inconsistent, then the authentication of this user is not passed through.
2) EGC sensor.
At this, EGC sensor can gather the electrocardio fingerprint of user.
This electrocardio fingerprint in advance by the electrocardio fingerprint of the EGC sensor typing user of wearable electronic 2, and can be set as safe electrocardio fingerprint by user.Such as, one of EGC sensor extremely can be positioned at the back side as the wearable electronic such as Intelligent bracelet 2 and contact with the arm skin of user, and, another of EGC sensor extremely can be positioned at side as the wearable electronic such as Intelligent bracelet 2 or front, and user can press to form current return with another hand.When forming current return, the electrocardio fingerprint of user can be logged.
Subsequently, the electrocardio fingerprint of electrocardio fingerprint sensor Real-time Collection can be used to compare with safe electrocardio fingerprint, if unanimously, then the authentication of this user is passed through; If inconsistent, then the authentication of this user is not passed through.
3) heart rate sensor.
At this, heart rate sensor can the heartbeat data of monitor user '.
Heart rate sensor can the heartbeat of Real-time Collection user, if heart rate sensor can collect user's heartbeat, then the authentication of this user is passed through; If heart rate sensor can not collect user's heartbeat, then the authentication of this user is not passed through.
4) temperature sensor.
At this, temperature sensor can collecting temperature data.Temperature sensor can be positioned at the back side as the wearable electronic such as Intelligent bracelet 2 and contact with user's skin, with the arm temperature of monitor user '.Temperature sensor such as infrared type temperature sensor etc.
Temperature sensor can the body temperature of Real-time Collection user, if temperature sensor can collect user's body temperature, then the authentication of this user is passed through; If temperature sensor can not collect user's body temperature, then the authentication of this user is not passed through.
5) range sensor.
At this, range sensor can detect the distance of itself and user.Range sensor can be positioned at the back side as the wearable electronic such as Intelligent bracelet 2, and monitors the distance of wearable electronic 2 and user's arm.
Range sensor can the distance of Real-time Collection itself and user, if the distance of itself and user that range sensor collects is less than predetermined safe distance, then the authentication of this user is passed through; If user do not detected in safe distance, then the authentication of this user is not passed through.
6) sensor is withheld.
At this, withhold sensor and can detect as whether the wearable electronic such as Intelligent bracelet, intelligent watch 2 is in wearing state.Such as, withhold on wrist strap that sensor can be positioned at as the wearable electronic such as Intelligent bracelet, intelligent watch 2, and monitor wrist strap by modes such as magnetic, contact, pressure or electric currents and whether be in the state buckled.
If wearable electronic 2 is in wearing state, then the authentication of this user is passed through; If wearable electronic 2 is not in wearing state, then the authentication of this user is not passed through.
When wearable electronic 2 is run, sensor as aforementioned is in work ready state.
At this, the step of user being carried out to authentication both can be carried out at mobile device 1 end, also can carry out at wearable electronic 2 end.The biological information that mobile device 1 matches with wearable electronic 2 based on user includes but not limited to following 2 kinds to the mode that this user carries out authentication:
1) step of user being carried out to authentication is carried out at mobile device 1 end.
At this, the step of user being carried out to authentication can be carried out according to following 4 sub-steps.
1.1) mobile device 1 sends the collection request of the biological information to user to wearable electronic 2, and correspondingly, wearable electronic 2 receives the collection request of the biological information to this user from mobile device 1.
1.2) then, wearable electronic 2 gathers the biological information of this user.
At this, wearable electronic 2 can gather the biological information of user according to the sensor of its device, as gathered electrocardio fingerprint by EGC sensor, gathering heart rate etc. by heart rate sensor.
Or, in the collection request that mobile device 1 sends, also can comprise the specified biological information gathered of mobile device 1.Wearable electronic 2 also can gather according to the specified biological information gathered of mobile device 1.
1.3) subsequently, wearable electronic 2 sends the biological information of this user to mobile device 1, and correspondingly, mobile device 1 receives the biological information of this user from wearable electronic 2.
1.4) then, mobile device 1 carries out authentication according to received biological information to user.
At this, mobile device 1 directly can carry out authentication according to received biological information, and such as, when receiving the heart rate data of user, mobile device 1 determines that user passes through authentication.Received biological information and the safe biologic characteristic information preserved in advance also can compare by mobile device 1, and such as, when received electrocardio fingerprint is consistent with the safe electrocardio fingerprint preserved in advance, mobile device 1 determines that this user passes through authentication.
2) step of user being carried out to authentication is carried out at wearable electronic 2 end.
At this, the step of user being carried out to authentication can be carried out according to following 3 sub-steps.
2.1) mobile device 1 sends request user being carried out to authentication to wearable electronic 2, and correspondingly, wearable electronic 2 receives the request this user being carried out to authentication from mobile device 1.
2.2) wearable electronic 2 gathers the biological information of user and carries out authentication based on this biological information.
At this, wearable electronic 2 can gather some or multiple biological information according to default behavior, and carries out authentication according to gathered biological information.
Or what mobile device 1 sent carries out also can comprising in the request of authentication to user one or more biological informations that mobile device 1 specifies.Correspondingly, wearable electronic 2 gathers the biological information specified by mobile device 1, and carries out authentication according to the biological information of specified collection.
At this, wearable electronic 2 carries out the mode of authentication, and the mode of carrying out authentication with aforementioned mobile device 1 is identical or substantially identical, therefore repeats no more, and is contained in this by reference.
2.3) wearable electronic 2 sends the authentication result of user being carried out to authentication to mobile device 1, and correspondingly, mobile device 1 receives the authentication result of this user being carried out to authentication from wearable electronic 2.
At this, the authentication result of authentication can comprise user by authentication, or user is not by authentication etc.
Those skilled in the art will be understood that; the biological information that aforementioned 2 kinds of mobile devices 1 match with wearable electronic 2 based on user is only citing to the mode that this user carries out authentication; and should not be regarded as any limitation of the invention; any other scheme existing or may occur from now on the mode of authentication is carried out as being applicable to the present invention to user; also within scope should being included in, and this is contained at this with way of reference.Such as, when by withholding sensor, wearable electronic 2 detects that it is in wearing state, wearable electronic 2 can measure the heart rate data of user by heart rate sensor.Then, wearable electronic 2 directly can carry out authentication according to the heart rate data of this user, and the authentication result of authentication is sent to mobile device 1.Or the heart rate data of this user also can be sent to mobile device 1 by wearable electronic 2, carries out authentication for mobile device 1 according to this heart rate data.
In sum, the biological information that mobile device 1 matches with wearable electronic 2 based on user comprises many kinds to the mode that this user carries out authentication.Such as, from the angle of the biological information of user, mobile device 1 and wearable electronic 2 match and only can carry out authentication based on the biological information of the corresponding user measured by a sensor.Mobile device 1 and wearable electronic 2 match also can carry out authentication based on the biological information of the corresponding multiple users measured by multiple sensor.From the initiator of authentication, the step of authentication can be initiated by mobile device 1, and such as mobile device 1 sends the collection request of the biological information of user or user carried out to the request of authentication to wearable electronic 2; The step of authentication also can be initiated by wearable electronic 2, such as when by withholding sensor, wearable electronic 2 detects that it is in wearing state, the biological information of collection is sent to mobile device 1 by wearable electronic 2, or the authentication result of authentication is sent to mobile device 1.
The biological information that mobile device 1 matches with wearable electronic 2 based on user includes but not limited to following at least any one to the content that this user carries out authentication:
1) bio-identification.
At this, the biological information that mobile device 1 and wearable electronic 2 can match based on user carries out bio-identification to this user.
As mentioned before, wearable electronic 2 can have the device such as heart rate sensor or temperature sensor and measures the data such as heart rate, temperature by device.The data such as heart rate, temperature can be used to carry out bio-identification to user.
Such as, when the temperature that the wearable electronic such as Intelligent bracelet, intelligent watch 2 measures heart rate data or measurement meets biological body temperature, mobile device 1 and wearable electronic 2 can determine that the wearable electronic such as Intelligent bracelet, intelligent watch 2 is worn by biology.
At this, " carrying out bio-identification to user " should be interpreted broadly.Precisely, " user " should be regarded as " object "." carry out bio-identification to user " and should be regarded as " carrying out bio-identification to object ", also, object is likely biological, also likely abiotic.
