CN109462625B - Near field authentication method, device and system and data processing method - Google Patents

Near field authentication method, device and system and data processing method Download PDF

Info

Publication number
CN109462625B
CN109462625B CN201710794942.5A CN201710794942A CN109462625B CN 109462625 B CN109462625 B CN 109462625B CN 201710794942 A CN201710794942 A CN 201710794942A CN 109462625 B CN109462625 B CN 109462625B
Authority
CN
China
Prior art keywords
authentication
near field
terminal
time
synchronization information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710794942.5A
Other languages
Chinese (zh)
Other versions
CN109462625A (en
Inventor
王康
王正博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710794942.5A priority Critical patent/CN109462625B/en
Publication of CN109462625A publication Critical patent/CN109462625A/en
Application granted granted Critical
Publication of CN109462625B publication Critical patent/CN109462625B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a near field authentication method, a near field authentication device, a near field authentication system and a data processing method. Wherein, the method comprises the following steps: in the process of near field authentication with a terminal to be authenticated, receiving a rhythm sequence and time synchronization information sent by a server, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; and executing the authentication action indicated in the rhythm sequence based on the time synchronization information. The method and the device solve the technical problem of low near field authentication efficiency.

Description

Near field authentication method, device and system and data processing method
Technical Field
The present application relates to the field of communications, and in particular, to a near field authentication method, apparatus and system, and a data processing method.
Background
In internet-based O2O (Online To Offline) services, such as express delivery, take-out, car calling, etc., a server and a consumer need near-field authentication To realize smooth connection. However, due to the environmental impact, it often happens that the connection between the service provider and the customer is not smooth, for example, during rush hours, the vehicle and the passenger are mixed, and the other party is difficult to find, for example, during night, the situation is even worse, and the experience of the customer is greatly influenced.
The existing near field authentication means are mostly non-technical means, for example, for scenes such as express delivery and the like, two parties need to shout and the like, and for scenes such as taxi taking and the like, specific positions of license plates, vehicle types or telephone communication need to be identified, so that the near field authentication efficiency is low, and the experience sense is poor.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a near field authentication method, a near field authentication device, a near field authentication system and a data processing method, and at least solves the technical problem of low near field authentication efficiency.
According to an aspect of an embodiment of the present application, there is provided a near field authentication method, including: receiving a rhythm sequence and time synchronization information sent by a server in the process of near field authentication with a terminal to be authenticated, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; and executing the authentication action indicated in the rhythm sequence based on the time synchronization information.
According to another aspect of the embodiments of the present application, there is also provided a near field authentication method, including: under the condition of receiving a near field authentication message of a terminal to be authenticated, acquiring a rhythm sequence and time synchronization information, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; and sending the rhythm sequence and the time synchronization information to the terminal to be authenticated, so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
According to another aspect of the embodiments of the present application, there is also provided a near field authentication apparatus, including: a receiving unit, configured to receive a rhythm sequence and time synchronization information sent by a server in a process of performing near field authentication with a terminal to be authenticated, where the rhythm sequence is used to indicate an authentication action to be performed, and the time synchronization information is used to indicate a time for performing the authentication action; and the processing unit is used for executing the authentication action indicated in the rhythm sequence based on the time synchronization information.
According to another aspect of the embodiments of the present application, there is also provided a near field authentication apparatus, including: the terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a rhythm sequence and time synchronization information under the condition of receiving a near field authentication message of a terminal to be authenticated, the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; a sending unit, configured to send the rhythm sequence and the time synchronization information to the terminal to be authenticated, so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
According to another aspect of the embodiments of the present application, there is also provided a near field authentication apparatus, including: the terminal comprises a receiver and a server, wherein the receiver is used for receiving a rhythm sequence and time synchronization information sent by the server in the process of near field authentication with a terminal to be authenticated, the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; a processor, wherein the processor executes a program, wherein the program executes the following processing steps for data output from the receiver: and executing the authentication action indicated in the rhythm sequence based on the time synchronization information.
According to another aspect of the embodiments of the present application, there is also provided a near field authentication system, including: the terminal to be authenticated is used for receiving a rhythm sequence and time synchronization information sent by a server in the process of near field authentication with the terminal to be authenticated at the opposite end, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; executing the authentication action indicated in the rhythm sequence based on the time synchronization information; the server is used for acquiring a rhythm sequence and time synchronization information under the condition of receiving the near field authentication message of the terminal to be authenticated, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; and sending the rhythm sequence and the time synchronization information to the terminal to be authenticated, so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
According to another aspect of the embodiments of the present application, there is also provided a storage medium, where the storage medium includes a stored program, and when the program runs, the apparatus where the storage medium is located is controlled to execute the near field authentication method with any of the above features.
According to another aspect of the embodiments of the present application, there is also provided a processor configured to execute a program, where the program executes a near field authentication method having any of the above features.
According to another aspect of the embodiments of the present application, there is also provided a data processing method, including: acquiring a rhythm sequence, wherein the rhythm sequence is used for indicating at least one operation; and executing at least one operation.
In the embodiment of the application, a rhythm sequence and time synchronization information sent by a server are received in the process of near-field authentication with a terminal to be authenticated, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; the method comprises the steps of executing a mode of indicating an authentication action in a rhythm sequence based on time synchronization information, receiving the rhythm sequence used for indicating the authentication action to be executed and the time synchronization information used for indicating the authentication action to be executed from a server, executing the authentication action indicated in the rhythm sequence based on the time synchronization information, and executing the authentication action by a terminal to be authenticated at the same rhythm, so that the aim of fast authentication with the terminal to be authenticated is fulfilled, the technical effect of improving the near field authentication efficiency is achieved, and the technical problem of low near field authentication efficiency is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a block diagram of an alternative mobile device according to an embodiment of the present application;
fig. 2 is a schematic flow chart of an alternative near field authentication method according to an embodiment of the present application;
FIG. 3 is an interaction diagram of an alternative near field authentication method according to an embodiment of the present application;
FIG. 4(a) is a schematic illustration of an alternative interactive interface according to an embodiment of the present application;
FIG. 4(b) is a schematic diagram of another alternative interactive interface according to an embodiment of the present application;
FIG. 4(c) is a schematic illustration of yet another alternative interactive interface according to an embodiment of the present application;
FIG. 5 is an interaction diagram of another alternative near field authentication method according to an embodiment of the application;
FIG. 6 is a schematic flow chart diagram illustrating an alternative near field authentication method according to an embodiment of the present application;
FIG. 7 is a schematic view of an alternative unlocking device according to an embodiment of the present application;
FIG. 8 is a schematic structural diagram of an alternative unlocking device according to an embodiment of the present application;
FIG. 9 is a schematic structural diagram of an alternative unlocking system according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an alternative computer terminal according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
First, some terms or terms appearing in the description of the embodiments of the present application are applicable to the following explanations:
NTP (Network Time Protocol): a protocol for time synchronizing a computer which synchronizes the computer to its server or clock source (e.g., quartz clock, GPS, etc.) provides highly accurate time correction and protects against malicious protocol attacks via cryptographic validation. The purpose of NTP is to provide accurate and robust time services in an out-of-order internet environment.
OBD (On Board Diagnostics, On-Board automatic diagnostic system) interface: the system CAN send instructions to a Controller Area Network (CAN) in the vehicle to control the vehicle lamp to flash, the horn to whistle and the like.
CAN: is an internationally standardized serial communication protocol. In the automotive industry, various electronic control systems have been developed for the purpose of safety, comfort, convenience, low pollution, and low cost.
O2O: the method combines the off-line business opportunity with the Internet, and enables the Internet to be a platform for off-line transaction. The concept of O2O is very broad and can be referred to both on-line and off-line, and is commonly referred to as O2O.
Example 1
