CN105007167A - Communication verification method, terminal and wearable device - Google Patents

Communication verification method, terminal and wearable device Download PDF

Info

Publication number
CN105007167A
CN105007167A CN201510494095.1A CN201510494095A CN105007167A CN 105007167 A CN105007167 A CN 105007167A CN 201510494095 A CN201510494095 A CN 201510494095A CN 105007167 A CN105007167 A CN 105007167A
Authority
CN
China
Prior art keywords
wearable device
terminal
information
biological information
user biological
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510494095.1A
Other languages
Chinese (zh)
Inventor
马耀辉
翁箭峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510494095.1A priority Critical patent/CN105007167A/en
Priority to PCT/CN2015/088503 priority patent/WO2017024630A1/en
Publication of CN105007167A publication Critical patent/CN105007167A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Abstract

The invention provides a communication verification method, a terminal and a wearable device. The communication verification method comprises the steps of sending a communication verification command to the wearable device connected with the terminal according a received communication request so as to be provided for the wearable device to acquire user biological information according to the communication verification command; receiving the user biological information from the wearable device; verifying whether the user biological information conforms to predetermined verification information of the terminal or not; and determining whether the terminal is allowed to be communicated with the wearable device or not according to a verification result. According to the technical scheme provided by the invention, only when the user biological information acquired by the wearable device conforms to the predetermined verification information of the terminal, the terminal can be allowed to be communicated with the wearable device, thereby avoiding leakage of confidential data of users, ensuring the security of user information, and improving the user experience.