Mobile device 1 biological information matched with wearable electronic 2 based on user identifies user for biological, represents that this user passes through authentication; It is abiotic that mobile device 1 biological information matched with wearable electronic 2 based on user identifies user, represents that this user does not pass through authentication.
2) user identifies.
At this, the biological information that mobile device 1 and wearable electronic 2 can match based on user carries out user's identification to this user.
As mentioned before, wearable electronic 2 can have the device such as fingerprint sensor or EGC sensor and measures the data such as user fingerprints, electrocardio fingerprint by device.The data such as fingerprint, electrocardio fingerprint can be used to carry out user's identification to user, such as, identify particular user or identify whether active user is secured user.
Such as, when the fingerprint that the wearable electronic such as Intelligent bracelet, intelligent watch 2 measures, electrocardio fingerprint and the security fingerprint preserved in advance, safe electrocardio fingerprint are consistent, mobile device 1 and wearable electronic 2 can determine that the wearable electronic such as Intelligent bracelet, intelligent watch 2 is worn by secured user.
It is secured user that mobile device 1 biological information matched with wearable electronic 2 based on user identifies user, represents that this user passes through authentication; The biological information that mobile device 1 matches with wearable electronic 2 based on user identifies user's insecure user, represents that this user does not pass through authentication.
Preferably, when determining that wearable electronic 2 is in wearing state, the biological information that mobile device 1 matches with wearable electronic 2 based on user carries out authentication to this user.
At this, wearable electronic 2 or can be withheld sensor and determines whether wearable electronic 2 is in wearing state by the range sensor of its device.Such as, if the distance of itself and user that range sensor collects is less than predetermined safe distance, then wearable electronic 2 is in wearing state; If user do not detected in safe distance, then wearable electronic 2 is not in wearing state.And for example, if the wearable electronic such as Intelligent bracelet, intelligent watch 2 by its wrist strap withhold sensor detect that wrist strap is in the state buckled time, wearable electronic 2 is in wearing state; If when wrist strap is in the state of not buckleing, wearable electronic 2 is not in wearing state.
Such as, mobile device 1 sends to wearable electronic 2 determines whether wearable electronic 2 is in the request of wearing state, and correspondingly, wearable electronic 2 receives this request.Then, wearable electronic 2 by determine in real time or its information feed back being in wearing state of determining before this to mobile device 1, correspondingly, mobile device 1 obtains the information that wearable electronic 2 is in wearing state.Subsequently, the biological information that mobile device 1 matches with wearable electronic 2 based on user carries out authentication to this user.
More preferably, when each user wears wearable electronic 2, wearable electronic 2 all can gather the biological information of user, and then coordinates with mobile device 1 and carry out authentication to this user.
According to a preferred embodiment of the present invention, mobile device 1 first according to the connection status with wearable electronic 2, can carry out safety certification to wearable electronic 2.Subsequently, when wearable electronic 2 through safety certification, the biological information that mobile device 1 matches with wearable electronic 2 based on user carries out authentication to this user.
At this, mobile device 1 includes but not limited to following at least any one with the connection status of wearable electronic 2:
1) mobile device 1 is connected with wearable electronic 2 is current or does not connect.
Such as, mobile device 1 detects its current connected device list, is currently in this mobile device 1 the one or more equipment be connected, and detects in the said equipment whether comprise wearable electronic 2 to obtain.
At this, if mobile device 1 is connected with wearable electronic 2 is current, then wearable electronic 2 through safety certification.If mobile device 1 is not connected with wearable electronic 2 is current, then wearable electronic 2 is not through safety certification.
2) mobile device 1 and the signal intensity of wearable electronic 2 are higher or lower than predetermined signal strength threshold value.
At this, if wireless signal strength is less than predetermined signal strength threshold value between mobile device 1 and wearable electronic 2, then think both hypertelorism, therefore wearable electronic 2 is not through safety certification; Otherwise if wireless signal strength is more than or equal to predetermined signal strength threshold value between mobile device 1 and wearable electronic 2, then think that both distances meet secured physical distance, therefore wearable electronic 2 through safety certification.
3) mobile device 1 is less than or greater than predetermined physical distance threshold with the physical distance of wearable electronic 2.
At this, described physical distance can measure based on signal intensity, also can measure based on such as range sensor etc.When physical distance when is between the two greater than predetermined physical distance threshold, then think the hypertelorism of mobile device 1 and wearable electronic 2, as may respectively with it the different users, therefore wearable electronic 2 can not be through safety certification; Otherwise when the physical distance when is between the two less than predetermined physical distance threshold, then think that mobile device 1 and wearable electronic 2 are in safe distance, as with it same user, therefore wearable electronic 2 is by safety certification.
Those skilled in the art will be understood that and aforementionedly not only can be undertaken by mobile device 1 step that opposite equip. carries out safety certification, also can be undertaken by wearable electronic 2.Such as, wearable electronic 2 carries out safety certification according to the connection status with mobile device 1 to mobile device 1.Subsequently, when mobile device 1 through safety certification, the biological information that both match based on user carries out authentication to this user.
At this, wearable electronic 2 carries out the mode of safety certification to mobile device 1 according to the connection status with mobile device 1, the mode of carrying out safety certification according to the connection status with wearable electronic 2 to wearable electronic 2 with aforementioned mobile device 1 is identical or substantially identical, therefore repeat no more, and be contained in this by reference.
In addition, the result of authentication/safety certification can present to user, as presented on the initiating equipment of certification or all presenting on two equipment.Or, only when authentification failure, corresponding failure cause is presented to user.Failure cause such as mobile device 1 does not connect wearable electronic 2, mobile device 1 is not in wearing state away from wearable electronic 2, wearable electronic 2, user is disabled user.
What propose in the present invention carries out authentication to user and may be used for multiple use, such as, pay, account logs in.
For the purpose of simple declaration, the present invention only illustrates to pay.Those skilled in the art will be understood that the purposes such as other accounts that are existing or that may occur from now on log in are as being applicable to the present invention, within also should being included in scope, and are contained in this at this with way of reference.
At this, the initiation of payment can be carried out at mobile device 1 end, also can carry out at wearable electronic 2 end.
According to a preferred exemplary of the present invention, mobile device 1 obtains the payment request of user; When user is by authentication, mobile device 1 completes payment.
At this, described payment request includes but not limited to the request of various payment, such as, transfer accounts to merchant payment or to other user.
The biological information that mobile device 1 can match with wearable electronic 2 in real time based on user carries out authentication to user.Concrete authentication procedures can be undertaken by mobile device 1 or wearable electronic 2 as previously mentioned.When user is by authentication, the payment that mobile device 1 completing user is asked.Such as, when user is by authentication, mobile device 1 is to merchant payment.
At this, authentication can with payment " integrated ".Such as, mobile device 1 directly can complete payment user by during authentication, and no longer needs user to input the security information such as payment cipher.Or, the intermediate link of authentication still for paying.Such as, mobile device 1 can require that user meets correct input payment cipher simultaneously and just completes payment by authentication.
Those skilled in the art will be understood that the payment request of aforementioned acquisition user and the step completing payment also can be undertaken by wearable electronic 2.Also namely, wearable electronic 2 obtains the payment request of user, and when user is by authentication, wearable electronic 2 completes payment.Similarly, wherein concrete authentication procedures also can be undertaken by mobile device 1 or wearable electronic 2 as previously mentioned.At this, the payment request of user can directly be obtained by such as the modes such as scanning Quick Response Code or user directly input by wearable electronic 2, or the payment request of user also can send to wearable electronic 2 by mobile device 1.
Those skilled in the art will be understood that the step of authentication and payment can all be carried out at same equipment place, such as, all at mobile device 1 or all carry out at wearable electronic 2 place.Such as, or the step of authentication and payment can also can be carried out at distinct device place respectively, and, obtained the payment request of user by mobile device 1, when wearable electronic 2 completes the authentication to this user, mobile device 1 completes payment.
In addition, the result of payment can present user, also can not present.Further, payment result can only present at initiating equipment place, as presented at mobile device 1 place or presenting at wearable electronic 2 place.Or payment result all can also present at two equipment places.