There is also provided, in accordance with an embodiment of the present application, a method embodiment of a near field authentication method, it being noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system, such as a set of computer executable instructions, and that, although a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Fig. 1 shows a hardware configuration block diagram of a computer terminal (or mobile device) for implementing a near field authentication method. As shown in fig. 1, the mobile device 10 (or computer terminal) may include one or more (shown as 102a, 102b, … …, 102 n) processors 102 (the processors 102 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 104 for storing data, and a transmission module for communication functions. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, the mobile device 10 (or computer terminal) may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors 102 and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuitry may be a single, stand-alone processing module, or incorporated in whole or in part into any of the other elements in the mobile device 10 (or computer terminal). As referred to in the embodiments of the application, the data processing circuit acts as a processor control (e.g. selection of a variable resistance termination path connected to the interface).
The memory 104 may be used to store software programs and modules of application software, such as program instructions/data storage devices corresponding to the near field authentication method in the embodiment of the present application, and the processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, that is, implementing the vulnerability detection method of the application program. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 104 may further include memory located remotely from processor 102, which may be connected to mobile device 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of such networks may include wireless networks provided by the communications provider of the mobile device 10. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 can be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the mobile device 10 (or computer terminal).
It should be noted that in some alternative embodiments, the mobile device 10 (or computer terminal) shown in fig. 1 described above may include hardware elements (including circuitry), software elements (including computer code stored on a computer-readable medium), or a combination of both hardware and software elements. It should be noted that fig. 1 is only one example of a particular specific example and is intended to illustrate the types of components that may be present in the mobile device 10 (or computer terminal) described above.
Under the operating environment, the application provides a near field authentication method as shown in fig. 2. Fig. 2 is a flowchart of a near field authentication method according to a first embodiment of the present application.
Step S202, in the process of near field authentication with the terminal to be authenticated, the rhythm sequence and the time synchronization information sent by the server are received.
In step S202, the terminal to be authenticated refers to an opposite terminal corresponding to the terminal, the number of the opposite terminals may be one or multiple, and in the process of performing near field authentication with the opposite terminal, a rhythm sequence and time synchronization information sent by the server are received, where the rhythm sequence is used to indicate an authentication action to be performed, and the time synchronization information is used to indicate time for performing the authentication action.
Specifically, the time synchronization information may include a timestamp indicating the start time of the authentication action, such as UTC + 818: 03:24.00 start of oscillation/flash, and a time source for synchronizing the time of the time source with the national standard time, such as informing both parties to please perform NTP time at time1.aliyun. That is, the time synchronization information is to synchronize the time of the local terminal and the time of the peer terminal (i.e., the terminal to be authenticated), and the server may distribute the time synchronization information to the local terminal and the peer terminal. The synchronization of the time of the local terminal and the time of the opposite terminal are embodied in two aspects: 1. the point in time when the action starts is synchronized (the server distributes a timestamp to both parties); 2. both parties are synchronized with the national standard time (through the NTP protocol).
For example, the cadence sequence may include at least one character, and each character may represent a category and duration of an authentication action, for example, the cadence sequence may be represented as: the term "a", as used herein, means 1 second of motion (vibration/flash/sound), "means 0.3 second of motion (vibration/flash/sound)," 0.3 second of rest (no vibration/no flash/no sound) between "-" and "-", wherein "vibration" means a vibration motion of a cellular phone, "flash" means a flashing motion of a cellular phone flash or a flashing motion of a car light, and "sound" means a whistling motion of a car horn.
As another example, the cadence sequence may also be expressed as XOXXOXXXOXXXO, where "X" represents vibrate/flash/sound, "O" represents idle (i.e., not vibrate/not flash/not sound), and both "X" and "O" represent 0.5 second durations.
It should be noted that, in the above embodiment, the example of the rhythm sequence is described exemplarily, it is understood that the rhythm sequence may also be represented in other manners, such as sound, image, etc., which are used for indicating the authentication action to be performed, and therefore, all of them should be within the protection scope of the present embodiment.
And step S204, based on the time synchronization information, executing the authentication action indicated in the rhythm sequence.
In this embodiment, in the above S204, after receiving the rhythm sequence and the time synchronization information, an authentication action indicated in the rhythm sequence is executed based on the time synchronization information, where the authentication action includes at least one of: flashing action of the flash lamp, vibrating action of the vibrator, flashing action of the car lamp and whistling action of the car horn.
As an alternative implementation, the performing, based on the time synchronization information, the authentication action indicated in the rhythm sequence includes: and controlling the flash lamp to execute the flashing action indicated by the rhythm sequence and/or controlling the vibrator to execute the vibrating action indicated by the rhythm sequence according to the time indicated by the time synchronization information.
As can be seen from the above, the time synchronization information may include a timestamp indicating the start time of the authentication action, such as UTC + 818: 03:24.00 start oscillation/flash, and a time source for synchronizing the time of the time source with the national standard time, such as informing both parties to please perform NTP time at time1.aliyun. Optionally, the method for performing the authentication action indicated in the rhythm sequence based on the time synchronization information includes: first, the flash is controlled to perform a flashing action in a rhythmic sequence from a time point indicated by a time stamp (e.g., UTC + 818: 03:24.00 start-up/flash) according to a time source synchronizing its time with a national standard time, and/or the vibrator is controlled to perform a vibrating action in a rhythmic sequence.
And for the terminal to be authenticated, as the terminal to be authenticated also receives the rhythm sequence and the time synchronization information sent by the server, the terminal to be authenticated also synchronizes the time of the terminal to be authenticated with the national standard time according to the time source, and controls the flash lamp to execute the flash action according to the rhythm sequence from the time point indicated by the timestamp (for example, UTC + 818: 03:24.00 start vibration/start flash), and/or controls the vibrator to execute the vibration action according to the rhythm sequence.
Therefore, the local terminal and the terminal to be authenticated execute the flashing action and/or the vibrating action at the same rhythm, so that the near field authentication can be realized rapidly by both sides.
It is to be added that, taking a taxi calling scene as an example, a mobile phone of a taxi driver (service person) is generally placed on a sucker of a windshield, and a flash lamp is just opposite to the front of the taxi. In this case, particularly at night, the flash of the cellular phone is easily found by the passenger (consumer), who generally holds the cellular phone and searches for the vehicle. In this case, the mobile phone of the passenger can use a vibration mode, because the passenger does not need to look at the mobile phone and watch the vehicle at the same time, and only needs to feel that the vibration of the mobile phone is consistent with the flash action of the mobile phone of the taxi driver.
It should be noted that both the home terminal and the terminal to be authenticated may select one of vibration and flash, and even both of them may vibrate and flash at the same time, which is not limited in this embodiment.
As another optional implementation manner, based on the time synchronization information, the performing of the authentication action indicated in the rhythm sequence includes: and sending a control instruction to the automobile connected with the automobile through the OBD interface according to the time indicated by the time synchronization information so as to control the automobile lamp of the automobile to execute a flashing action and/or control the automobile horn to execute a whistling action.
That is, first, the time of the vehicle is synchronized with the national standard time according to the time source, and a control command is transmitted to the vehicle connected to the vehicle through the on-board diagnostic system OBD interface from the time point indicated by the time stamp (for example, UTC + 818: 03:24.00 start oscillation/flash) to control the lamps of the vehicle to perform a flashing action and/or to control the horn of the vehicle to perform a whistling action.
And for the terminal to be authenticated, as the terminal to be authenticated also receives the rhythm sequence and the time synchronization information sent by the server, the terminal to be authenticated also synchronizes the time of the terminal to be authenticated with the national standard time according to the time source, and controls the flash lamp to execute the flash action according to the rhythm sequence from the time point indicated by the timestamp (for example, UTC + 818: 03:24.00 start oscillation/start flash), and/or controls the vibrator to execute the vibration action according to the rhythm sequence.
Therefore, the home terminal executes the authentication action by controlling the automobile lamps and the loudspeaker to adopt the same rhythm as the terminal to be authenticated. And the near field authentication can be realized by both parties conveniently and rapidly.
It should be added that, still taking the car-calling scenario as an example, the passenger (customer) will generally hold the mobile phone and search for the car all around. In this case, the passenger's mobile phone may use a vibration mode, and thus the passenger does not need to look at the mobile phone and look at the vehicle, but only needs to feel that the vibration of the mobile phone is consistent with the blinking motion and the whistling motion of the service provider's vehicle.
It should be noted that the terminal to be authenticated may select one of vibration/flash, or may simultaneously vibrate + flash, the local terminal may select one of vehicle light flashing/horn whistle, or may simultaneously vehicle light flashing + horn whistle, or even the local terminal may simultaneously vibrate and/or flash, which is not limited in this embodiment.