Description

Authentication method, terminal and wearable device
Technical field
The present invention relates to field of terminal technology, in particular to a kind of authentication method, a kind of terminal and a kind of wearable device.
Background technology
At present, because wearable device can the important information of display terminal and notice easily, and the user data of acquisition can also be sent to terminal by wearable device, terminal is enable better to manage this user data, so wearable device is more and more universal in daily life.
But, in traditional technical scheme, Wearable peripheral hardware just carrys out the information of display terminal as the display end of information, in addition, because the user of the wearable device be connected with terminal has uncertainty, so when terminal and wearable device carry out transfer of data, the situation that subscriber computer ciphertext data leaks may be there is, the fail safe of user profile can not be ensured.
Therefore, need a kind of new technical scheme, the situation that subscriber computer ciphertext data leaks can be avoided, ensure the fail safe of user profile.
Summary of the invention
The present invention, just based on the problems referred to above, proposes a kind of new technical scheme, can avoid the situation that subscriber computer ciphertext data leaks, and ensures the fail safe of user profile.
In view of this, a first aspect of the present invention proposes a kind of authentication method, for terminal, comprise: according to the communication request received, send authentication order to the wearable device be connected with described terminal, obtain user biological information for described wearable device according to described authentication order; And the user biological information received from described wearable device; Verify whether described user biological information conforms to the predetermined authentication information of described terminal; According to the result, determine whether to allow described terminal to communicate with described wearable device.
In this technical scheme, before terminal is connected with wearable device, judge whether conform to the predetermined authentication information of terminal from the user biological information of wearable device, if conformed to, terminal is allowed to communicate with wearable device, if do not conformed to, the communication between terminating terminal and wearable device.Pass through technique scheme, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In technique scheme, preferably, in the communication request that described basis receives, before sending authentication order to the wearable device be connected with described terminal, also comprise: according to the setting command received, described predetermined authentication information is set.
In this technical scheme, can arrange predetermined authentication information according to the actual needs of user, this predetermined authentication information includes but not limited to following one or a combination set of: finger print information, audio-frequency information, iris information, facial image information etc.By technique scheme, meet the diversified demand of user, improve Consumer's Experience.
In technique scheme, preferably, described reception is from the user biological information of described wearable device, specifically comprise: detect the described user biological information whether received in predetermined time interval from described wearable device, wherein, in described predetermined time interval, receiving described user biological information when detecting, allowing to verify described user biological information.
In this technical scheme, need to obtain user biological information by wearable device in predetermined time interval, could verify user biological information, be verified the communication between rear permission terminal and wearable device, if do not receive user biological information in predetermined time interval, communication then directly between terminating terminal and wearable device, wherein, predetermined time interval can set according to the needs of user.By technique scheme, need in predetermined time interval, get correct user biological information, terminal could communicate with between wearable device, more ensure that the fail safe of user profile, improves Consumer's Experience.
A second aspect of the present invention proposes a kind of terminal, comprise: verification command transmitting element, according to the communication request received, send authentication order to the wearable device be connected with described terminal, obtain user biological information for described wearable device according to described authentication order; And biological information receiving element, receive the user biological information from described wearable device; Biometric information verification unit, verifies whether described user biological information conforms to the predetermined authentication information of described terminal, for according to the result, determines whether to allow described terminal to communicate with described wearable device.
In this technical scheme, before terminal is connected with wearable device, judge whether conform to the predetermined authentication information of terminal from the user biological information of wearable device, if conformed to, terminal is allowed to communicate with wearable device, if do not conformed to, the communication between terminating terminal and wearable device.Pass through technique scheme, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In technique scheme, preferably, also comprise: setting unit, in the communication request that described basis receives, before sending authentication order to the wearable device be connected with described terminal, according to the setting command received, described predetermined authentication information is set.
In this technical scheme, can arrange predetermined authentication information according to the actual needs of user, this predetermined authentication information includes but not limited to following one or a combination set of: finger print information, audio-frequency information, iris information, facial image information etc.By technique scheme, meet the diversified demand of user, improve Consumer's Experience.
In technique scheme, preferably, described biological information receiving element comprises: detecting unit, detect the described user biological information whether received in predetermined time interval from described wearable device, wherein, in described predetermined time interval, receiving described user biological information when detecting, allowing to verify described user biological information.
In this technical scheme, need to obtain user biological information by wearable device in predetermined time interval, could verify user biological information, be verified the communication between rear permission terminal and wearable device, if do not receive user biological information in predetermined time interval, communication then directly between terminating terminal and wearable device, wherein, predetermined time interval can set according to the needs of user.By technique scheme, need in predetermined time interval, get correct user biological information, terminal could communicate with between wearable device, more ensure that the fail safe of user profile, improves Consumer's Experience.