Fig. 2 illustrates an apparatus in accordance with one embodiment of the invention schematic diagram, and it specifically illustrates by incompatible device user being carried out to authentication that matches in mobile device and wearable electronic.
As shown in Figure 2, the first authenticate device 10 is installed in mobile device 1, and specifically comprises device 11 and device 12.Second authenticate device 20 is installed in wearable electronic 2, and specifically comprises device 21 and device 22.
The device 11 of mobile device 1 is (for ease of distinguishing, below device 11 is called the first coupling apparatus for establishing 11) set up matching relationship with the device 21 (for ease of distinguishing, below device 21 being called the second coupling apparatus for establishing 21) of wearable electronic 2; Subsequently, the device 12 of mobile device 1 is (for ease of distinguishing, below device 12 being called the first identification authentication system 12) biological information that matches based on user with the device 22 (for ease of distinguishing, below device 22 being called the second identification authentication system 22) of wearable electronic 2 carries out authentication to this user.
Particularly, the first coupling apparatus for establishing 11 of mobile device 1 mates apparatus for establishing 21 with second of wearable electronic 2 and sets up matching relationship.
First coupling apparatus for establishing 11 mates apparatus for establishing 21 with second can based on one or more wireless transmission protocols, wireless connections pipeline is set up between mobile device 1 and wearable electronic 2, both are mutually mated in connection, thus makes can carry out data interaction between mobile device 1 and wearable electronic 2.Wherein, described wireless transmission protocol such as Bluetooth protocol, WIFI agreement etc.
At this, set up matching relationship such as: the device id of mobile device 1 is sent to wearable electronic 2 by the first coupling apparatus for establishing 11 of mobile device 1, second coupling apparatus for establishing 21 of wearable electronic 2 confirms the device id of mobile device 1, and this mobile device 1 is added trust list, thus this mobile device 1 is allowed to send data to wearable electronic 2; Then, the device id of this wearable electronic 2 is sent to mobile device 1 by the second coupling apparatus for establishing 21 of wearable electronic 2, first coupling apparatus for establishing 11 of mobile device 1 confirms the device id of wearable electronic 2, and this wearable electronic 2 is added trust list, thus this wearable electronic 2 is allowed to send data to mobile device 1.At this, the process of described confirmation device id can confirm automatically based on the affirmation mode preset (as allowed arbitrary equipment to mate, or allowing the equipment etc. with specific ID or specific identifier), also can based on user's manual confirmation.
Such as, when adopting Bluetooth protocol as wireless transmission protocol, the pairing mode of bluetooth equipment can be adopted, mutual by one or many, mobile device 1 is sent to counterpart device with the device identification of wearable electronic 2, with the relation that breaks the wall of mistrust between the two, thus make can carry out data transmission between the two.
At this, preferably, the described process setting up matching relationship can be set up after via security protocol encryption, and after described matching relationship is set up, follow-up data transmission also can be carried out via after security protocol encryption.
Subsequently, the biological information that the first identification authentication system 12 of mobile device 1 matches with the second identification authentication system 22 of wearable electronic 2 based on user carries out authentication to this user.
At this, " the first identification authentication system 12 matches with the second identification authentication system 22 " means the first identification authentication system 12 by auxiliary first identification authentication system 12 of the second identification authentication system 22, second identification authentication system 22.Such as, the biological information of user that the first identification authentication system 12 can gather by the second identification authentication system 22 carries out authentication to user.And for example, the second identification authentication system 22 gathers the biological information of user, and carries out authentication to user accordingly, and then authentication result is sent to the first identification authentication system 12 of mobile device 1, to complete the authentication to user.
The biological information of user includes but not limited to various collection or the information of measurable characterizing individual physiological property or behavior.Biological information such as fingerprint, electrocardio fingerprint, face, iris, heart rate, the temperature etc. of user.
Because the biological information of user can characterizing individual physiological property or behavior, therefore, the biological information of user can be used to carry out authentication to user.
Whether licensed described authentication mean user identity whether safety or checking.
Biological information based on user can perform according to predefined mode the authentication that user carries out.Such as, by the biological information of energy unique identification user, as electrocardio fingerprint, authentication is carried out to user.Particularly, the electrocardio fingerprint of the user collected can be used to compare with the safety of preserving in advance or licensed safe electrocardio fingerprint, if unanimously, then the authentication of this user is passed through; If inconsistent, then the authentication of this user is not passed through.And for example, also authentication can be carried out simply by bio-identification to user.Particularly, when collecting user's heart rate, then the authentication of this user is passed through; When not collecting user's heart rate, then the authentication of this user is not passed through.
Wherein, wearable electronic 2 can have following at least any one sensor by device, and gathers the biological information of user by the sensor of institute's device:
1) fingerprint sensor.
At this, fingerprint sensor can gather the fingerprint of user.
User can in advance by the one or more fingerprint of fingerprint sensor typing of wearable electronic 2, and by this (s) fingerprint be set as security fingerprint.
Subsequently, the fingerprint of fingerprint sensor Real-time Collection can be used to compare with security fingerprint, if unanimously, then the authentication of this user is passed through; If inconsistent, then the authentication of this user is not passed through.
2) EGC sensor.
At this, EGC sensor can gather the electrocardio fingerprint of user.
This electrocardio fingerprint in advance by the electrocardio fingerprint of the EGC sensor typing user of wearable electronic 2, and can be set as safe electrocardio fingerprint by user.Such as, one of EGC sensor extremely can be positioned at the back side as the wearable electronic such as Intelligent bracelet 2 and contact with the arm skin of user, and, another of EGC sensor extremely can be positioned at side as the wearable electronic such as Intelligent bracelet 2 or front, and user can press to form current return with another hand.When forming current return, the electrocardio fingerprint of user can be logged.
Subsequently, the electrocardio fingerprint of electrocardio fingerprint sensor Real-time Collection can be used to compare with safe electrocardio fingerprint, if unanimously, then the authentication of this user is passed through; If inconsistent, then the authentication of this user is not passed through.
3) heart rate sensor.
At this, heart rate sensor can the heartbeat data of monitor user '.
Heart rate sensor can the heartbeat of Real-time Collection user, if heart rate sensor can collect user's heartbeat, then the authentication of this user is passed through; If heart rate sensor can not collect user's heartbeat, then the authentication of this user is not passed through.
4) temperature sensor.
At this, temperature sensor can collecting temperature data.Temperature sensor can be positioned at the back side as the wearable electronic such as Intelligent bracelet 2 and contact with user's skin, with the arm temperature of monitor user '.Temperature sensor such as infrared type temperature sensor etc.
Temperature sensor can the body temperature of Real-time Collection user, if temperature sensor can collect user's body temperature, then the authentication of this user is passed through; If temperature sensor can not collect user's body temperature, then the authentication of this user is not passed through.
5) range sensor.
At this, range sensor can detect the distance of itself and user.Range sensor can be positioned at the back side as the wearable electronic such as Intelligent bracelet 2, and monitors the distance of wearable electronic 2 and user's arm.
Range sensor can the distance of Real-time Collection itself and user, if the distance of itself and user that range sensor collects is less than predetermined safe distance, then the authentication of this user is passed through; If user do not detected in safe distance, then the authentication of this user is not passed through.
6) sensor is withheld.
At this, withhold sensor and can detect as whether the wearable electronic such as Intelligent bracelet, intelligent watch 2 is in wearing state.Such as, withhold on wrist strap that sensor can be positioned at as the wearable electronic such as Intelligent bracelet, intelligent watch 2, and monitor wrist strap by modes such as magnetic, contact, pressure or electric currents and whether be in the state buckled.
If wearable electronic 2 is in wearing state, then the authentication of this user is passed through; If wearable electronic 2 is not in wearing state, then the authentication of this user is not passed through.
When wearable electronic 2 is run, sensor as aforementioned is in work ready state.
At this, operation user being carried out to authentication both can be performed by the first identification authentication system 12, also can be performed by the second identification authentication system 22.The biological information that first identification authentication system 12 matches with the second identification authentication system 22 based on user includes but not limited to following 2 kinds to the mode that this user carries out authentication:
1) operation user being carried out to authentication is performed by the first identification authentication system 12.
At this, operation user being carried out to authentication can perform according to following 4 child-operations.