In the embodiment of the application, a rhythm sequence and time synchronization information sent by a server are received in the process of near-field authentication with a terminal to be authenticated, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; the method comprises the steps of executing a mode of indicating an authentication action in a rhythm sequence based on time synchronization information, receiving the rhythm sequence used for indicating the authentication action to be executed and the time synchronization information used for indicating the authentication action to be executed from a server, and executing the authentication action indicated in the rhythm sequence based on the time synchronization information, so that the aim of fast authentication with a terminal to be authenticated is fulfilled, the technical effect of improving near field authentication efficiency is achieved, and the technical problem of low near field authentication efficiency is solved.
As an optional implementation manner, before receiving the rhythm sequence and time synchronization information obtained by the server, the method further includes: sending a near-field call request to a server; or receiving a near field call request from a terminal to be authenticated, which is forwarded by the server; the near field acknowledgement message is returned to the server.
Optionally, the home terminal may actively initiate near field authentication, and specifically, the near field authentication method may include sending a near field call request to the server, forwarding the near field call request to the terminal to be authenticated after the server receives the near field call request, and executing the step of distributing the rhythm sequence and the time synchronization information by the server after the terminal to be authenticated returns a near field confirmation message to the server.
Optionally, the home terminal may also passively perform approach authentication, and specifically, the method may include that the terminal to be authenticated sends a near field call request to the server, the server receives the near field call request and then forwards the near field call request to the home terminal, and after the home terminal returns the near field acknowledgement message to the server, the server performs the step of distributing the rhythm sequence and the time synchronization information.
It should be added that, the near field call request may carry an identifier of the opposite terminal, so that the server performs the purpose of forwarding the near field call request; the near field call request may not carry the identifier of the opposite terminal, because the server has stored the corresponding relationship between the home terminal and the terminal to be authenticated in the previous period, and the server may query the terminal to be authenticated corresponding to the home terminal after receiving the near field call request, and then execute the step of forwarding the near field call request.
As shown in fig. 3, the near field authentication method of the present embodiment is described below in a manner that a consumer mobile phone adopts a vibration mode and a server mobile phone adopts a flash light mode, and the method includes the following steps:
step a, a consumer mobile phone initiates a near field call request to a server.
In the step a of the present application, when the consumer and the server arrive near the appointed place, the mobile phone of the consumer may actively initiate a near field call request, where the near field call request may include at least one of: the identity of the consumer, the identity of the server.
And b, the server forwards the near field call request to the mobile phone of the server.
In the step b, after receiving the near field call request, the server forwards the near field call request to the mobile phone of the service provider.
And c, the mobile phone of the server confirms in response to the operation of the user.
In the above step c of the present application, after receiving the near field call request forwarded by the server, the service provider mobile phone prompts, as shown in fig. 4(a), whether the service provider performs near field authentication, and if the service provider selects "yes", the service provider mobile phone returns a near field confirmation message to the server.
And d, the server receives the near field confirmation message.
And e, the server generates a rhythm sequence.
In the step e, the server randomly generates a rhythm sequence after receiving the near field confirmation message.
For example, the cadence sequence may include at least one character, and each character may represent a category and duration of an authentication action, for example, the cadence sequence may be represented as: the term "a", as used herein, means 1 second of motion (vibration/flash/sound), "means 0.3 second of motion (vibration/flash/sound)," 0.3 second of rest (no vibration/no flash/no sound) between "-" and "-", wherein "vibration" means a vibration motion of a cellular phone, "flash" means a flashing motion of a cellular phone flash or a flashing motion of a car light, and "sound" means a whistling motion of a car horn.
As another example, the cadence sequence may also be expressed as XOXXOXXXOXOXO, where "X" represents shake/blink, "O" represents idle (i.e., not shake/blink), and "X" and "O" each represent a 0.5 second duration.
It should be noted that, in the above embodiment, the example of the rhythm sequence is described exemplarily, it is understood that the rhythm sequence may also be represented in other manners, such as sound, image, etc., which are used for indicating the authentication action to be performed, and therefore, all of them should be within the protection scope of the present embodiment.
And f, the server generates time synchronization information.
In step f, the server generates time synchronization information after receiving the near field confirmation message, specifically, the time synchronization information may include a timestamp and a time source, where the timestamp is used to indicate a start time of an authentication action, for example, UTC + 818: 03:24.00 start ringing/start flashing, and the time source is used to synchronize its own time with a national standard time, for example, to inform both parties of please perform NTP time synchronization with time1. That is, the time synchronization information is for synchronizing the times of the consumer mobile phone and the server mobile phone, and the server can distribute the time synchronization information to the consumer mobile phone and the server mobile phone. The synchronization of the time of the consumer mobile phone and the time of the server mobile phone are embodied in two aspects: 1. the point in time when the action starts is synchronized (the server distributes a timestamp to both parties); 2. both parties are synchronized with the national standard time (through the NTP protocol).
And g, the server distributes the rhythm sequence.
In the step g, the server distributes the rhythm sequence to the consumer mobile phone and the server mobile phone after generating the rhythm sequence.
And h, the server distributes the time synchronization information.
In the above step h, the server distributes the time synchronization information to the consumer mobile phone and the server mobile phone after generating the time synchronization information.
And i, vibrating the consumer mobile phone according to the rhythm sequence.
In step i of the present application, after receiving the rhythm sequence and the time synchronization information, the consumer mobile phone executes the authentication action indicated by the rhythm sequence based on the time synchronization information.
First, the consumer handset synchronizes its own time with the national standard time according to the time source, and controls the vibrator to perform the vibration action in a rhythmic sequence from a time point indicated by a time stamp (e.g., UTC + 818: 03:24.00 start of vibration/flash).
It should be noted that the authentication action of the consumer's mobile phone, specifically, the vibration action, the flash action, or the vibration + flash action, may be default to the system, preset by the consumer, or selected by the consumer during the near field authentication process.
And j, flashing a flash lamp of the mobile phone of the server according to the rhythm sequence.
In step j, after receiving the rhythm sequence and the time synchronization information, the mobile phone of the server executes the authentication action indicated by the rhythm sequence based on the time synchronization information.
First, the server handset synchronizes its own time with the national standard time based on the time source, and controls the strobe device to perform a strobe motion in a rhythmic sequence from a time point indicated by a time stamp (e.g., UTC + 818: 03:24.00 start-up/strobe).
It should be noted that the authentication action of the vibration action, the flash action, or the vibration + flash action specifically adopted by the service provider mobile phone may be default to the system, may be preset by the consumer, or may be selected by the consumer in the near field authentication process.
Further, the consumer handset (server handset) prompts the user what kind of authentication action the opposite terminal performs, for example, as shown in fig. 4(b), prompting "the opposite terminal adopts the flashing action".
Based on this, the consumer and the server can find the opposite-end mobile phone with the same rhythm as the own mobile phone, so that near-field authentication is realized. In the embodiment, a method for synchronizing rhythm signals between the consumer and the server is adopted, so that the process of connecting the consumer and the server in the O2O service is realized with better experience and higher efficiency.
As shown in fig. 5, the near field authentication method is described below in a manner that a consumer mobile phone uses a vibration mode and a server mobile phone uses a mode of controlling a vehicle lamp to flash/horn to whistle:
step A, a consumer mobile phone initiates a near field call request to a server.
In the step a of the present application, when the consumer and the server arrive near the appointed place, the mobile phone of the consumer may actively initiate a near-field call request, where the near-field call request may include at least one of: the identity of the consumer, the identity of the server.
And step B, the server forwards the near-field call request to the mobile phone of the server.
In the step B, after receiving the near field call request, the server forwards the near field call request to the mobile phone of the service provider.
And step C, the server mobile phone confirms in response to the operation of the user and selects a near field response mode.
In the above step C of the present application, after receiving the near field call request forwarded by the server, the service provider mobile phone prompts, as shown in fig. 4(a), whether the service provider performs near field authentication, and if the service provider selects "yes", the service provider mobile phone returns a near field confirmation message to the server.
Meanwhile, as shown in fig. 4(c), the server mobile phone may prompt the server to select a near field response mode: the mobile phone vibrates/flashes, the automobile lamp flashes/horns whistle.
And D, the server receives the near field confirmation message.
And E, the server generates a rhythm sequence.
In the above step E of the present application, the server randomly generates a rhythm sequence after receiving the near field acknowledgement message.
For example, the cadence sequence may include at least one character, and each character may represent a category and duration of an authentication action, for example, the cadence sequence may be represented as: the term "a", as used herein, means 1 second of motion (vibration/flash/sound), "means 0.3 second of motion (vibration/flash/sound)," 0.3 second of rest (no vibration/no flash/no sound) between "-" and "-", wherein "vibration" means a vibration motion of a cellular phone, "flash" means a flashing motion of a cellular phone flash or a flashing motion of a car light, and "sound" means a whistling motion of a car horn.