A third aspect of the present invention proposes a kind of authentication method, for wearable device, comprising: receive the authentication order from the terminal be connected with described wearable device; According to described authentication order, gather user biological information; The described user biological information obtained being sent to described terminal, determining whether to allow described terminal to communicate with described wearable device by verifying whether described user biological information and the predetermined authentication information of described terminal conform to for described terminal.
In this technical scheme, before wearable device is connected with terminal, terminal can send authentication order to wearable device, then wearable device will obtain user biological information, like this, terminal just can judge this user biological information with predetermined authentication information whether conform to, if conformed to, allow terminal communicate with wearable device, if do not conformed to, the communication between terminating terminal and wearable device.Pass through technique scheme, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In technique scheme, preferably, described user biological information comprise following at least one or a combination set of: finger print information, palmprint information, iris information, facial image information.
In this technical scheme, the user biological information that wearable device obtains includes but not limited to following one or a combination set of: finger print information, palmprint information, iris information, facial image information, suitable biological information can be selected from these biological informations as user biological information according to the actual needs of user, and then meet the diversified needs of user, convenient for users to use.
A fourth aspect of the present invention proposes a kind of wearable device, comprising: receiving element, receives the authentication order from the terminal be connected with described wearable device; Biomedical information acquisition unit, according to described authentication order, gathers user biological information; Biological information transmitting element, the described user biological information obtained being sent to described terminal, determining whether to allow described terminal to communicate with described wearable device by verifying whether described user biological information and the predetermined authentication information of described terminal conform to for described terminal.
In this technical scheme, before wearable device is connected with terminal, terminal can send authentication order to wearable device, then wearable device will obtain user biological information, like this, terminal just can judge this user biological information with predetermined authentication information whether conform to, if conformed to, allow terminal communicate with wearable device, if do not conformed to, the communication between terminating terminal and wearable device.Pass through technique scheme, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In technique scheme, preferably, described user biological information comprise following at least one or a combination set of: finger print information, palmprint information, iris information, facial image information.
In this technical scheme, the user biological information that wearable device obtains includes but not limited to following one or a combination set of: finger print information, palmprint information, iris information, facial image information, suitable biological information can be selected from these biological informations as user biological information according to the actual needs of user, and then meet the diversified needs of user, convenient for users to use.
By technical scheme of the present invention, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 shows the flow chart of authentication method according to an embodiment of the invention;
Fig. 2 shows the block diagram of terminal according to an embodiment of the invention;
Fig. 3 shows the flow chart of authentication method according to another embodiment of the invention;
Fig. 4 shows the block diagram of wearable device according to an embodiment of the invention;
Fig. 5 shows terminal according to an embodiment of the invention carries out authentication flow chart to wearable device.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the flow chart of authentication method according to an embodiment of the invention.
As shown in Figure 1, authentication method according to an embodiment of the invention, for terminal, comprising:
Step 102, according to the communication request received, sends authentication order to the wearable device be connected with terminal, obtains user biological information for wearable device according to authentication order.
Step 104, receives the user biological information from wearable device.
Step 106, whether authentication of users biological information conforms to the predetermined authentication information of terminal.
Step 108, according to the result, determines whether to allow terminal to communicate with wearable device.
In this technical scheme, before terminal is connected with wearable device, judge whether conform to the predetermined authentication information of terminal from the user biological information of wearable device, if conformed to, terminal is allowed to communicate with wearable device, if do not conformed to, the communication between terminating terminal and wearable device.Pass through technique scheme, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In technique scheme, preferably, before step 102, also comprise: according to the setting command received, predetermined authentication information is set.
In this technical scheme, can arrange predetermined authentication information according to the actual needs of user, this predetermined authentication information includes but not limited to following one or a combination set of: finger print information, audio-frequency information, iris information, facial image information etc.By technique scheme, meet the diversified demand of user, improve Consumer's Experience.
In technique scheme, preferably, step 104 specifically comprises: detect the user biological information whether received in predetermined time interval from wearable device, wherein, in predetermined time interval, receiving user biological information when detecting, allowing to verify user biological information.
In this technical scheme, need to obtain user biological information by wearable device in predetermined time interval, could verify user biological information, be verified the communication between rear permission terminal and wearable device, if do not receive user biological information in predetermined time interval, communication then directly between terminating terminal and wearable device, wherein, predetermined time interval can set according to the needs of user.By technique scheme, need in predetermined time interval, get correct user biological information, terminal could communicate with between wearable device, more ensure that the fail safe of user profile, improves Consumer's Experience.
Fig. 2 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 2, terminal 200 according to an embodiment of the invention, comprise: verification command transmitting element 202, according to the communication request received, send authentication order to the wearable device be connected with terminal 200, obtain user biological information for wearable device according to authentication order; And biological information receiving element 204, receive the user biological information from wearable device; Biometric information verification unit 206, whether authentication of users biological information conforms to the predetermined authentication information of terminal 200, for according to the result, determines whether to allow terminal 200 to communicate with wearable device.
In this technical scheme, before terminal 200 is connected with wearable device, judge whether conform to the predetermined authentication information of terminal 200 from the user biological information of wearable device, if conformed to, terminal 200 is allowed to communicate with wearable device, if do not conformed to, the communication between terminating terminal 200 and wearable device.Pass through technique scheme, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal 200, terminal 200 could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In technique scheme, preferably, also comprise: setting unit 208, according to the communication request received, before sending authentication order to the wearable device be connected with terminal 200, according to the setting command received, predetermined authentication information is set.
In this technical scheme, can arrange predetermined authentication information according to the actual needs of user, this predetermined authentication information includes but not limited to following one or a combination set of: finger print information, audio-frequency information, iris information, facial image information etc.By technique scheme, meet the diversified demand of user, improve Consumer's Experience.
In technique scheme, preferably, biological information receiving element 204 comprises: detecting unit 2042, detect the user biological information whether received in predetermined time interval from wearable device, wherein, in predetermined time interval, receiving user biological information when detecting, allowing to verify user biological information.
In this technical scheme, need to obtain user biological information by wearable device in predetermined time interval, could verify user biological information, be verified the communication between rear permission terminal 200 and wearable device, if do not receive user biological information in predetermined time interval, communication then directly between terminating terminal 200 and wearable device, wherein, predetermined time interval can set according to the needs of user.By technique scheme, need in predetermined time interval, get correct user biological information, terminal 200 could communicate with between wearable device, more ensure that the fail safe of user profile, improves Consumer's Experience.
Fig. 3 shows the flow chart of authentication method according to another embodiment of the invention.
As shown in Figure 3, authentication method according to another embodiment of the invention, for wearable device, comprising:
Step 302, receives the authentication order from the terminal be connected with wearable device.
Step 304, according to authentication order, gathers user biological information.
Step 306, is sent to terminal by the user biological information of acquisition, and whether to be conformed to by authentication of users biological information and the predetermined authentication information of terminal for terminal determines whether to allow terminal to communicate with wearable device.
In this technical scheme, before wearable device is connected with terminal, terminal can send authentication order to wearable device, then wearable device will obtain user biological information, like this, terminal just can judge this user biological information with predetermined authentication information whether conform to, if conformed to, allow terminal communicate with wearable device, if do not conformed to, the communication between terminating terminal and wearable device.Pass through technique scheme, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In technique scheme, preferably, user biological information comprise following at least one or a combination set of: finger print information, palmprint information, iris information, facial image information.
In this technical scheme, the user biological information that wearable device obtains includes but not limited to following one or a combination set of: finger print information, palmprint information, iris information, facial image information, suitable biological information can be selected from these biological informations as user biological information according to the actual needs of user, and then meet the diversified needs of user, convenient for users to use.
Fig. 4 shows the block diagram of wearable device according to an embodiment of the invention.
As shown in Figure 4, wearable device 400 according to an embodiment of the invention, comprising: receiving element 402, receives the authentication order from the terminal be connected with wearable device 400; Biomedical information acquisition unit 404, according to authentication order, gathers user biological information; Biological information transmitting element 406, is sent to terminal by the user biological information of acquisition, and whether to be conformed to by authentication of users biological information and the predetermined authentication information of terminal for terminal determines whether to allow terminal to communicate with wearable device 400.
In this technical scheme, before wearable device 400 is connected with terminal, terminal can send authentication order to wearable device 400, then wearable device 400 will obtain user biological information, like this, terminal just can judge this user biological information with predetermined authentication information whether conform to, if conformed to, allow terminal communicate with wearable device 400, if do not conformed to, the communication between terminating terminal and wearable device 400.Pass through technique scheme, when the user biological information only obtained at wearable device 400 conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device 400, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In technique scheme, preferably, user biological information comprise following at least one or a combination set of: finger print information, palmprint information, iris information, facial image information.
In this technical scheme, the user biological information that wearable device 400 obtains includes but not limited to following one or a combination set of: finger print information, palmprint information, iris information, facial image information, suitable biological information can be selected from these biological informations as user biological information according to the actual needs of user, and then meet the diversified needs of user, convenient for users to use.
Fig. 5 shows terminal according to an embodiment of the invention carries out authentication flow chart to wearable device.
As shown in Figure 5, in the present embodiment, need before wearable device transmitter ciphertext data information in terminal, need to carry out identification checking to the state of contemporary wearable equipment and user identity, only have and to wearable device transmitter ciphertext data information, and then the situation that leaks of subscriber computer ciphertext data could be avoided by this verification terminal.
Specifically comprise:
Step 502, terminal is determined to need to wearable device transmitter ciphertext data.
Step 504, terminal communicates with wearable device, and obtains user biological information by wearable device.
Step 506, judging that whether user biological information is correct, when judged result is for being, entering step 508, be otherwise terminate communication when judged result.
Step 508, terminal communicates with wearable device, sends data to wearable device.
More than be described with reference to the accompanying drawings technical scheme of the present invention, by technical scheme of the present invention, when the user biological information only obtained at wearable device conforms to the predetermined authentication information of terminal, terminal could be allowed to communicate with wearable device, avoid the situation that subscriber computer ciphertext data leaks, ensure that the fail safe of user profile, improve Consumer's Experience.
In the description of this specification, specific features, structure, material or feature that the description of term " embodiment ", " another embodiment " means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, identical embodiment or example are not necessarily referred to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in an appropriate manner in any one or more embodiment or example.
In the present invention, term " first ", " second ", " the 3rd ", " the 4th " object only for describing, and instruction or hint relative importance can not be interpreted as.For the ordinary skill in the art, above-mentioned term concrete meaning in the present invention can be understood as the case may be.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an authentication method, for terminal, is characterized in that, comprising:
According to the communication request received, send authentication order to the wearable device be connected with described terminal, obtain user biological information for described wearable device according to described authentication order; And
Receive the user biological information from described wearable device;
Verify whether described user biological information conforms to the predetermined authentication information of described terminal;
According to the result, determine whether to allow described terminal to communicate with described wearable device.
2. authentication method according to claim 1, is characterized in that, in the communication request that described basis receives, before sending authentication order, also comprises to the wearable device be connected with described terminal:
According to the setting command received, described predetermined authentication information is set.
3. authentication method according to claim 1 and 2, is characterized in that, described reception, from the user biological information of described wearable device, specifically comprises:
Detect the described user biological information that whether receives in predetermined time interval from described wearable device, wherein, in described predetermined time interval, receiving described user biological information when detecting, allowing to verify described user biological information.
4. a terminal, is characterized in that, comprising:
Verification command transmitting element, according to the communication request received, sends authentication order to the wearable device be connected with described terminal, obtains user biological information for described wearable device according to described authentication order; And
Biological information receiving element, receives the user biological information from described wearable device;
Biometric information verification unit, verifies whether described user biological information conforms to the predetermined authentication information of described terminal, for according to the result, determines whether to allow described terminal to communicate with described wearable device.
5. terminal according to claim 4, is characterized in that, also comprises:
Setting unit, in the communication request that described basis receives, before sending authentication order, according to the setting command received, arranges described predetermined authentication information to the wearable device be connected with described terminal.
6. the terminal according to claim 4 or 5, is characterized in that, described biological information receiving element comprises:
Detecting unit, detect the described user biological information whether received in predetermined time interval from described wearable device, wherein, in described predetermined time interval, receiving described user biological information when detecting, allowing to verify described user biological information.
7. an authentication method, for wearable device, is characterized in that, comprising:
Receive the authentication order from the terminal be connected with described wearable device;
According to described authentication order, gather user biological information;
The described user biological information obtained being sent to described terminal, determining whether to allow described terminal to communicate with described wearable device by verifying whether described user biological information and the predetermined authentication information of described terminal conform to for described terminal.
8. authentication method according to claim 7, is characterized in that, described user biological information comprise following at least one or a combination set of: finger print information, palmprint information, iris information, facial image information.
9. a wearable device, is characterized in that, comprising:
Receiving element, receives the authentication order from the terminal be connected with described wearable device;
Biomedical information acquisition unit, according to described authentication order, gathers user biological information;
Biological information transmitting element, the described user biological information obtained being sent to described terminal, determining whether to allow described terminal to communicate with described wearable device by verifying whether described user biological information and the predetermined authentication information of described terminal conform to for described terminal.
10. wearable device according to claim 9, is characterized in that, described user biological information comprise following at least one or a combination set of: finger print information, palmprint information, iris information, facial image information.
CN201510494095.1A 2015-08-12 2015-08-12 Communication verification method, terminal and wearable device Pending CN105007167A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510494095.1A CN105007167A (en) 2015-08-12 2015-08-12 Communication verification method, terminal and wearable device
PCT/CN2015/088503 WO2017024630A1 (en) 2015-08-12 2015-08-30 Communication verification method, terminal, and wearable device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510494095.1A CN105007167A (en) 2015-08-12 2015-08-12 Communication verification method, terminal and wearable device

Publications (1)

Publication Number Publication Date
CN105007167A true CN105007167A (en) 2015-10-28

Family

ID=54379695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510494095.1A Pending CN105007167A (en) 2015-08-12 2015-08-12 Communication verification method, terminal and wearable device

Country Status (2)

Country Link
CN (1) CN105007167A (en)
WO (1) WO2017024630A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516889A (en) * 2015-11-23 2016-04-20 深圳还是威健康科技有限公司 Bluetooth connection method and terminal
CN105590049A (en) * 2015-12-22 2016-05-18 广东欧珀移动通信有限公司 Method and device for unlocking and locking screen by ring
CN105701386A (en) * 2016-02-18 2016-06-22 宇龙计算机通信科技(深圳)有限公司 Security certification method and device
CN105721468A (en) * 2016-02-17 2016-06-29 阿里巴巴集团控股有限公司 Communication method and device
CN106686537A (en) * 2017-02-27 2017-05-17 广东小天才科技有限公司 Information exchange method based on NFC and system thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104050402A (en) * 2014-06-12 2014-09-17 深圳市汇顶科技股份有限公司 Mobile terminal security certification method and system and mobile terminal
CN104346548A (en) * 2013-08-01 2015-02-11 华为技术有限公司 Wearable equipment and authentication method thereof

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108057A1 (en) * 2003-09-24 2005-05-19 Michal Cohen Medical device management system including a clinical system interface
CN103955823A (en) * 2014-05-14 2014-07-30 金陵科技学院 High-security portable collection and payment method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104346548A (en) * 2013-08-01 2015-02-11 华为技术有限公司 Wearable equipment and authentication method thereof
CN104050402A (en) * 2014-06-12 2014-09-17 深圳市汇顶科技股份有限公司 Mobile terminal security certification method and system and mobile terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516889A (en) * 2015-11-23 2016-04-20 深圳还是威健康科技有限公司 Bluetooth connection method and terminal
CN105590049A (en) * 2015-12-22 2016-05-18 广东欧珀移动通信有限公司 Method and device for unlocking and locking screen by ring
CN105721468A (en) * 2016-02-17 2016-06-29 阿里巴巴集团控股有限公司 Communication method and device
WO2017140214A1 (en) * 2016-02-17 2017-08-24 阿里巴巴集团控股有限公司 Communication method and apparatus
TWI729069B (en) * 2016-02-17 2021-06-01 香港商阿里巴巴集團服務有限公司 Communication method and device
CN105701386A (en) * 2016-02-18 2016-06-22 宇龙计算机通信科技(深圳)有限公司 Security certification method and device
CN106686537A (en) * 2017-02-27 2017-05-17 广东小天才科技有限公司 Information exchange method based on NFC and system thereof
CN106686537B (en) * 2017-02-27 2020-07-03 广东小天才科技有限公司 Information exchange method and system based on NFC

Also Published As

Publication number Publication date
WO2017024630A1 (en) 2017-02-16

Similar Documents

Publication Publication Date Title
CN105007167A (en) Communication verification method, terminal and wearable device
CN105160302A (en) Multi-model biological recognition general platform and multi-model biological recognition identity authentication method
CN102638790A (en) Password control method, device and system
CN104156657A (en) Information input method and information input device of terminal and terminal
CN107808127A (en) Face identification method and Related product
CN202353818U (en) System for ensuring secure communication between vehicle-mounted communication equipment and wireless terminal
CN105405185A (en) Safety verifying method and apparatus thereof
CN101964978A (en) Reinforcement method for strengthening safety of mobile terminal system on basis of safe TF card
CN104700270A (en) Payment request processing method, payment request processing device and terminal
CN106231534A (en) Mobile terminal and the number of writing thereof and method of disannuling a call, device
WO2013100961A1 (en) Method and apparatus to determine user presence
US10872327B2 (en) Mobile payment systems and mobile payment methods thereof
CN102413146B (en) Client authorized logon method based on dynamic codes
CN105722084A (en) Authentication method based on embedded subscriber identity module, and terminal
CN106656985A (en) Backup account login method, device and system
CN105700905B (en) The WIFI upgrade method and device of car-mounted terminal operating system
CN105430149B (en) A kind of terminal user identity determines method and device
CN105373226A (en) Terminal mode switching method and system
CN104579639A (en) Realizing for multi-party cooperation authorization key and system adopting same for mobile wireless control
CN104113417B (en) A kind of dynamic password identity authentication method and system based on NFC
CN108133142A (en) A kind of mobile device remote connection and the method for manipulation PC machine
CN203781550U (en) Identity identification device for elevator
CN105046799A (en) Access control card reading method and system, access control card reading device and mobile terminal
CN105528536B (en) Electronic equipment and information processing method
CN110008761A (en) A kind of privacy information camouflage method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151028