1.1) the first identification authentication system 12 of mobile device 1 sends the collection request of the biological information to user to wearable electronic 2, correspondingly, the second identification authentication system 22 of wearable electronic 2 receives the collection request of the biological information to this user from mobile device 1.
1.2) then, the second identification authentication system 22 gathers the biological information of this user.
At this, the second identification authentication system 22 can gather the biological information of user according to the sensor of its device, as gathered electrocardio fingerprint by EGC sensor, gathering heart rate etc. by heart rate sensor.
Or, in the collection request that the first identification authentication system 12 of mobile device 1 sends, also can comprise the specified biological information gathered of the first identification authentication system 12.Second identification authentication system 22 of wearable electronic 2 also can gather according to the specified biological information gathered of the first identification authentication system 12.
1.3) subsequently, second identification authentication system 22 of wearable electronic 2 sends the biological information of this user to mobile device 1, correspondingly, the first identification authentication system 12 of mobile device 1 receives the biological information of this user from wearable electronic 2.
1.4) then, the first identification authentication system 12 of mobile device 1 carries out authentication according to received biological information to user.
At this, the first identification authentication system 12 directly can carry out authentication according to received biological information, and such as, when receiving the heart rate data of user, mobile device 1 determines that user passes through authentication.Received biological information and the safe biologic characteristic information preserved in advance also can compare by the first identification authentication system 12, such as, when received electrocardio fingerprint is consistent with the safe electrocardio fingerprint preserved in advance, the first identification authentication system 12 determines that this user passes through authentication.
2) operation user being carried out to authentication is performed by the second identification authentication system 22.
At this, operation user being carried out to authentication can perform according to following 3 child-operations.
2.1) the first identification authentication system 12 of mobile device 1 sends request user being carried out to authentication to wearable electronic 2, correspondingly, the second identification authentication system 22 of wearable electronic 2 receives the request this user being carried out to authentication from mobile device 1.
2.2) the second identification authentication system 22 of wearable electronic 2 gathers the biological information of user and carries out authentication based on this biological information.
At this, the second identification authentication system 22 can gather some or multiple biological information according to default behavior, and carries out authentication according to gathered biological information.
Or what the first identification authentication system 12 of mobile device 1 sent carries out also can comprising in the request of authentication to user one or more biological informations that the first identification authentication system 12 specifies.Correspondingly, the second identification authentication system 22 of wearable electronic 2 gathers the biological information specified by the first identification authentication system 12, and carries out authentication according to the biological information of specified collection.
At this, second identification authentication system 22 of wearable electronic 2 carries out the mode of authentication, the mode of carrying out authentication with the first identification authentication system 12 of aforementioned mobile device 1 is identical or substantially identical, therefore repeats no more, and is contained in this by reference.
2.3) the second identification authentication system 22 of wearable electronic 2 sends the authentication result of user being carried out to authentication to mobile device 1, correspondingly, the first identification authentication system 12 of mobile device 1 receives the authentication result of this user being carried out to authentication from wearable electronic 2.
At this, the authentication result of authentication can comprise user by authentication, or user is not by authentication etc.
Those skilled in the art will be understood that; the biological information that aforementioned 2 kind of first identification authentication system 12 matches with the second identification authentication system 22 based on user is only citing to the mode that this user carries out authentication; and should not be regarded as any limitation of the invention; any other scheme existing or may occur from now on the mode of authentication is carried out as being applicable to the present invention to user; also within scope should being included in, and this is contained at this with way of reference.Such as, when by withholding sensor, wearable electronic 2 detects that it is in wearing state, the second identification authentication system 22 of wearable electronic 2 can measure the heart rate data of user by heart rate sensor.Then, the second identification authentication system 22 directly can carry out authentication according to the heart rate data of this user, and the authentication result of authentication is sent to mobile device 1.Or the heart rate data of this user also can be sent to mobile device 1 by the second identification authentication system 22 of wearable electronic 2, the first identification authentication system 12 for mobile device 1 carries out authentication according to this heart rate data.
In sum, the biological information that the first identification authentication system 12 matches with the second identification authentication system 22 based on user comprises many kinds to the mode that this user carries out authentication.Such as, from the angle of the biological information of user, the first identification authentication system 12 and the second identification authentication system 22 match and only can carry out authentication based on the biological information of the corresponding user measured by a sensor.First identification authentication system 12 and the second identification authentication system 22 match also can carry out authentication based on the biological information of the corresponding multiple users measured by multiple sensor.From the initiator of authentication, the operation of authentication can be initiated by the first identification authentication system 12, and such as the first identification authentication system 12 sends the collection request of the biological information of user or user carried out to the request of authentication to wearable electronic 2; The operation of authentication also can be initiated by the second identification authentication system 22, such as when by withholding sensor, wearable electronic 2 detects that it is in wearing state, the biological information of collection is sent to mobile device 1 by the second identification authentication system 22, or the authentication result of authentication is sent to mobile device 1.The biological information that first identification authentication system 12 matches with the second identification authentication system 22 based on user includes but not limited to following at least any one to the content that this user carries out authentication:
1) bio-identification.
At this, the biological information that the first identification authentication system 12 and the second identification authentication system 22 can match based on user carries out bio-identification to this user.
As mentioned before, wearable electronic 2 can have the device such as heart rate sensor or temperature sensor and measures the data such as heart rate, temperature by device.The data such as heart rate, temperature can be used to carry out bio-identification to user.
Such as, when the temperature that the wearable electronic such as Intelligent bracelet, intelligent watch 2 measures heart rate data or measurement meets biological body temperature, with the second identification authentication system 22 of wearable electronic 2, the first identification authentication system 12 of mobile device 1 can determine that the wearable electronic such as Intelligent bracelet, intelligent watch 2 is worn by biology.
At this, " carrying out bio-identification to user " should be interpreted broadly.Precisely, " user " should be regarded as " object "." carry out bio-identification to user " and should be regarded as " carrying out bio-identification to object ", also, object is likely biological, also likely abiotic.
First identification authentication system 12 biological information matched with the second identification authentication system 22 based on user identifies user for biological, represents that this user passes through authentication; It is abiotic that first identification authentication system 12 biological information matched with the second identification authentication system 22 based on user identifies user, represents that this user does not pass through authentication.
2) user identifies.
At this, the biological information that the first identification authentication system 12 and the second identification authentication system 22 can match based on user carries out user's identification to this user.
As mentioned before, wearable electronic 2 can have the device such as fingerprint sensor or EGC sensor and measures the data such as user fingerprints, electrocardio fingerprint by device.The data such as fingerprint, electrocardio fingerprint can be used to carry out user's identification to user, such as, identify particular user or identify whether active user is secured user.
Such as, when the fingerprint that the wearable electronic such as Intelligent bracelet, intelligent watch 2 measures, electrocardio fingerprint and the security fingerprint preserved in advance, safe electrocardio fingerprint are consistent, with the second identification authentication system 22 of wearable electronic 2, the first identification authentication system 12 of mobile device 1 can determine that the wearable electronic such as Intelligent bracelet, intelligent watch 2 is worn by secured user.
It is secured user that first identification authentication system 12 biological information matched with the second identification authentication system 22 based on user identifies user, represents that this user passes through authentication; The biological information that first identification authentication system 12 matches with the second identification authentication system 22 based on user identifies user's insecure user, represents that this user does not pass through authentication.
Preferably, when determining that wearable electronic 2 is in wearing state, the biological information that mobile device 1 matches with wearable electronic 2 based on user carries out authentication to this user.
At this, wearable electronic 2 or can be withheld sensor and determines whether wearable electronic 2 is in wearing state by the range sensor of its device.Such as, if the distance of itself and user that range sensor collects is less than predetermined safe distance, then wearable electronic 2 is in wearing state; If user do not detected in safe distance, then wearable electronic 2 is not in wearing state.And for example, if the wearable electronic such as Intelligent bracelet, intelligent watch 2 by its wrist strap withhold sensor detect that wrist strap is in the state buckled time, wearable electronic 2 is in wearing state; If when wrist strap is in the state of not buckleing, wearable electronic 2 is not in wearing state.