As another example, the cadence sequence may also be expressed as XOXXOXXXOXXXO, where "X" represents vibrate/flash/sound, "O" represents idle (i.e., not vibrate/not flash/not sound), and both "X" and "O" represent 0.5 second durations.
It should be noted that, in the above embodiment, the example of the rhythm sequence is described exemplarily, it is understood that the rhythm sequence may also be represented in other manners, such as sound, image, etc., which are used for indicating the authentication action to be performed, and therefore, all of them should be within the protection scope of the present embodiment.
And F, the server generates time synchronization information.
In step F, the server generates time synchronization information after receiving the near field confirmation message, specifically, the time synchronization information may include a timestamp and a time source, where the timestamp is used to indicate a start time of an authentication action, for example, UTC + 818: 03:24.00 start ringing/start flashing, and the time source is used to synchronize its own time with a national standard time, for example, to inform both parties of please perform NTP time synchronization with time1. That is, the time synchronization information is for synchronizing the time of the consumer mobile phone and the server mobile phone, and the server can distribute the time synchronization information to the consumer mobile phone and the server mobile phone. The synchronization of the time of the consumer mobile phone and the time of the server mobile phone are embodied in two aspects: 1. the point in time when the action starts is synchronized (the server distributes a timestamp to both parties); 2. both parties are synchronized with the national standard time (through the NTP protocol).
And G, the server distributes the rhythm sequence.
In the step G, the server distributes the rhythm sequence to the consumer mobile phone and the server mobile phone after generating the rhythm sequence.
And step H, the server distributes the time synchronization information.
In the above step H, the server generates the time synchronization information and then distributes the time synchronization information to the consumer mobile phone and the server mobile phone.
And step I, the consumer mobile phone vibrates according to the rhythm sequence.
In the step I, after receiving the rhythm sequence and the time synchronization information, the consumer mobile phone executes an authentication action indicated by the rhythm sequence based on the time synchronization information.
First, the consumer handset synchronizes its own time with the national standard time according to a time source, and controls the vibrator to perform a vibration action in a rhythmic sequence from a time point indicated by a time stamp (e.g., UTC + 818: 03:24.00 start/blink).
It should be noted that the authentication actions of the consumer's mobile phone, specifically, the vibration action, the flash action, the vibration + flash action, may be default in the system, preset by the consumer, or selected by the consumer in the near field authentication process, and all shall be within the protection scope of this embodiment.
And step J, prompting the other party by the mobile phone of the consumer to select which near field response mode.
In step J of the present application, as shown in fig. 4(b), the consumer mobile phone also prompts the user and the server mobile phone which authentication action to perform.
And step K, the server mobile phone controls the car lamp/loudspeaker through the OBD interface.
And step L, controlling the vehicle lamp flicker/horn whistle of the vehicle according to the rhythm sequence.
In the above steps K to L, the server mobile phone controls the automobile to execute the authentication action indicated by the rhythm sequence through the OBD interface based on the time synchronization information after receiving the rhythm sequence and the time synchronization information.
First, the server handset synchronizes its own time with the national standard time according to the time source, and controls the headlights/horn to blink in a rhythm sequence from the time point indicated by the time stamp (e.g., UTC + 818: 03:24.00 on/off).
Taking a car calling scene as an example, a passenger (a consumer) initiates a near field call request through a mobile phone, and after receiving the near field call request, a server forwards the near field call request to a matched mobile phone of a driver (a server) to request the driver to confirm. After the driver confirms, the server randomly generates a rhythm sequence and time synchronization information, pushes the rhythm sequence to the mobile phones of the two parties, and then synchronizes the two mobile phones.
After receiving the rhythm sequence and the time synchronization information sent by the server, the mobile phone of the passenger vibrates according to the rhythm, and the mobile phone of the driver flickers the flash lamp according to the rhythm. Therefore, passengers can find and identify drivers by visually searching for signals flashing synchronously with the vibration of the mobile phones, so that the connectors are smoothly connected.
Further, the OBD interface of the vehicle is utilized to control the automobile lamp to flash and the horn to whistle. Thus, the passenger can realize smooth joint by searching for the double-flash vehicle or the whistle vehicle with the same vibration rhythm.
It is to be added that the server may send the rhythm sequence and the time synchronization information to the terminal to be authenticated, so that the near field authentication is implemented by using a method of synchronizing rhythm signals with the terminal to be authenticated (for example, the terminal vibrates according to the rhythm sequence, and the terminal to be authenticated controls the flash lamp to flash at the same rhythm).
Example 2
Under the operating environment, the application provides a near field authentication method as shown in fig. 6. Fig. 6 is a flowchart of a near field authentication method according to embodiment 2 of the present application. The method comprises the following steps:
step S302, receiving a near field authentication message of the terminal to be authenticated.
In the above step S302, the terminal to be authenticated includes an authentication initiating terminal and an authentication receiving terminal corresponding to the authentication initiating terminal; the receiving of the near field authentication message of the terminal to be authenticated comprises: receiving a near field call request initiated by an authentication initiating terminal; forwarding the near field call request to an authentication receiving terminal; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises a near field calling request and a near field confirmation message.
It is to be added that the number of terminals to be authenticated may be at least two.
Step S304, acquiring the rhythm sequence and the time synchronization information.
In the above step S304, the rhythm sequence is used to indicate an authentication action to be performed, and the time synchronization information is used to indicate a time for performing the authentication action. The authentication action includes at least one of: flashing action of the flash lamp, vibrating action of the vibrator, flashing action of the car lamp and whistling action of the car horn.
Optionally, the acquiring the rhythm sequence and the time synchronization information includes: randomly generating a rhythm sequence; generating a timestamp indicating a start time of the authentication action from the near field authentication message; and generating a time source for synchronizing the time of the terminal to be authenticated with the national standard time according to a network time protocol NTP, wherein the time synchronization information comprises a timestamp and the time source.
Specifically, the time synchronization information may include a timestamp indicating the start time of the authentication action, such as UTC + 818: 03:24.00 start of oscillation/flash, and a time source for synchronizing the time of the time source with the national standard time, such as informing both parties to please perform NTP time at time1.aliyun. That is, the time synchronization information is to synchronize the time of the local terminal and the time of the peer terminal (i.e., the terminal to be authenticated), and the server may distribute the time synchronization information to the local terminal and the peer terminal. The method specifically represents the synchronization of the time of the local terminal and the time of the opposite terminal in two aspects: 1. the point in time when the action starts is synchronized (the server distributes a timestamp to both parties); 2. both parties are synchronized with the national standard time (through the NTP protocol).
For example, the cadence sequence may include at least one character, and each character may represent a category and duration of an authentication action, for example, the cadence sequence may be represented as: the term "a", as used herein, means 1 second of motion (vibration/flash/sound), "means 0.3 second of motion (vibration/flash/sound)," 0.3 second of rest (no vibration/no flash/no sound) between "-" and "-", wherein "vibration" means a vibration motion of a cellular phone, "flash" means a flashing motion of a cellular phone flash or a flashing motion of a car light, and "sound" means a whistling motion of a car horn.
As another example, the cadence sequence may also be expressed as XOXXOXXXOXOXO, where "X" represents shake/blink, "O" represents idle (i.e., not shake/blink), and "X" and "O" each represent a 0.5 second duration.
It should be noted that, in the above embodiment, the example of the rhythm sequence is described exemplarily, it is understood that the rhythm sequence may also be represented in other manners, such as sound, image, etc., which are used for indicating the authentication action to be performed, and therefore, all of them should be within the protection scope of the present embodiment.
Step S306, the rhythm sequence and the time synchronization information are sent to the terminal to be authenticated, so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
In step S306, after the rhythm sequence and the time synchronization information are obtained, the rhythm sequence and the time synchronization information are sent to the terminal to be authenticated, so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
As an optional implementation manner, the method for executing, by a terminal to be authenticated, an authentication action indicated in a rhythm sequence based on time synchronization information includes: and the terminal to be authenticated controls the flash lamp to execute the flash action indicated by the rhythm sequence and/or controls the vibrator to execute the vibration action indicated by the rhythm sequence according to the time indicated by the time synchronization information.
As can be seen from the above, the time synchronization information may include a timestamp indicating the start time of the authentication action, such as UTC + 818: 03:24.00 start oscillation/flash, and a time source for synchronizing the time of the time source with the national standard time, such as informing both parties to please perform NTP time at time1.aliyun. That is, the method of performing an authentication action indicated in a rhythmic sequence based on the time synchronization information includes: first, the terminal to be authenticated synchronizes its time with the national standard time according to a time source, controls the flash to perform a flashing action in a rhythm sequence from a time point indicated by a time stamp (e.g., UTC + 818: 03:24.00 start-up/flashing), and/or controls the vibrator to perform a vibrating action in a rhythm sequence.
In this way, the terminal to be authenticated performs a flashing action, and/or a vibrating action, with the same rhythm. And the near field authentication can be realized by both parties conveniently and rapidly.
It is to be added that, taking a taxi calling scene as an example, a mobile phone of a taxi driver (service person) is generally placed on a sucker of a windshield, and a flash lamp is just opposite to the front of the taxi. In this case, particularly at night, the flash of the cellular phone is easily found by the passenger (consumer). Passengers (consumers) generally hold the mobile phones and look for vehicles all around. In this case, the mobile phone of the passenger can use a vibration mode, because the passenger does not need to look at the mobile phone and watch the vehicle at the same time, and only needs to feel that the vibration of the mobile phone is consistent with the flash action of the mobile phone of the taxi driver.
It should be noted that the terminal to be authenticated may select one of the vibration and the flash, and even both of them may vibrate and flash at the same time, which is not limited in this embodiment.
As another optional implementation manner, the terminal to be authenticated executes an authentication action indicated in the rhythm sequence based on the time synchronization information, including: and the terminal to be authenticated sends a control instruction to the automobile connected with the terminal to be authenticated through an OBD (on-board diagnostics) interface according to the time indicated by the time synchronization information so as to control the automobile lamp to execute a flashing action and/or control the automobile horn to execute a whistling action.
As can be seen from the above, the time synchronization information may include a timestamp indicating the start time of the authentication action, such as UTC + 818: 03:24.00 start oscillation/flash, and a time source for synchronizing the time of the time source with the national standard time, such as informing both parties to please perform NTP time at time1.aliyun. That is, the method of performing an authentication action indicated in a rhythmic sequence based on time synchronization information includes: firstly, the terminal to be authenticated synchronizes the time of the terminal to be authenticated with the national standard time according to a time source, and sends a control instruction to the automobile connected with the terminal from the time point indicated by the timestamp (for example, UTC + 818: 03:24.00 starting vibration/flashing) through an OBD (on-board diagnostics) interface so as to control the lamps of the automobile to execute flashing action and/or control the horn of the automobile to execute whistling action.
Thus, one end of the terminal to be authenticated executes the authentication action by controlling the automobile lamp and the loudspeaker and adopting the same rhythm as the other end of the terminal to be authenticated. And the near field authentication can be realized by both parties conveniently and rapidly.
It should be added that, still taking the car-calling scenario as an example, the passenger (customer) generally holds the mobile phone and looks for the car from all directions. In this case, the passenger's mobile phone may use a vibration mode, and thus the passenger does not need to look at the mobile phone and look at the vehicle, but only needs to feel that the vibration of the mobile phone is consistent with the blinking motion and the whistling motion of the service provider's vehicle.
It should be noted that the terminal to be authenticated may select one of vibration and flash light, may also simultaneously vibrate and flash light, may also select one of vehicle light flashing and whistling, and may also simultaneously vehicle light flashing and whistling, which is not limited in this embodiment.
In the embodiment of the application, under the condition that a near field authentication message of a terminal to be authenticated is received, a rhythm sequence and time synchronization information are obtained, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; the rhythm sequence and the time synchronization information are sent to the terminal to be authenticated, so that the terminal to be authenticated executes the mode of indicating the authentication action in the rhythm sequence based on the time synchronization information, the rhythm sequence used for indicating the authentication action to be executed and the time synchronization information used for indicating the authentication action to be executed are distributed through the server, and the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information, so that the aim of fast authentication with the terminal to be authenticated is fulfilled, the technical effect of improving the near field authentication efficiency is achieved, and the technical problem of low near field authentication efficiency is solved.
It should be noted that for simplicity of description, the above-mentioned embodiments of the method are described as a series of acts, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk), and includes several instructions for enabling a terminal device (which may be a mobile phone, a computer, a server, or a network device) to execute the method described in the embodiments of the present application.
Example 3
According to an embodiment of the present application, there is also provided a near field authentication apparatus for implementing the near field authentication method, as shown in fig. 7, the apparatus includes: a receiving unit 702 and a processing unit 704.
The receiving unit 702 is configured to receive a rhythm sequence and time synchronization information sent by a server in a process of performing near field authentication with a terminal to be authenticated, where the rhythm sequence is used to indicate an authentication action to be performed, and the time synchronization information is used to indicate a time for performing the authentication action; a processing unit 704 configured to execute the authentication action indicated in the rhythm sequence based on the time synchronization information.
It should be noted here that the receiving unit 702 and the processing unit 704 correspond to steps S202 to S204 in embodiment 1, and the two modules are the same as the example and application scenarios realized by the corresponding steps, but are not limited to the disclosure of the first embodiment. It should be noted that the above modules may be implemented in the mobile device 10 provided in the first embodiment as a part of the apparatus.
Optionally, the apparatus further comprises: and the sending module is used for sending the near field call request to the server.
Optionally, the receiving unit 702 is further configured to receive a near field call request from the terminal to be authenticated, which is forwarded by the server; the device also includes: and the sending module is used for returning the near field confirmation message to the server.
Optionally, the authentication action comprises at least one of: flashing action of the flash lamp, vibrating action of the vibrator, flashing action of the car lamp and whistling action of the car horn.
Optionally, the processing unit 704 is configured to perform the following steps, based on the time synchronization information, of indicating an authentication action in the rhythmic sequence: and controlling the flash lamp to execute the flashing action indicated by the rhythm sequence and/or controlling the vibrator to execute the vibrating action indicated by the rhythm sequence according to the time indicated by the time synchronization information.
Optionally, the processing unit 704 is configured to perform the following steps, based on the time synchronization information, of performing an authentication action indicated in the rhythmic sequence: and sending a control instruction to the automobile connected with the automobile through an OBD (on-board diagnostics) interface of the automobile according to the time indicated by the time synchronization information so as to control the automobile lamps of the automobile to execute a flashing action and/or control the automobile horn to execute a whistling action.
Optionally, the time synchronization information includes a timestamp indicating a start time of the authentication action and a time source for synchronizing a time of itself with a national standard time.
Example 4
According to an embodiment of the present application, there is also provided a near field authentication apparatus for implementing the near field authentication method, as shown in fig. 8, the apparatus including: an acquisition unit 802 and a transmission unit 804.
The acquiring unit 802 is configured to acquire a rhythm sequence and time synchronization information when receiving a near field authentication message of a terminal to be authenticated, where the rhythm sequence is used to indicate an authentication action to be performed, and the time synchronization information is used to indicate a time for performing the authentication action; a sending unit 804, configured to send the rhythm sequence and the time synchronization information to the terminal to be authenticated, so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
It should be noted here that the acquiring unit 802 and the sending unit 804 correspond to step S302 to step S306 in embodiment 2, and the two modules are the same as the corresponding steps in the implementation example and application scenario, but are not limited to the disclosure in the first embodiment. It should be noted that the modules described above as a part of the apparatus may be run in the computer device provided in the second embodiment.
Optionally, the terminal to be authenticated comprises an authentication initiating end and an authentication receiving end corresponding to the authentication initiating end; the device also includes: the receiving module is used for receiving a near field call request initiated by the authentication initiating terminal; the sending unit 804 is further configured to forward the near field call request to the authentication receiving end; the receiving module is further used for receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises a near field call request and a near field confirmation message.
Optionally, the obtaining unit 802 is configured to perform the following steps to obtain the rhythm sequence and the time synchronization information: randomly generating a rhythm sequence; generating a timestamp indicating a start time of the authentication action from the near field authentication message; and generating a time source for synchronizing the time of the terminal to be authenticated with the national standard time according to a network time protocol NTP, wherein the time synchronization information comprises a timestamp and the time source.
Optionally, the authentication action comprises at least one of: flashing action of the flash lamp, vibrating action of the vibrator, flashing action of the car lamp and whistling action of the car horn.
Optionally, the terminal to be authenticated executes an authentication action indicated in the rhythm sequence based on the time synchronization information, including: and the terminal to be authenticated controls the flash lamp to execute the flash action indicated by the rhythm sequence and/or controls the vibrator to execute the vibration action indicated by the rhythm sequence according to the time indicated by the time synchronization information.
Optionally, the terminal to be authenticated executes an authentication action indicated in the rhythm sequence based on the time synchronization information, including: and the terminal to be authenticated sends a control instruction to the automobile connected with the terminal to be authenticated through an OBD (on-board diagnostics) interface according to the time indicated by the time synchronization information so as to control the automobile lamp to execute a flashing action and/or control the automobile horn to execute a whistling action.