Such as, other specific devices in first identification authentication system 12 or mobile device 1 send to wearable electronic 2 determines whether wearable electronic 2 is in the request of wearing state, correspondingly, other specific devices in the second identification authentication system 22 or wearable electronic 2 receive this request.Then, other specific devices in second identification authentication system 22 or wearable electronic 2 by determine in real time or its information feed back being in wearing state of determining before this to mobile device 1, correspondingly, other specific devices in the first identification authentication system 12 or mobile device 1 obtain the information that wearable electronic 2 is in wearing state.Subsequently, the biological information that the first identification authentication system 12 of mobile device 1 matches with the second identification authentication system 22 of wearable electronic 2 based on user carries out authentication to this user.
More preferably, when each user wears wearable electronic 2, second identification authentication system 22 of wearable electronic 2 all can gather the biological information of user, and then coordinates with the first identification authentication system 12 of mobile device 1 and carry out authentication to this user.
According to a preferred embodiment of the present invention, mobile device 1 can also comprise the first safety certification device (not shown in Fig. 2), first safety certification device of mobile device 1 first according to the connection status with wearable electronic 2, can carry out safety certification to wearable electronic 2.Subsequently, when wearable electronic 2 through safety certification, the biological information that the first identification authentication system 12 of mobile device 1 matches with the second identification authentication system 22 of wearable electronic 2 based on user carries out authentication to this user.
At this, mobile device 1 includes but not limited to following at least any one with the connection status of wearable electronic 2:
1) mobile device 1 is connected with wearable electronic 2 is current or does not connect.
Such as, the first safety certification device of mobile device 1 detects its current connected device list, is currently in this mobile device 1 the one or more equipment be connected, and detects in the said equipment whether comprise wearable electronic 2 to obtain.
At this, if mobile device 1 is connected with wearable electronic 2 is current, then wearable electronic 2 through safety certification.If mobile device 1 is not connected with wearable electronic 2 is current, then wearable electronic 2 is not through safety certification.
2) mobile device 1 and the signal intensity of wearable electronic 2 are higher or lower than predetermined signal strength threshold value.
At this, if wireless signal strength is less than predetermined signal strength threshold value between mobile device 1 and wearable electronic 2, then think both hypertelorism, therefore wearable electronic 2 is not through safety certification; Otherwise if wireless signal strength is more than or equal to predetermined signal strength threshold value between mobile device 1 and wearable electronic 2, then think that both distances meet secured physical distance, therefore wearable electronic 2 through safety certification.
3) mobile device 1 is less than or greater than predetermined physical distance threshold with the physical distance of wearable electronic 2.
At this, described physical distance can measure based on signal intensity, also can measure based on such as range sensor etc.When physical distance when is between the two greater than predetermined physical distance threshold, then think the hypertelorism of mobile device 1 and wearable electronic 2, as may respectively with it the different users, therefore wearable electronic 2 can not be through safety certification; Otherwise when the physical distance when is between the two less than predetermined physical distance threshold, then think that mobile device 1 and wearable electronic 2 are in safe distance, as with it same user, therefore wearable electronic 2 is by safety certification.
Preferably, the first safety certification device can integrate with the first identification authentication system 12.
Those skilled in the art will be understood that the aforementioned operation carrying out safety certification to opposite equip. not only can be performed by the first safety certification device of mobile device 1, also can be performed by wearable electronic 2.Such as, wearable electronic 2 can also comprise the second safety certification device (also not shown in Fig. 2), and the second safety certification device carries out safety certification according to wearable electronic 2 and the connection status of mobile device 1 to mobile device 1.Subsequently, when mobile device 1 through safety certification, the biological information that the first identification authentication system 12 of mobile device 1 matches with the second identification authentication system 22 of wearable electronic 2 based on user carries out authentication to this user.
At this, second safety certification device of wearable electronic 2 carries out the mode of safety certification to mobile device 1 according to the connection status of wearable electronic 2 and mobile device 1, the mode of carrying out safety certification according to mobile device 1 and the connection status of wearable electronic 2 to wearable electronic 2 with the first safety certification device of aforementioned mobile device 1 is identical or substantially identical, therefore repeat no more, and be contained in this by reference.
Preferably, the second safety certification device can integrate with the second identification authentication system 22.
In addition, the result of authentication/safety certification can present to user, as presented on the initiating equipment of certification or all presenting on two equipment.Or, only when authentification failure, corresponding failure cause is presented to user.Failure cause such as mobile device 1 does not connect wearable electronic 2, mobile device 1 is not in wearing state away from wearable electronic 2, wearable electronic 2, user is disabled user.
What propose in the present invention carries out authentication to user and may be used for multiple use, such as, pay, account logs in.
For the purpose of simple declaration, the present invention only illustrates to pay.Those skilled in the art will be understood that the purposes such as other accounts that are existing or that may occur from now on log in are as being applicable to the present invention, within also should being included in scope, and are contained in this at this with way of reference.
At this, the initiation of payment can be performed by mobile device 1, also can be performed by wearable electronic 2.
According to a preferred exemplary of the present invention, mobile device 1 can also comprise the first acquisition request device and first and pay finishing device (not shown in Fig. 2).First acquisition request device obtains the payment request of user; When user is by authentication, first pays finishing device completes payment.
At this, described payment request includes but not limited to the request of various payment, such as, transfer accounts to merchant payment or to other user.
The biological information that first identification authentication system 12 of mobile device 1 can match with the second identification authentication system 22 of wearable electronic 2 in real time based on user carries out authentication to user.Concrete authentication operation can be performed by the first identification authentication system 12 or the second identification authentication system 22 as previously mentioned.When user is by authentication, first of mobile device 1 pays the payment that finishing device completing user is asked.Such as, when user is by authentication, first pays finishing device to merchant payment.
At this, authentication can with payment " integrated ".Such as, first of mobile device 1 pays finishing device directly can complete payment user by during authentication, and no longer needs user to input the security information such as payment cipher.Or, the intermediate link of authentication still for paying.Such as, the first payment finishing device of mobile device 1 can require that user meets correct input payment cipher simultaneously and just completes payment by authentication.
Those skilled in the art will be understood that the payment request of aforementioned acquisition user and the operation completing payment also can be performed by wearable electronic 2.Such as, wearable electronic 2 can also comprise the second acquisition request device and second and pay finishing device (all not shown in Fig. 2), second acquisition request device of wearable electronic 2 obtains the payment request of user, when user is by authentication, second of wearable electronic 2 pays finishing device and completes payment.Similarly, wherein concrete authentication operation also can be performed by the first identification authentication system 12 of mobile device 1 or the second identification authentication system 22 of wearable electronic 2 as previously mentioned.At this, the payment request of user can directly be obtained by such as the modes such as scanning Quick Response Code or user directly input by the second acquisition request device of wearable electronic 2, or the payment request of user also can send to wearable electronic 2 by mobile device 1.
Those skilled in the art will be understood that the operation of authentication and payment can perform by same equipment, such as, perform by mobile device 1 or by wearable electronic 2.Or, the operation of authentication and payment can also can be performed by distinct device respectively, such as, the payment request of user is obtained by the first acquisition request device of mobile device 1, when the second identification authentication system 22 of wearable electronic 2 completes the authentication to this user, first of mobile device 1 pays finishing device and completes payment.
In addition, the result of payment can present user, also can not present.Further, payment result can only present at initiating equipment place, as presented at mobile device 1 place or presenting at wearable electronic 2 place.Or payment result all can also present at two equipment places.
It should be noted that the present invention can be implemented in the assembly of software and/or software restraint, such as, each device of the present invention can adopt special IC (ASIC) or any other similar hardware device to realize.In one embodiment, software program of the present invention can perform to realize step mentioned above or function by processor.Similarly, software program of the present invention (comprising relevant data structure) can be stored in computer readable recording medium storing program for performing, such as, and RAM storer, magnetic or CD-ROM driver or flexible plastic disc and similar devices.In addition, steps more of the present invention or function can adopt hardware to realize, such as, as coordinating with processor thus performing the circuit of each step or function.
To those skilled in the art, obviously the invention is not restricted to the details of above-mentioned one exemplary embodiment, and when not deviating from spirit of the present invention or essential characteristic, the present invention can be realized in other specific forms.Therefore, no matter from which point, all should embodiment be regarded as exemplary, and be nonrestrictive, scope of the present invention is limited by claims instead of above-mentioned explanation, and all changes be therefore intended in the implication of the equivalency by dropping on claim and scope are included in the present invention.Any Reference numeral in claim should be considered as the claim involved by limiting.In addition, obviously " comprising " one word do not get rid of other unit or step, odd number does not get rid of plural number.Multiple unit of stating in system claims or device also can be realized by software or hardware by a unit or device.First, second word such as grade is used for representing title, and does not represent any specific order.
Although show and describe exemplary embodiment especially above, it will be appreciated by those skilled in the art that when not deviating from the spirit and scope of claims, can change to some extent in its form and details.Here sought protection is set forth in the dependent claims.Define in following numbering clause each embodiment these and other in:
1., for carrying out a method for certification at mobile device end, wherein, the method comprises:
-set up matching relationship with one or more wearable electronic;
Wherein, the method also comprises:
-based on the biological information of user, authentication is carried out to described user by described wearable electronic.
2. the method described in clause 1, wherein, the step of described authentication specifically comprises:
-send the collection request to the biological information of described user to described wearable electronic;
-biological information of described user is received from described wearable electronic;
-according to described biological information, authentication is carried out to described user.
3. the method described in clause 1, wherein, the step of described authentication specifically comprises:
-request user being carried out to authentication is sent to described wearable electronic;
-authentication result of described user being carried out to authentication is received from described wearable electronic, described authentication is undertaken by the biological information of described wearable electronic based on described user.
4. the method according to any one of clause 1 to 3, wherein, the content of described authentication comprises following at least any one:
-bio-identification;
-user identifies.
5. the method according to any one of clause 1 to 4, wherein, the step of described authentication is determining to carry out when described wearable electronic is in wearing state.
6. the method according to any one of clause 1 to 5, wherein, before the step of described authentication, the method also comprises:
-according to the connection status with described wearable electronic, safety certification is carried out to described wearable electronic.
7. the method according to any one of clause 1 to 6, wherein, the method also comprises:
-obtain the payment request of described user;
-when described user is by described authentication, complete payment.
8., for carrying out a method for certification at wearable electronic end, wherein, the method comprises:
-set up matching relationship with mobile device;
Wherein, the method also comprises:
-auxiliary described mobile device carries out authentication based on the biological information of user to described user.
9. the method described in clause 8, wherein, the step of described authentication specifically comprises:
-receive the collection request to the biological information of described user from described mobile device;
-gather the biological information of described user;
-biological information of described user is sent to described mobile device, for described mobile device, authentication is carried out to described user.
10. the method described in clause 8, wherein, the step of described authentication specifically comprises:
-request user being carried out to authentication is received from described mobile device;
-authentication result of described user being carried out to authentication is sent to described mobile device, described authentication is undertaken by the biological information of described wearable electronic based on described user.
Method according to any one of 11. clauses 8 to 10, wherein, the content of described authentication comprises following at least any one:
-bio-identification;
-user identifies.
Method according to any one of 12. clauses 8 to 11, wherein, the step of described authentication is determining to carry out when described wearable electronic is in wearing state.
Method according to any one of 13. clauses 8 to 12, wherein, before the step of described authentication, the method also comprises:
-according to the connection status with described mobile device, safety certification is carried out to described mobile device.
Method according to any one of 14. clauses 8 to 13, wherein, the method also comprises:
-obtain the payment request of described user;
-when described user is by described authentication, complete payment.
15. 1 kinds for carrying out the device of certification at mobile device end, wherein, this device comprises:
-for setting up the device of matching relationship with one or more wearable electronic;
Wherein, this device also comprises:
-for carrying out the device of authentication to described user based on the biological information of user by described wearable electronic.
Device described in 16. clauses 15, wherein, the device of described authentication specifically for:
-send the collection request to the biological information of described user to described wearable electronic;
-biological information of described user is received from described wearable electronic;
-according to described biological information, authentication is carried out to described user.
Device described in 17. clauses 15, wherein, the device of described authentication specifically for:
-request user being carried out to authentication is sent to described wearable electronic;
-authentication result of described user being carried out to authentication is received from described wearable electronic, described authentication is undertaken by the biological information of described wearable electronic based on described user.
Device according to any one of 18. clauses 15 to 17, wherein, the content of described authentication comprises following at least any one:
-bio-identification;
-user identifies.
Device according to any one of 19. clauses 15 to 18, wherein, the device of described authentication performs when determining that described wearable electronic is in wearing state.
Device according to any one of 20. clauses 15 to 19, wherein, this device also comprises:
-for according to the connection status with described wearable electronic, described wearable electronic is carried out to the device of safety certification.
Device according to any one of 21. clauses 15 to 20, wherein, this device also comprises:
-for obtaining the device of the payment request of described user;
-for when described user is by described authentication, complete the device of payment.
22. 1 kinds are used for the device of certification at wearable electronic end, and wherein, this device comprises:
-for setting up the device of matching relationship with mobile device;
Wherein, this device also comprises:
-based on the biological information of user, described user is carried out to the device of authentication for auxiliary described mobile device.
Device described in 23. clauses 22, wherein, the device of described authentication specifically for:
-receive the collection request to the biological information of described user from described mobile device;
-gather the biological information of described user;
-biological information of described user is sent to described mobile device, for described mobile device, authentication is carried out to described user.
Device described in 24. clauses 22, wherein, the device of described authentication specifically for:
-request user being carried out to authentication is received from described mobile device;
-authentication result of described user being carried out to authentication is sent to described mobile device, described authentication is undertaken by the biological information of described wearable electronic based on described user.
Device according to any one of 25. clauses 22 to 24, wherein, the content of described authentication comprises following at least any one:
-bio-identification;
-user identifies.
Device according to any one of 26. clauses 22 to 25, wherein, the device of described authentication performs when determining that described wearable electronic is in wearing state.
Device according to any one of 27. clauses 22 to 26, wherein, this device also comprises:
-for according to the connection status with described mobile device, described mobile device is carried out to the device of safety certification.
Device according to any one of 28. clauses 22 to 27, wherein, this device also comprises:
-for obtaining the device of the payment request of described user;
-for when described user is by described authentication, complete the device of payment.
29. 1 kinds of mobile devices for certification, comprise the device according to any one of clause 15 to 21.
30. 1 kinds of wearable electronic for certification, comprise the device according to any one of clause 22 to 28.
31. 1 kinds of systems for certification, comprise the mobile device as described in clause 29 and the wearable electronic as described in clause 30.

Claims (31)

1., for carrying out a method for certification at mobile device end, wherein, the method comprises:
-set up matching relationship with one or more wearable electronic;
Wherein, the method also comprises:
-based on the biological information of user, authentication is carried out to described user by described wearable electronic.
2. method according to claim 1, wherein, the step of described authentication specifically comprises:
-send the collection request to the biological information of described user to described wearable electronic;
-biological information of described user is received from described wearable electronic;
-according to described biological information, authentication is carried out to described user.
3. method according to claim 1, wherein, the step of described authentication specifically comprises:
-request user being carried out to authentication is sent to described wearable electronic;
-authentication result of described user being carried out to authentication is received from described wearable electronic, described authentication is undertaken by the biological information of described wearable electronic based on described user.
4. according to the method in any one of claims 1 to 3, wherein, the content of described authentication comprises following at least any one:
-bio-identification;
-user identifies.
5. method according to any one of claim 1 to 4, wherein, the step of described authentication is determining to carry out when described wearable electronic is in wearing state.
6. method according to any one of claim 1 to 5, wherein, before the step of described authentication, the method also comprises:
-according to the connection status with described wearable electronic, safety certification is carried out to described wearable electronic.
7. method according to any one of claim 1 to 6, wherein, the method also comprises:
-obtain the payment request of described user;
-when described user is by described authentication, complete payment.
8., for carrying out a method for certification at wearable electronic end, wherein, the method comprises:
-set up matching relationship with mobile device;
Wherein, the method also comprises:
-auxiliary described mobile device carries out authentication based on the biological information of user to described user.
9. method according to claim 8, wherein, the step of described authentication specifically comprises:
-receive the collection request to the biological information of described user from described mobile device;
-gather the biological information of described user;
-biological information of described user is sent to described mobile device, for described mobile device, authentication is carried out to described user.
10. method according to claim 8, wherein, the step of described authentication specifically comprises:
-request user being carried out to authentication is received from described mobile device;
-authentication result of described user being carried out to authentication is sent to described mobile device, described authentication is undertaken by the biological information of described wearable electronic based on described user.
Method according to any one of 11. according to Claim 8 to 10, wherein, the content of described authentication comprises following at least any one:
-bio-identification;
-user identifies.
Method according to any one of 12. according to Claim 8 to 11, wherein, the step of described authentication is determining to carry out when described wearable electronic is in wearing state.
Method according to any one of 13. according to Claim 8 to 12, wherein, before the step of described authentication, the method also comprises:
-according to the connection status with described mobile device, safety certification is carried out to described mobile device.
Method according to any one of 14. according to Claim 8 to 13, wherein, the method also comprises:
-obtain the payment request of described user;
-when described user is by described authentication, complete payment.
15. 1 kinds for carrying out the device of certification at mobile device end, wherein, this device comprises:
-for setting up the device of matching relationship with one or more wearable electronic;
Wherein, this device also comprises:
-for carrying out the device of authentication to described user based on the biological information of user by described wearable electronic.
16. devices according to claim 15, wherein, the device of described authentication specifically for:
-send the collection request to the biological information of described user to described wearable electronic;
-biological information of described user is received from described wearable electronic;
-according to described biological information, authentication is carried out to described user.
17. devices according to claim 15, wherein, the device of described authentication specifically for:
-request user being carried out to authentication is sent to described wearable electronic;
-authentication result of described user being carried out to authentication is received from described wearable electronic, described authentication is undertaken by the biological information of described wearable electronic based on described user.
18. according to claim 15 to the device according to any one of 17, and wherein, the content of described authentication comprises following at least any one:
-bio-identification;
-user identifies.
19. according to claim 15 to the device according to any one of 18, and wherein, the device of described authentication performs when determining that described wearable electronic is in wearing state.
20. according to claim 15 to the device according to any one of 19, and wherein, this device also comprises:
-for according to the connection status with described wearable electronic, described wearable electronic is carried out to the device of safety certification.
21. according to claim 15 to the device according to any one of 20, and wherein, this device also comprises:
-for obtaining the device of the payment request of described user;
-for when described user is by described authentication, complete the device of payment.
22. 1 kinds are used for the device of certification at wearable electronic end, and wherein, this device comprises:
-for setting up the device of matching relationship with mobile device;
Wherein, this device also comprises:
-based on the biological information of user, described user is carried out to the device of authentication for auxiliary described mobile device.
23. devices according to claim 22, wherein, the device of described authentication specifically for:
-receive the collection request to the biological information of described user from described mobile device;
-gather the biological information of described user;
-biological information of described user is sent to described mobile device, for described mobile device, authentication is carried out to described user.
24. devices according to claim 22, wherein, the device of described authentication specifically for:
-request user being carried out to authentication is received from described mobile device;
-authentication result of described user being carried out to authentication is sent to described mobile device, described authentication is undertaken by the biological information of described wearable electronic based on described user.
25. devices according to any one of claim 22 to 24, wherein, the content of described authentication comprises following at least any one:
-bio-identification;
-user identifies.
26. devices according to any one of claim 22 to 25, wherein, the device of described authentication performs when determining that described wearable electronic is in wearing state.
27. devices according to any one of claim 22 to 26, wherein, this device also comprises:
-for according to the connection status with described mobile device, described mobile device is carried out to the device of safety certification.
28. devices according to any one of claim 22 to 27, wherein, this device also comprises:
-for obtaining the device of the payment request of described user;
-for when described user is by described authentication, complete the device of payment.
29. 1 kinds of mobile devices for certification, comprise the device according to any one of claim 15 to 21.
30. 1 kinds of wearable electronic for certification, comprise the device according to any one of claim 22 to 28.
31. 1 kinds of systems for certification, comprise mobile device as claimed in claim 29 and wearable electronic as claimed in claim 30.
CN201510131538.0A 2015-03-24 2015-03-24 Method, device, equipment and system used for authentication Pending CN104794381A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510131538.0A CN104794381A (en) 2015-03-24 2015-03-24 Method, device, equipment and system used for authentication
PCT/CN2015/092887 WO2016150154A1 (en) 2015-03-24 2015-10-27 Method, apparatus, device, and system used for mobile authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510131538.0A CN104794381A (en) 2015-03-24 2015-03-24 Method, device, equipment and system used for authentication

Publications (1)

Publication Number Publication Date
CN104794381A true CN104794381A (en) 2015-07-22

Family

ID=53559171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510131538.0A Pending CN104794381A (en) 2015-03-24 2015-03-24 Method, device, equipment and system used for authentication

Country Status (2)

Country Link
CN (1) CN104794381A (en)
WO (1) WO2016150154A1 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105184136A (en) * 2015-09-08 2015-12-23 京东方科技集团股份有限公司 Identity recognition method, device and system
CN105245346A (en) * 2015-10-19 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and user terminal
CN105245507A (en) * 2015-09-23 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Communication link establishing method and device
CN105447370A (en) * 2015-12-07 2016-03-30 联想(北京)有限公司 Electronic device and control method therefor
WO2016150154A1 (en) * 2015-03-24 2016-09-29 百度在线网络技术(北京)有限公司 Method, apparatus, device, and system used for mobile authentication
CN106295297A (en) * 2016-08-05 2017-01-04 联想(北京)有限公司 A kind of personal identification method, electronic equipment and wearable device
CN106302380A (en) * 2015-06-29 2017-01-04 京瓷办公信息系统株式会社 Certification device
CN106293075A (en) * 2016-07-29 2017-01-04 石家庄蜗牛科技有限公司 A kind of control system based on wearable device and control method
CN106446627A (en) * 2016-08-31 2017-02-22 广州三星通信技术研究有限公司 Method and device for carrying out identity authentication at electronic terminal
CN106793163A (en) * 2016-12-22 2017-05-31 上海摩软通讯技术有限公司 Wearable device, communication system and communication means
CN107026817A (en) * 2016-01-29 2017-08-08 李明 The system that a kind of password is automatically entered
CN107026736A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Input number of times is reduced by it
CN107026732A (en) * 2016-01-29 2017-08-08 李明 A kind of system that Password Input number of times is reduced by wearable device
CN107026737A (en) * 2016-01-29 2017-08-08 李明 A kind of system that Password Management is carried out by wearable device
CN107026733A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Management is carried out by it
CN107026734A (en) * 2016-01-29 2017-08-08 李明 A kind of method and system that Password Management is carried out using certification lasting effectiveness
CN107220012A (en) * 2016-03-22 2017-09-29 柯尼卡美能达株式会社 Image processing system, wearable computer and user authen method
CN107528691A (en) * 2016-06-21 2017-12-29 中兴通讯股份有限公司 Communication security control method and wearable device
WO2018018807A1 (en) * 2016-07-25 2018-02-01 中兴通讯股份有限公司 Control method, service sensor, service device, terminal, and computer storage medium
CN107925579A (en) * 2015-08-25 2018-04-17 索尼公司 Communication equipment, communication means and communication system
CN108446912A (en) * 2018-05-03 2018-08-24 中国工商银行股份有限公司 Safety certifying method and equipment
CN108629167A (en) * 2018-05-09 2018-10-09 西安交通大学 A kind of more smart machine identity identifying methods of combination wearable device
CN109117612A (en) * 2018-07-03 2019-01-01 普联技术有限公司 Personal identification method, device and the storage medium of smartwatch
CN111756909A (en) * 2019-03-28 2020-10-09 奇酷互联网络科技(深圳)有限公司 Information protection method and system for electronic equipment, electronic equipment and storage device
CN113536273A (en) * 2021-08-09 2021-10-22 北京国民安盾科技有限公司 Method and system for recognizing cooperative biological characteristics between devices
CN113726734A (en) * 2018-03-09 2021-11-30 山东量子科学技术研究院有限公司 Quantum key distribution network, wearable device and target server
CN114051250A (en) * 2021-11-30 2022-02-15 上海豪承信息技术有限公司 Identity verification method and device based on wearable equipment and wearable equipment

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106533687B (en) 2015-09-14 2019-11-08 阿里巴巴集团控股有限公司 A kind of identity identifying method and equipment
TWI705347B (en) * 2017-01-19 2020-09-21 香港商阿里巴巴集團服務有限公司 Identity authentication method and equipment
CN111481191A (en) * 2020-03-30 2020-08-04 上海赛族网络科技有限公司 Adjusting system based on electrocardio sensor parameter
CN117156438A (en) * 2023-02-03 2023-12-01 荣耀终端有限公司 Account login method and terminal equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310142A (en) * 2013-05-22 2013-09-18 复旦大学 Man-machine fusion security authentication method based on wearable equipment
CN103914645A (en) * 2014-04-03 2014-07-09 百度在线网络技术(北京)有限公司 Identity authentication method and wearing device
CN104050402A (en) * 2014-06-12 2014-09-17 深圳市汇顶科技股份有限公司 Mobile terminal security certification method and system and mobile terminal
CN104092817A (en) * 2014-06-24 2014-10-08 惠州Tcl移动通信有限公司 Method and system for automatic short-distance unlocking of mobile terminal
CN104182670A (en) * 2013-05-21 2014-12-03 百度在线网络技术(北京)有限公司 Method for authenticating by virtue of wearable equipment and wearable equipment
US20150059002A1 (en) * 2013-08-20 2015-02-26 Ricoh Company, Ltd. Mobile Information Gateway for Service Provider Cooperation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159551B (en) * 2007-08-23 2010-06-02 北京飞天诚信科技有限公司 Multifunctional information safety equipment and method of use thereof
CN104331796A (en) * 2014-11-04 2015-02-04 北京握奇智能科技有限公司 Wearable device and working method thereof
CN104794381A (en) * 2015-03-24 2015-07-22 百度在线网络技术(北京)有限公司 Method, device, equipment and system used for authentication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182670A (en) * 2013-05-21 2014-12-03 百度在线网络技术(北京)有限公司 Method for authenticating by virtue of wearable equipment and wearable equipment
CN103310142A (en) * 2013-05-22 2013-09-18 复旦大学 Man-machine fusion security authentication method based on wearable equipment
US20150059002A1 (en) * 2013-08-20 2015-02-26 Ricoh Company, Ltd. Mobile Information Gateway for Service Provider Cooperation
CN103914645A (en) * 2014-04-03 2014-07-09 百度在线网络技术(北京)有限公司 Identity authentication method and wearing device
CN104050402A (en) * 2014-06-12 2014-09-17 深圳市汇顶科技股份有限公司 Mobile terminal security certification method and system and mobile terminal
CN104092817A (en) * 2014-06-24 2014-10-08 惠州Tcl移动通信有限公司 Method and system for automatic short-distance unlocking of mobile terminal

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016150154A1 (en) * 2015-03-24 2016-09-29 百度在线网络技术(北京)有限公司 Method, apparatus, device, and system used for mobile authentication
CN106302380A (en) * 2015-06-29 2017-01-04 京瓷办公信息系统株式会社 Certification device
CN106302380B (en) * 2015-06-29 2019-04-09 京瓷办公信息系统株式会社 Authentication device
CN107925579A (en) * 2015-08-25 2018-04-17 索尼公司 Communication equipment, communication means and communication system
CN105184136A (en) * 2015-09-08 2015-12-23 京东方科技集团股份有限公司 Identity recognition method, device and system
WO2017041458A1 (en) * 2015-09-08 2017-03-16 京东方科技集团股份有限公司 Identity recognition method, transmitting terminal, receiving terminal, wearable device and identity recognition system
CN105245507A (en) * 2015-09-23 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Communication link establishing method and device
CN105245346B (en) * 2015-10-19 2019-01-25 宇龙计算机通信科技(深圳)有限公司 A kind of identity identifying method and user terminal
CN105245346A (en) * 2015-10-19 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and user terminal
CN105447370A (en) * 2015-12-07 2016-03-30 联想(北京)有限公司 Electronic device and control method therefor
CN107026733A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Management is carried out by it
CN107026817A (en) * 2016-01-29 2017-08-08 李明 The system that a kind of password is automatically entered
CN107026736A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Input number of times is reduced by it
CN107026732A (en) * 2016-01-29 2017-08-08 李明 A kind of system that Password Input number of times is reduced by wearable device
CN107026737A (en) * 2016-01-29 2017-08-08 李明 A kind of system that Password Management is carried out by wearable device
CN107026734A (en) * 2016-01-29 2017-08-08 李明 A kind of method and system that Password Management is carried out using certification lasting effectiveness
CN107220012B (en) * 2016-03-22 2020-06-16 柯尼卡美能达株式会社 Image processing system, wearable computer, and user authentication method
CN107220012A (en) * 2016-03-22 2017-09-29 柯尼卡美能达株式会社 Image processing system, wearable computer and user authen method
CN107528691A (en) * 2016-06-21 2017-12-29 中兴通讯股份有限公司 Communication security control method and wearable device
WO2018018807A1 (en) * 2016-07-25 2018-02-01 中兴通讯股份有限公司 Control method, service sensor, service device, terminal, and computer storage medium
CN106293075A (en) * 2016-07-29 2017-01-04 石家庄蜗牛科技有限公司 A kind of control system based on wearable device and control method
CN106295297A (en) * 2016-08-05 2017-01-04 联想(北京)有限公司 A kind of personal identification method, electronic equipment and wearable device
CN106446627A (en) * 2016-08-31 2017-02-22 广州三星通信技术研究有限公司 Method and device for carrying out identity authentication at electronic terminal
CN106793163A (en) * 2016-12-22 2017-05-31 上海摩软通讯技术有限公司 Wearable device, communication system and communication means
CN113726734A (en) * 2018-03-09 2021-11-30 山东量子科学技术研究院有限公司 Quantum key distribution network, wearable device and target server
CN108446912A (en) * 2018-05-03 2018-08-24 中国工商银行股份有限公司 Safety certifying method and equipment
CN108629167A (en) * 2018-05-09 2018-10-09 西安交通大学 A kind of more smart machine identity identifying methods of combination wearable device
CN109117612A (en) * 2018-07-03 2019-01-01 普联技术有限公司 Personal identification method, device and the storage medium of smartwatch
CN111756909A (en) * 2019-03-28 2020-10-09 奇酷互联网络科技(深圳)有限公司 Information protection method and system for electronic equipment, electronic equipment and storage device
CN113536273A (en) * 2021-08-09 2021-10-22 北京国民安盾科技有限公司 Method and system for recognizing cooperative biological characteristics between devices
CN114051250A (en) * 2021-11-30 2022-02-15 上海豪承信息技术有限公司 Identity verification method and device based on wearable equipment and wearable equipment

Also Published As

Publication number Publication date
WO2016150154A1 (en) 2016-09-29

Similar Documents

Publication Publication Date Title
CN104794381A (en) Method, device, equipment and system used for authentication
US10475260B2 (en) Wearable electronic device having user identification function and user authentication method
JP6712328B2 (en) Validating online access to secure device functionality
EP3479320B1 (en) Logical validation of devices against fraud and tampering
US9892576B2 (en) Biometrics identification module and personal wearable electronics network based authentication and transaction processing
CA2900762C (en) Control system and method
CN104796258A (en) Mobile authentication method, mobile authentication device and mobile authentication system
US20160125417A1 (en) Terminal for magnetic secure transmission
US9842329B2 (en) Body area network for secure payment
CN105656627B (en) Identity authentication method, device, system, processing method, equipment and storage medium
AU2013363220B2 (en) Method and apparatus for using sensors on a portable electronic device to verify transactions
US20140214674A1 (en) Method and system for conducting secure transactions with credit cards using a monitoring device
CN104182871A (en) Mobile payment system and smart wristband
CN103914645A (en) Identity authentication method and wearing device
US20160189134A1 (en) Collaborating user devices for security
TWI679556B (en) Transaction method, device and system for virtual reality environment
CN105956844B (en) Payment method and system
CN105427105A (en) Mobile payment method, system and device
CN203812271U (en) A mobile payment system and an intelligent bracelet
CN107370601B (en) Intelligent terminal, system and method integrating multiple security authentications
CN106446627A (en) Method and device for carrying out identity authentication at electronic terminal
CN105989488B (en) Payment method and system
CN105430149B (en) A kind of terminal user identity determines method and device
CN107437997A (en) A kind of frequency communication devices and method
JP7348331B2 (en) Systems, methods and devices for wireless gigabit (WiGig) computing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150722