Example 5
According to an embodiment of the present application, there is also provided a terminal for implementing the near field authentication method, where the terminal includes: the system comprises a receiver and a server, wherein the receiver is used for receiving a rhythm sequence and time synchronization information sent by the server in the process of performing near field authentication with a terminal to be authenticated, the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; a processor running a program, wherein the program is run to perform the following processing steps on the data output from the receiver: and executing the authentication action indicated in the rhythm sequence based on the time synchronization information.
Optionally, the processor may further execute the program code of the following steps: and controlling the flash lamp to execute the flashing action indicated by the rhythm sequence and/or controlling the vibrator to execute the vibrating action indicated by the rhythm sequence according to the time indicated by the time synchronization information.
Optionally, the processor may further execute the program code of the following steps: and sending a control instruction to the automobile connected with the vehicle-mounted diagnosis system OBD through the OBD interface according to the time indicated by the time synchronization information so as to control the lamps of the automobile to execute a flashing action and/or control the horn of the automobile to execute a whistling action.
Example 6
The embodiment of the application provides a near field authentication system. Fig. 9 is a schematic diagram of a near field authentication system according to embodiment 6 of the present application, and as shown in fig. 9, the system includes: a terminal to be authenticated 90 and a server 92.
The terminal to be authenticated 90 is configured to receive a rhythm sequence and time synchronization information sent by the server in a process of performing near field authentication with an opposite terminal to be authenticated, where the rhythm sequence is used to indicate an authentication action to be performed, and the time synchronization information is used to indicate time for performing the authentication action; based on the time synchronization information, performing an authentication action indicated in the rhythm sequence; the server 92 is configured to obtain a rhythm sequence and time synchronization information when receiving a near field authentication message of the terminal to be authenticated, where the rhythm sequence is used to indicate an authentication action to be performed, and the time synchronization information is used to indicate a time for performing the authentication action; and sending the rhythm sequence and the time synchronization information to the terminal to be authenticated so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
Example 7
The embodiment of the application can provide a computer terminal, and the computer terminal can be any one computer terminal device in a computer terminal group. Optionally, in this embodiment, the computer terminal may also be replaced with a terminal device such as a mobile terminal.
Optionally, in this embodiment, the computer terminal may be located in at least one network device of a plurality of network devices of a computer network.
In this embodiment, the computer terminal may execute the program code of the following steps in the near field authentication method of the application program: in the process of near field authentication with a terminal to be authenticated, receiving a rhythm sequence and time synchronization information sent by a server, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; based on the time synchronization information, performing the authentication action indicated in the cadence sequence.
Optionally, fig. 10 is a block diagram of a computer terminal according to an embodiment of the present application. As shown in fig. 10, the computer terminal a may include: one or more processors 1002 (only one of which is shown), a memory 1004, and a transmitting device 1006.
The memory may be configured to store a software program and a module, such as program instructions/modules corresponding to the security vulnerability detection method and apparatus in the embodiment of the present application, and the processor executes various functional applications and data processing by operating the software program and the module stored in the memory, that is, implements the near field authentication method. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory remotely located from the processor, and these remote memories may be connected to terminal a through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The processor can call the information and application program stored in the memory through the transmission device to execute the following steps: in the process of near field authentication with a terminal to be authenticated, receiving a rhythm sequence and time synchronization information sent by a server, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; based on the time synchronization information, performing the authentication action indicated in the cadence sequence.
Optionally, the processor may further execute the program code of the following steps: sending a near field call request to the server; or receiving a near field call request from the terminal to be authenticated, which is forwarded by the server; returning a near field acknowledgement message to the server.
Optionally, the processor may further execute the program code of the following steps: and controlling a flash lamp to execute the flashing action indicated by the rhythm sequence indication and/or controlling a vibrator to execute the vibrating action indicated by the rhythm sequence indication according to the time indicated by the time synchronization information.
Optionally, the processor may further execute the program code of the following steps: and sending a control instruction to the automobile connected with the automobile through an OBD (on-board diagnostics) interface according to the time indicated by the time synchronization information so as to control the automobile lamp of the automobile to execute the flashing action and/or control the automobile horn to execute the whistle action.
The processor can call the information and application program stored in the memory through the transmission device to execute the following steps: under the condition of receiving a near field authentication message of a terminal to be authenticated, acquiring a rhythm sequence and time synchronization information, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; and sending the rhythm sequence and the time synchronization information to the terminal to be authenticated so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
Optionally, the processor may further execute the program code of the following steps: receiving the near field call request initiated by the authentication initiating terminal; forwarding the near field call request to the authentication receiving end; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises a near field call request and a near field confirmation message.
Optionally, the processor may further execute the program code of the following steps: randomly generating the rhythm sequence; generating a timestamp indicating a start time of the authentication action from the near field authentication message; and generating a time source for synchronizing the time of the terminal to be authenticated with the national standard time according to a network time protocol NTP, wherein the time synchronization information comprises the timestamp and the time source.
In the embodiment of the application, a rhythm sequence and time synchronization information sent by a server are received in the process of near-field authentication with a terminal to be authenticated, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; the method comprises the steps of executing a mode of indicating an authentication action in a rhythm sequence based on time synchronization information, receiving the rhythm sequence used for indicating the authentication action to be executed and the time synchronization information used for indicating the authentication action to be executed from a server, and executing the authentication action indicated in the rhythm sequence based on the time synchronization information, so that the aim of fast authentication with a terminal to be authenticated is fulfilled, the technical effect of improving the near field authentication efficiency is achieved, and the technical problem of low near field authentication efficiency is solved.
It can be understood by those skilled in the art that the structure shown in fig. 10 is only an illustration, and the computer terminal may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palmtop computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 10 is a diagram illustrating a structure of the electronic device. For example, the computer terminal a may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in fig. 10, or have a different configuration than shown in fig. 10.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Example 8
Embodiments of the present application also provide a storage medium. Optionally, in this embodiment, the storage medium may be configured to store a program code executed by the near field authentication method provided in the first embodiment.
Optionally, in this embodiment, the storage medium may be located in any one of computer terminals in a computer terminal group in a computer network, or in any one of mobile terminals in a mobile terminal group.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: in the process of near field authentication with a terminal to be authenticated, receiving a rhythm sequence and time synchronization information sent by a server, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; based on the time synchronization information, performing the authentication action indicated in the cadence sequence.
Embodiments of the present application also provide a storage medium. Optionally, in this embodiment, the storage medium may be configured to store a program code executed by the near field authentication method provided in the second embodiment.
Optionally, in this embodiment, the storage medium may be located in any one of computer terminals in a computer terminal group in a computer network, or in any one of mobile terminals in a mobile terminal group.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps: under the condition of receiving a near field authentication message of a terminal to be authenticated, acquiring a rhythm sequence and time synchronization information, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; and sending the rhythm sequence and the time synchronization information to the terminal to be authenticated so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information.
An embodiment of the present application further provides a data processing method, including: acquiring a rhythm sequence, wherein the rhythm sequence is used for indicating at least one operation; at least one operation is performed.
Optionally, the operations comprise at least one of: flashing action of the flash lamp, vibrating action of the vibrator, flashing action of the car lamp and whistling action of the car horn.
Optionally, the data processing method further includes: acquiring time synchronization information, wherein the time synchronization information is used for indicating the time for executing the operation; wherein performing at least one operation comprises: and executing at least one operation according to the time indicated by the time synchronization information.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (20)

1.A near field authentication method, comprising:
in the process of near field authentication with a terminal to be authenticated, receiving a rhythm sequence and time synchronization information sent by a server, wherein the rhythm sequence is used for indicating an authentication action to be executed, the time synchronization information is used for indicating the time for executing the authentication action, and the time synchronization information comprises a timestamp and a time source;
based on the time synchronization information, the authentication action indicated in the rhythm sequence is executed, wherein the terminal to be authenticated also synchronizes the time of the terminal to be authenticated with the national standard time according to the time source, and the authentication action is executed from the time point indicated by the time stamp;
under the condition of receiving a near field authentication message of the terminal to be authenticated, receiving the rhythm sequence and the time synchronization message sent by the server, wherein the terminal to be authenticated comprises an authentication initiating end and an authentication receiving end corresponding to the authentication initiating end; receiving the near field authentication message of the terminal to be authenticated comprises: receiving a near field call request initiated by the authentication initiating terminal; forwarding the near field call request to the authentication receiving end; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises the near field call request and the near field confirmation message.
2. The method of claim 1, wherein before receiving the acquisition cadence sequence and the time synchronization information sent by the server, the method further comprises:
sending the near field call request to the server;
or,
receiving a near field call request from the terminal to be authenticated forwarded by the server; returning a near field acknowledgement message to the server.
3. The method of claim 1, wherein the authentication action comprises at least one of: flashing action of the flash lamp, vibrating action of the vibrator, flashing action of the car lamp and whistling action of the car horn.
4. The method of claim 3, wherein performing the authentication action indicated in the cadence sequence based on the time synchronization information comprises:
and controlling a flash lamp to execute the flash action indicated by the rhythm sequence and/or controlling a vibrator to execute the vibration action indicated by the rhythm sequence according to the time indicated by the time synchronization information.
5. The method of claim 3, wherein performing the authentication action indicated in the cadence sequence based on the time synchronization information comprises:
and sending a control instruction to the automobile connected with the automobile through an OBD (on-board diagnostics) interface according to the time indicated by the time synchronization information so as to control the automobile lamp of the automobile to execute the flashing action and/or control the automobile horn to execute the whistle action.
6. The method according to any of claims 1 to 5, wherein the timestamp is used to indicate a start time of the authentication action, and the time source is used to synchronize its time with a national standard time.
7. A near field authentication method, comprising:
under the condition of receiving a near field authentication message of a terminal to be authenticated, acquiring a rhythm sequence and time synchronization information, wherein the rhythm sequence is used for indicating an authentication action to be executed, the time synchronization information is used for indicating the time for executing the authentication action, and the time synchronization information comprises a timestamp and a time source;
sending the rhythm sequence and the time synchronization information to the terminal to be authenticated so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information;
the terminal to be authenticated comprises an authentication initiating end and an authentication receiving end corresponding to the authentication initiating end; receiving a near field authentication message of a terminal to be authenticated comprises: receiving a near field call request initiated by the authentication initiating terminal; forwarding the near field call request to the authentication receiving end; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises the near field call request and the near field confirmation message.
8. The method of claim 7, wherein obtaining the cadence sequence and the time synchronization information comprises:
randomly generating the rhythm sequence;
generating a timestamp indicating a start time of the authentication action according to the near field authentication message; and
and generating a time source for synchronizing the time of the terminal to be authenticated with the national standard time according to a network time protocol NTP, wherein the time synchronization information comprises the timestamp and the time source.
9. The method according to any of claims 7 to 8, wherein the authentication action comprises at least one of: flashing action of the flash lamp, vibrating action of the vibrator, flashing action of the car lamp and whistling action of the car horn.
10. The method according to claim 9, wherein the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information, and the method comprises:
and the terminal to be authenticated controls the flash lamp to execute the flash action indicated by the rhythm sequence according to the time indicated by the time synchronization information, and/or controls the vibrator to execute the vibration action indicated by the rhythm sequence.
11. The method according to claim 9, wherein the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information, and the method comprises:
and the terminal to be authenticated sends a control instruction to the automobile connected with the terminal to be authenticated through an OBD (on-board diagnostics) interface according to the time indicated by the time synchronization information so as to control the automobile lamp to execute the flashing action and/or control the automobile horn to execute the whistling action.
12. A near field authentication apparatus, comprising:
the terminal comprises a receiving unit and a processing unit, wherein the receiving unit is used for receiving a rhythm sequence and time synchronization information sent by a server in the process of near field authentication with a terminal to be authenticated, the rhythm sequence is used for indicating an authentication action to be executed, the time synchronization information is used for indicating the time for executing the authentication action, and the time synchronization information comprises a timestamp and a time source;
a processing unit configured to execute the authentication action indicated in the rhythm sequence based on the time synchronization information;
the receiving unit is used for receiving the rhythm sequence and the time synchronization information sent by the server under the condition of receiving a near field authentication message of the terminal to be authenticated, wherein the terminal to be authenticated comprises an authentication initiating end and an authentication receiving end corresponding to the authentication initiating end; the receiving unit is used for receiving the near field authentication message of the terminal to be authenticated through the following steps: receiving a near field call request initiated by the authentication initiating terminal; forwarding the near field call request to the authentication receiving end; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises the near field call request and the near field confirmation message.
13. A near field authentication apparatus, comprising:
the terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a rhythm sequence and time synchronization information under the condition of receiving a near field authentication message of a terminal to be authenticated, the rhythm sequence is used for indicating an authentication action to be executed, the time synchronization information is used for indicating the time for executing the authentication action, and the time synchronization information comprises a timestamp and a time source;
a sending unit, configured to send the rhythm sequence and the time synchronization information to the terminal to be authenticated, so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information, where the terminal to be authenticated synchronizes its own time with a national standard time according to the time source, and executes the authentication action from a time point indicated by the timestamp;
the terminal to be authenticated comprises an authentication initiating end and an authentication receiving end corresponding to the authentication initiating end; receiving a near field authentication message of a terminal to be authenticated: receiving a near field call request initiated by the authentication initiating terminal; forwarding the near field call request to the authentication receiving end; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises the near field call request and the near field confirmation message.
14. A terminal, comprising:
the system comprises a receiver and a server, wherein the receiver is used for receiving a rhythm sequence and time synchronization information sent by the server in the process of carrying out near field authentication with a terminal to be authenticated, the rhythm sequence is used for indicating an authentication action to be executed, the time synchronization information is used for indicating the time for executing the authentication action, and the time synchronization information comprises a timestamp and a time source;
a processor running a program, wherein the program is run to perform the following processing steps on data output from the receiver: based on the time synchronization information, the authentication action indicated in the rhythm sequence is executed, wherein the terminal to be authenticated synchronizes the time with the national standard time according to the time source, and the authentication action is executed from the time point indicated by the timestamp;
under the condition of receiving a near field authentication message of the terminal to be authenticated, receiving the rhythm sequence and the time synchronization message sent by the server, wherein the terminal to be authenticated comprises an authentication initiating end and an authentication receiving end corresponding to the authentication initiating end; receiving the near field authentication message of the terminal to be authenticated comprises: receiving a near field call request initiated by the authentication initiating terminal; forwarding the near field call request to the authentication receiving end; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises the near field call request and the near field confirmation message.
15. A near field authentication system, comprising:
the terminal to be authenticated is used for receiving a rhythm sequence and time synchronization information sent by a server in the process of near-field authentication with the terminal to be authenticated at the opposite end, wherein the rhythm sequence is used for indicating an authentication action to be executed, the time synchronization information is used for indicating the time for executing the authentication action, and the time synchronization information comprises a timestamp and a time source; based on the time synchronization information, the authentication action indicated in the rhythm sequence is executed, wherein the terminal to be authenticated synchronizes the time with the national standard time according to the time source, and the authentication action is executed from the time point indicated by the timestamp;
the server is used for acquiring a rhythm sequence and time synchronization information under the condition of receiving a near field authentication message of the terminal to be authenticated, wherein the rhythm sequence is used for indicating an authentication action to be executed, and the time synchronization information is used for indicating the time for executing the authentication action; sending the rhythm sequence and the time synchronization information to the terminal to be authenticated so that the terminal to be authenticated executes the authentication action indicated in the rhythm sequence based on the time synchronization information;
under the condition of receiving a near field authentication message of the terminal to be authenticated, receiving the rhythm sequence and the time synchronization message sent by the server, wherein the terminal to be authenticated comprises an authentication initiating end and an authentication receiving end corresponding to the authentication initiating end; receiving the near field authentication message of the terminal to be authenticated comprises: receiving a near field call request initiated by the authentication initiating terminal; forwarding the near field call request to the authentication receiving end; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises the near field call request and the near field confirmation message.
16. A storage medium, characterized in that the storage medium comprises a stored program, wherein when the program runs, a device in which the storage medium is located is controlled to execute the near field authentication method according to any one of claims 1 to 11.
17. A processor, characterized in that the processor is configured to execute a program, wherein the program executes the near field authentication method according to any one of claims 1 to 11.
18. A method of data processing, comprising:
the method comprises the steps that an authentication initiating terminal obtains a rhythm sequence and time synchronization information, wherein the rhythm sequence is used for indicating at least one operation, and the time synchronization information comprises a timestamp and a time source;
the authentication initiating terminal executes the at least one operation based on the time synchronization information, wherein an authentication receiving terminal corresponding to the authentication initiating terminal synchronizes self time with national standard time according to the time source and executes the authentication action from the time point indicated by the timestamp;
under the condition of receiving a near field authentication message of a terminal to be authenticated, receiving the rhythm sequence and the time synchronization message sent by the server, wherein the terminal to be authenticated comprises an authentication initiating end and an authentication receiving end corresponding to the authentication initiating end; receiving the near field authentication message of the terminal to be authenticated comprises: receiving a near field call request initiated by the authentication initiating terminal; forwarding the near field call request to the authentication receiving end; and receiving a near field confirmation message returned by the authentication receiving end, wherein the near field authentication message comprises the near field call request and the near field confirmation message.
19. The data processing method of claim 18, wherein the operation comprises at least one of: flashing action of the flash lamp, vibrating action of the vibrator, flashing action of the car lamp and whistling action of the car horn.
20. The data processing method of claim 18 or 19, further comprising:
acquiring time synchronization information, wherein the time synchronization information is used for indicating the time for executing the operation;
wherein performing the at least one operation comprises:
and executing the at least one operation according to the time indicated by the time synchronization information.
CN201710794942.5A 2017-09-06 2017-09-06 Near field authentication method, device and system and data processing method Active CN109462625B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710794942.5A CN109462625B (en) 2017-09-06 2017-09-06 Near field authentication method, device and system and data processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710794942.5A CN109462625B (en) 2017-09-06 2017-09-06 Near field authentication method, device and system and data processing method

Publications (2)

Publication Number Publication Date
CN109462625A CN109462625A (en) 2019-03-12
CN109462625B true CN109462625B (en) 2022-05-31

Family

ID=65605915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710794942.5A Active CN109462625B (en) 2017-09-06 2017-09-06 Near field authentication method, device and system and data processing method

Country Status (1)

Country Link
CN (1) CN109462625B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996487A (en) * 2010-10-21 2011-03-30 上海海洋大学 Vehicle networking intelligent traffic information system and implementation method thereof
CN104992509A (en) * 2015-07-06 2015-10-21 南京物联传感技术有限公司 Device and system for quick vehicle identification under remote control of vehicle-borne display color lamp
CN105610497A (en) * 2014-11-21 2016-05-25 阿里巴巴集团控股有限公司 Data processing method, data processing device and data processing system for information interaction
CN106303958A (en) * 2016-08-11 2017-01-04 深圳市元征科技股份有限公司 Car searching method and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101639892A (en) * 2008-08-01 2010-02-03 深圳市同洲电子股份有限公司 Method, system and mobile terminal for authenticating identity
US8750943B2 (en) * 2008-12-23 2014-06-10 General Motors Llc Vehicle telematics communication for well-being checks
CN102186142A (en) * 2011-05-09 2011-09-14 哈尔滨黑石科技有限公司 Instant wireless calling system for taxis
CN104915828A (en) * 2015-05-15 2015-09-16 努比亚技术有限公司 Near field communication-based data processing method, device and system
KR20170016537A (en) * 2015-08-03 2017-02-14 엔에이치엔엔터테인먼트 주식회사 Call taxi service server, call taxi service system having the server and call taxi service method using the system
CN105915576A (en) * 2015-12-18 2016-08-31 乐视致新电子科技(天津)有限公司 Vehicle remote control method, apparatus and system
CN106100845B (en) * 2016-06-06 2021-06-18 徐伟达 Identity authentication method and system using sound wave communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996487A (en) * 2010-10-21 2011-03-30 上海海洋大学 Vehicle networking intelligent traffic information system and implementation method thereof
CN105610497A (en) * 2014-11-21 2016-05-25 阿里巴巴集团控股有限公司 Data processing method, data processing device and data processing system for information interaction
CN104992509A (en) * 2015-07-06 2015-10-21 南京物联传感技术有限公司 Device and system for quick vehicle identification under remote control of vehicle-borne display color lamp
CN106303958A (en) * 2016-08-11 2017-01-04 深圳市元征科技股份有限公司 Car searching method and system

Also Published As

Publication number Publication date
CN109462625A (en) 2019-03-12

Similar Documents

Publication Publication Date Title
CN109155907B (en) Internet of vehicles synchronization method and device
CN110852839A (en) Method, device and storage medium for interfacing energy service business
CN103119969A (en) Indirect device communication
CN108200141A (en) A kind of car data-sharing systems and method
CN106375995A (en) Information processing method and system, and vehicle-mounted communication apparatus
CN103188321A (en) Information synchronizing method and system based on cloud server
CN108702366B (en) Equipment connection method and terminal
CN104406600A (en) Method, equipment and system for updating vehicle-mounted offline map data
CN112543431A (en) Account synchronization method, medium and server
CN111182515A (en) Network distribution method, device, terminal and computer storage medium
CN115136625A (en) Vehicle machine system login method and related device
CN107087293B (en) Access method, terminal and server
CN106469128A (en) Control electronic equipment, accessory device and the control method being connected with accessory device
CN107295062B (en) Article uses control method, equipment, system and article
CN108791188B (en) Vehicle control method, device and system
CN109462625B (en) Near field authentication method, device and system and data processing method
CN111866783B (en) Order processing method, order processing device, computer equipment and storage medium
CN111867048A (en) Registration control method and device of VoWiFi, electronic equipment and server
CN108551652B (en) Binding method and device of child equipment, equipment and storage medium
CN115665701A (en) Vehicle-mounted machine interconnection method based on wireless charging module and related product
CN112740579B (en) Data transmission method, device and related equipment
CN112714122B (en) Communication system and method
CN105978853B (en) Session scheduling method, scheduling server and terminal
US20130042176A1 (en) Methods systems and computer program products for managing sound files of a vehicle
CN106453574A (en) Mobile terminal broadcast hotspot file sharing method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant