CN109714769B - Information binding method, device, equipment and storage medium - Google Patents

Information binding method, device, equipment and storage medium Download PDF

Info

Publication number
CN109714769B
CN109714769B CN201811652964.9A CN201811652964A CN109714769B CN 109714769 B CN109714769 B CN 109714769B CN 201811652964 A CN201811652964 A CN 201811652964A CN 109714769 B CN109714769 B CN 109714769B
Authority
CN
China
Prior art keywords
terminal
information
binding
terminal information
verification
Prior art date
Application number
CN201811652964.9A
Other languages
Chinese (zh)
Other versions
CN109714769A (en
Inventor
孙吉平
念龙龙
叶哲
Original Assignee
北京深思数盾科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京深思数盾科技股份有限公司 filed Critical 北京深思数盾科技股份有限公司
Priority to CN201811652964.9A priority Critical patent/CN109714769B/en
Publication of CN109714769A publication Critical patent/CN109714769A/en
Application granted granted Critical
Publication of CN109714769B publication Critical patent/CN109714769B/en

Links

Abstract

The embodiment of the invention discloses an information binding method, an information binding device, information binding equipment and a storage medium. The method comprises the following steps: a first terminal receives a device binding request containing second terminal information sent by a second terminal in communication coupling; the first terminal generates an authentication request containing first terminal information and second terminal information according to the binding request, and sends the authentication request to the server through the second terminal, so that the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information; the first terminal receives verification data sent by the second terminal after the server successfully verifies the validity of the first terminal bound with the second terminal, and verifies the verification data; and after the first terminal determines that the verification is successful, the second terminal information is marked as the binding equipment information. By the technical scheme, information leakage can be avoided, and the safety of user data is improved.

Description

Information binding method, device, equipment and storage medium

Technical Field

The embodiments of the present invention relate to information security technologies, and in particular, to an information binding method, apparatus, device, and storage medium.

Background

The current society has already stepped into the information society, and meanwhile, people also increasingly attach importance to information safety.

Most of intelligent terminal equipment in the market at present, such as intelligent terminal equipment such as bracelet, body fat scale, only with the mobile terminal equipment that the user held, like the cell-phone, carry out the bluetooth and pair the back, user alright with can be through the user information in the mobile terminal equipment direct use or the record intelligent terminal equipment. At the moment, if the third party uses other mobile terminals to perform Bluetooth pairing with the intelligent terminal device under the condition that the current user is unknown, the third party can directly communicate with the intelligent terminal device to further operate or access the related information of the user, so that the information leakage and privacy leakage of the user are easily caused, and the safety of the user information in the intelligent terminal device is reduced.

Disclosure of Invention

The embodiment of the invention provides an information binding method, an information binding device, information binding equipment and a storage medium, which are used for avoiding information leakage and improving the safety of user data.

In a first aspect, an embodiment of the present invention provides an information binding method, including:

a first terminal receives a device binding request containing second terminal information sent by a second terminal in communication coupling;

the first terminal generates an authentication request containing first terminal information and second terminal information according to the binding request, and sends the authentication request to a server through the second terminal, so that the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information;

the first terminal receives verification data which is sent by the second terminal after the server successfully verifies the validity of the first terminal binding the second terminal, and verifies the verification data;

and after the first terminal determines that the verification is successful, the second terminal information is identified as binding equipment information.

In a second aspect, an embodiment of the present invention further provides an information binding method, where the method includes:

the method comprises the steps that a server receives an authentication request sent by a first terminal through a second terminal, wherein the authentication request comprises first terminal information and second terminal information;

the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information;

and after determining that the validity verification of the binding of the first terminal to the second terminal is successful, the server generates verification data and forwards the verification data to the first terminal through the second terminal, so that the first terminal identifies the second terminal information as the binding equipment information of the first terminal after successfully verifying the verification data.

In a third aspect, an embodiment of the present invention further provides an information binding apparatus, configured in a first terminal, where the apparatus includes:

the information receiving module is used for receiving a device binding request containing second terminal information, which is sent by a second terminal in communication coupling;

a request sending module, configured to generate an authentication request including first terminal information and the second terminal information according to the binding request, and send the authentication request to a server through the second terminal, so that the server verifies, according to the first terminal information and the second terminal information, that the first terminal binds the second terminal legality;

the data verification module is used for receiving verification data which is sent by the second terminal after the server successfully verifies the validity of the first terminal binding the second terminal, and verifying the verification data;

and the information identification module is used for identifying the second terminal information as the binding equipment information after the verification is determined to be successful.

In a fourth aspect, an embodiment of the present invention further provides an information binding apparatus, configured in a server, where the apparatus includes:

the terminal comprises a request receiving module, a first sending module and a second sending module, wherein the request receiving module is used for receiving an authentication request sent by a first terminal through a second terminal, and the authentication request comprises first terminal information and second terminal information;

the information verification module is used for verifying the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information;

and the data generation module is used for generating verification data after the validity verification of the second terminal bound to the first terminal is determined to be successful, and forwarding the verification data to the first terminal through the second terminal so as to identify the second terminal information as the bound equipment information of the first terminal after the verification of the verification data by the first terminal is successful.

In a fifth aspect, an embodiment of the present invention further provides a computer device, where the computer device includes:

one or more processors;

a memory for storing one or more programs;

when executed by the one or more processors, cause the one or more processors to implement the information binding method according to any one of the embodiments of the present invention.

In a sixth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the information binding method according to any one of the embodiments of the present invention.

The embodiment of the invention receives a device binding request which is sent by a communication coupling second terminal and contains second terminal information through a first terminal, generates an authentication request which contains the first terminal information and the second terminal information according to the binding request, and sends the authentication request to a server through the second terminal so as to ensure that the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information, when the first terminal receives verification data which is sent by the second terminal after the legality of the first terminal binding the second terminal is successfully verified by the server, the verification data is verified, and after the verification is successful, the second terminal information is identified as binding device information, and the problems that the user privacy and information leakage are easily caused when the first terminal is in communication connection with other terminals in the prior art are solved by binding the first terminal and the second terminal, the effects of avoiding information leakage and improving the safety of user data are achieved.

Drawings

Fig. 1 is a flowchart illustrating an information binding method according to an embodiment of the present invention;

fig. 2a is a schematic flowchart of an information binding method according to a second embodiment of the present invention;

fig. 2b is a schematic flowchart of information binding between a mobile terminal and an intelligent terminal according to a second embodiment of the present invention;

fig. 3 is a schematic structural diagram of an information binding apparatus according to a third embodiment of the present invention;

fig. 4 is a schematic structural diagram of an information binding apparatus according to a fourth embodiment of the present invention;

fig. 5 is a schematic structural diagram of a computer device according to a fifth embodiment of the present invention;

fig. 6 is a schematic structural diagram of a computer device according to a sixth embodiment of the present invention.

Detailed Description

The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.

Example one

Fig. 1 is a flowchart illustrating an information binding method according to an embodiment of the present invention. The method is applicable to the information binding between the devices, and can be executed by an information binding device, wherein the device can be composed of hardware and/or software, and can be generally integrated in an intelligent bracelet, a body fat scale and all intelligent terminals which contain user information and have an information binding function. The method specifically comprises the following steps:

s110, the first terminal receives a device binding request which is sent by a second terminal and is in communication coupling and contains second terminal information.

In this embodiment, the first terminal may be, for example, an intelligent terminal having a data storage function, such as an intelligent bracelet, a watch, a body fat scale, and the like, and the second terminal may be, for example, a mobile terminal, such as a mobile phone, a tablet, and the like, in which application software may be installed. In the prior art, after a first terminal, that is, an intelligent terminal, establishes a communication connection with any one terminal, for example, a mobile terminal, a user can use and access information data stored in the intelligent terminal through the mobile terminal communicatively coupled with the intelligent terminal, so that information leakage and privacy leakage of the user are easily caused, and the security of the user data stored in the intelligent terminal is reduced.

In order to ensure the security of the user information data, ensure that the user of the current intelligent terminal is the user recording the user information data, and prevent the privacy of the user from being damaged due to equipment loss or malicious operation of equipment by a third person, the embodiment provides a processing flow for binding the user information by the intelligent terminal, and ensures the security of the user information.

In this embodiment, the first terminal may correspond to first terminal information for uniquely identifying the first terminal, and the second terminal may correspond to second terminal information for uniquely identifying the second terminal. The terminal information includes, but is not limited to, a serial number of the terminal device, a terminal communication identifier, user information registered in the terminal, and the like, for example, the first terminal information may be a device serial number of the bracelet, and the second terminal information may be a mobile phone number of the mobile phone, owner information, and the like.

For example, when the first terminal is registered for use for the first time, the first terminal may be bound with a legal second terminal, so that the first terminal can distinguish whether a connected terminal is a bound second terminal in subsequent use. Specifically, the first terminal and the second terminal may be first connected in a communication coupling manner, so that the first terminal receives and verifies an equipment binding request containing the second terminal information sent by the second terminal, and then equipment binding is achieved. The first terminal and the second terminal are in communication coupling connection in a mode including but not limited to bluetooth pairing connection, WIFI connection, data line connection and the like.

S120, the first terminal generates an authentication request containing the first terminal information and the second terminal information according to the binding request, and sends the authentication request to the server through the second terminal, so that the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information.

In this embodiment, the first terminal is correspondingly provided with a corresponding server, which is used for verifying the validity of the binding terminal in the process of device binding of the first terminal. Illustratively, in order to ensure that the second terminal information bound with the first terminal is information registered by a valid user in advance when the first terminal binds the second terminal, the first terminal may extract the second terminal information from the received binding request, perform corresponding processing on the first terminal information of the first terminal and the extracted second terminal information, send the second terminal information as an authentication request to the second terminal, and forward the second terminal information to a server correspondingly arranged on the first terminal, so that the server verifies the validity of the first terminal binding the second terminal.

Taking the smart band as an example, after the smart band and the mobile phone are successfully connected through bluetooth, the smart band can receive a binding request sent by the mobile phone, and according to the binding request, the smart band can generate an authentication request containing a mobile phone number, owner information and a smart band serial number, and send the authentication request to the band server through the mobile phone, so that the server verifies the validity of the smart band binding mobile phone according to the mobile phone number, the owner information and the smart band serial number contained in the authentication request, that is, whether the mobile phone is a registered mobile phone.

Specifically, in the process of generating the authentication request, the first terminal information and the second terminal information may be directly carried, or the first terminal information and the second terminal information may be carried after being processed according to a preset mode, and the process result information is not limited herein.

Optionally, the first terminal information and the second terminal information in the authentication request are first ciphertexts generated by the first terminal through encryption by using the first pre-established key, so that the server verifies the validity of the first terminal binding the second terminal according to the first terminal information and the second terminal information after successfully decrypting the first ciphertexts.

For example, in the process of generating the authentication request, the first terminal may perform encryption processing on the first terminal information and the second terminal information through a first pre-formed key stored in the first terminal. The purpose of the encryption processing is to further protect the first terminal information and the second terminal information sent to the server, so that when the first terminal information and the second terminal information are sent to the server through the second terminal for verification, the first terminal information and the second terminal information are stolen by other terminals, the first terminal information and the second terminal information are copied or forged, and further the first terminal information and the second terminal information are impersonated to be bound as equipment, so that the information security in the verification process is improved.

The server may have a corresponding decryption key prestored therein corresponding to the first prefabricated key stored in the first terminal, and may decrypt the first ciphertext included in the authentication request using the decryption key, and compare the information obtained after decryption with information registered in advance by the user in the server, so as to ensure that the user performing the information binding operation is a valid user, that is, to ensure that the first terminal binds the validity of the second terminal. If the information obtained after decryption is consistent with the first terminal information and the second terminal information which are registered in advance by the user in the server, the validity verification that the first terminal binds the second terminal can be determined to be successful; and if the information obtained after decryption is inconsistent with the information pre-registered by the user in the server, determining that the validity verification of the first terminal binding the second terminal fails.

S130, the first terminal receives verification data sent by the second terminal after the server successfully verifies the validity of the first terminal binding the second terminal, and verifies the verification data.

In this embodiment, after the validity verification that the server binds the second terminal to the first terminal is successful, the server may generate corresponding verification data to feed back a validity verification result to the first terminal. Specifically, the server may forward the verification data to the first terminal through the second terminal, and the first terminal may verify the verification data after receiving the verification data, so as to determine the validity of the second terminal requested to be bound, and ensure that the verification data forwarded by the second terminal is not changed. It should be noted that, while feeding back the verification data, the server may also send other additional information, such as version information of the first terminal system, to the first terminal through the second terminal.

Specifically, the manner of verifying the verification data may be determined according to the manner used when the server generates the verification data.

In an optional implementation manner of this embodiment, the verification data includes a first checksum generated by the server according to part or all of the first terminal information and/or the second terminal information; correspondingly, the verifying the verification data by the first terminal includes: the first terminal generates a second checksum according to part or all of the first terminal information and/or the second terminal information, and compares the second checksum with the first checksum; if the comparison is consistent, the verification of the verification data is determined to be successful, otherwise, the verification of the verification data is determined to be failed.

For example, in the process of generating the verification data by the server, the first checksum may be generated as the verification data according to part or all of the first terminal information, or part or all of the second terminal information, or part or all of the first terminal information and the second terminal information, extracted from the authentication request. Accordingly, after receiving the first checksum, the first terminal may also generate a second checksum in the same manner as that used when the server generates the first checksum, and compare the two checksums: if the comparison is consistent, the verification data is determined to be successfully verified; and if the checksums are inconsistent, determining that the verification of the verification data fails.

In another optional implementation manner of this embodiment, the verification data includes a key factor and a second ciphertext, and the second ciphertext is generated by encrypting, by the server, part or all of the first terminal information and/or the second terminal information; correspondingly, the verifying the verification data by the first terminal includes: the first terminal synthesizes a symmetric key according to the key factor and the second prefabricated key, decrypts the second ciphertext by using the symmetric key, and compares the information obtained after decryption with corresponding information stored in the first terminal; if the comparison is consistent, the verification of the verification data is determined to be successful, otherwise, the verification of the verification data is determined to be failed.

For example, in the process of generating the verification data by the server, a second ciphertext generated by encrypting part or all of the first terminal information and/or the second terminal information using the saved key, and a key factor required for synthesizing the symmetric key in decryption may be used as the verification data. Correspondingly, after receiving the second ciphertext and the key factor, the first terminal synthesizes the key factor and a second pre-established key pre-stored in the first terminal into a symmetric key according to a pre-established algorithm. The preset algorithm may include an algorithm such as sum, or, xor, etc. The first terminal decrypts the second ciphertext by using the symmetric key, and then compares the information obtained after decryption with part or all of the first terminal information and/or the second terminal information stored in the first terminal: if the comparison is consistent, the verification data is determined to be successfully verified; and if the verification data are inconsistent, determining that the verification of the verification data fails.

The above two verification methods are only examples, and the method of verifying the verification data is not limited to the above two methods, and any other verification method may be applied as long as it can verify that the received verification data is not tampered.

And S140, after the first terminal determines that the verification is successful, the second terminal information is marked as the binding equipment information.

When the first terminal determines that the received verification data is successfully verified, the second terminal is a legal binding terminal, and the second terminal information can be recorded on the first terminal and identified as the binding device information. After binding is successful, when a terminal is connected with a first terminal, the terminal information of the terminal can be compared with the binding equipment information, if the terminal is consistent with the binding equipment information, the terminal is a bound second terminal, operation of the terminal is permitted, and relevant data of a user are accessed, otherwise, the terminal is an illegal terminal, and the operation of the terminal is forbidden, and relevant data of the user are not accessed.

When the first terminal determines that the verification of the received verification data fails, the second terminal is an illegal binding terminal, the binding request of the second terminal can be refused, the binding process is terminated, and illegal error feedback information is sent to the second terminal to inform the second terminal of the failed binding.

In the technical scheme of this embodiment, a first terminal receives a device binding request containing second terminal information sent by a communicatively coupled second terminal, generates an authentication request containing the first terminal information and the second terminal information according to the binding request, and sends the authentication request to a server through the second terminal, so that the server verifies the legitimacy of the first terminal binding the second terminal according to the first terminal information and the second terminal information, when the first terminal receives verification data sent by the second terminal after the legitimacy of the first terminal binding the second terminal by the server is successfully verified, the verification data is verified, and after the verification is successful, the second terminal information is identified as binding device information, and the problem that user privacy and information leakage are easily caused when the first terminal is in communication connection with other terminals in the prior art is solved by binding the first terminal and the second terminal, the effects of avoiding information leakage and improving the safety of user data are achieved.

Example two

Fig. 2a is a flowchart illustrating an information binding method according to a second embodiment of the present invention. The method is applicable to the case of legality verification of binding between devices, and can be executed by an information binding apparatus, which can be composed of hardware and/or software, and can be generally integrated in a server. The method specifically comprises the following steps:

s210, the server receives an authentication request sent by the first terminal through the second terminal, wherein the authentication request comprises first terminal information and second terminal information.

In this embodiment, the first terminal may be, for example, an intelligent terminal having a data storage function, such as an intelligent bracelet, a watch, a body fat scale, and the like, and the second terminal may be, for example, a mobile terminal, such as a mobile phone, a tablet, and the like, in which application software may be installed. The first terminal may correspond to first terminal information for uniquely identifying the first terminal, and the second terminal may correspond to second terminal information for uniquely identifying the second terminal. The terminal information includes, but is not limited to, a serial number of the terminal device, a terminal communication identifier, user information registered in the terminal, and the like, for example, the first terminal information may be a device serial number of the bracelet, and the second terminal information may be a mobile phone number of the mobile phone, owner information, and the like. Specifically, the first terminal is correspondingly provided with a corresponding server for verifying the validity of the binding terminal in the equipment binding process of the first terminal.

Illustratively, in order to ensure that the second terminal information bound with the first terminal is information registered by a valid user in advance when the first terminal binds the second terminal, the first terminal may extract the second terminal information from the received binding request, perform corresponding processing on the first terminal information of the first terminal and the extracted second terminal information, send the second terminal information as an authentication request to the second terminal, and forward the second terminal information to a server correspondingly arranged on the first terminal, so that the server verifies the validity of the first terminal binding the second terminal.

The authentication request may directly carry the first terminal information and the second terminal information, or may carry processing result information after the first terminal information and the second terminal information are processed according to a preset mode, which is not limited herein.

S220, the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information.

In this embodiment, the server may pre-store terminal information registered by the user, where the terminal information may specifically be terminal information corresponding to the binding legal terminal and the bound legal terminal, respectively. The validity of the first terminal binding the second terminal may be verified by obtaining the first terminal information and the second terminal information from the received authentication request and comparing the first terminal information and the second terminal information with the terminal information stored in advance. If the first terminal information is consistent with the terminal information corresponding to the binding legal terminal and the second terminal information is consistent with the terminal information corresponding to the bound legal terminal, the validity verification that the first terminal binds the second terminal can be determined to be successful; and if the first terminal information is inconsistent with the terminal information corresponding to the binding legal terminal or the second terminal information is inconsistent with the terminal information corresponding to the bound legal terminal, determining that the validity verification of the first terminal binding the second terminal fails.

Optionally, the first terminal information and the second terminal information in the authentication request are a first ciphertext generated by the first terminal through encryption by using a first pre-formed key; correspondingly, the step of verifying the validity of the first terminal binding the second terminal according to the first terminal information and the second terminal information by the server comprises the following steps: decrypting the first ciphertext using a decryption key that matches the first pre-formed key; comparing the decrypted second terminal information and the decrypted first terminal information with the reserved information; if the comparison is consistent, the validity verification of the first terminal binding the second terminal is determined to be successful, otherwise, the validity verification of the first terminal binding the second terminal is determined to be failed.

For example, in the process of generating the authentication request, the first terminal may perform encryption processing on the first terminal information and the second terminal information through a first pre-formed key stored in the first terminal. The purpose of the encryption processing is to further protect the first terminal information and the second terminal information sent to the server, so that when the first terminal information and the second terminal information are sent to the server through the second terminal for verification, the first terminal information and the second terminal information are stolen by other terminals, the first terminal information and the second terminal information are copied or forged, and further the first terminal information and the second terminal information are impersonated to be bound as equipment, so that the information security in the verification process is improved.

The server may have a corresponding decryption key prestored therein corresponding to the first prefabricated key stored in the first terminal, and may decrypt the first ciphertext included in the authentication request by using the decryption key, and compare the information obtained after decryption with information, that is, the reserved information, previously registered by the user in the server, so as to ensure that the user performing the information binding operation is a valid user, that is, to ensure that the first terminal binds the legitimacy of the second terminal. If the information obtained after decryption is consistent with the first terminal information and the second terminal information which are registered in advance by the user in the server, the validity verification that the first terminal binds the second terminal can be determined to be successful; and if the information obtained after decryption is inconsistent with the information pre-registered by the user in the server, determining that the validity verification of the first terminal binding the second terminal fails.

S230, after the server determines that the validity verification of the second terminal bound to the first terminal is successful, verification data is generated and forwarded to the first terminal through the second terminal, so that the second terminal information is identified as the bound device information of the first terminal after the verification of the verification data by the first terminal is successful.

In this embodiment, after the validity verification that the server binds the second terminal to the first terminal is successful, the server may generate corresponding verification data to feed back a validity verification result to the first terminal. Specifically, the server may forward the verification data to the first terminal through the second terminal, and after receiving the verification data, the first terminal may verify the verification data to determine validity of the second terminal requested to be bound, and ensure that the verification data forwarded by the second terminal is not changed, and after the verification is successful, identify the second terminal information as the binding device information of the first terminal.

In an optional implementation manner of this embodiment, the server may generate the first checksum as the verification data according to part of or all of the information of the first terminal information, or part of or all of the information of the second terminal information, or part of or all of the information of the first terminal information and the information of the second terminal information, extracted from the authentication request.

In another optional implementation manner of this embodiment, the server may use a second ciphertext generated by encrypting part or all of the first terminal information and/or the second terminal information using the stored key, and a key factor required for synthesizing the symmetric key when decrypting, as the verification data.

Optionally, the server may send other additional information, such as version information of the first terminal system, to the first terminal through the second terminal while feeding back the verification data.

According to the technical scheme of the embodiment, the server verifies the legality of the first terminal binding the second terminal according to the authentication request which is sent by the first terminal through the second terminal and contains the first terminal information and the second terminal information, after the fact that the legality of the first terminal binding the second terminal is verified successfully is determined, verification data are generated and forwarded to the first terminal through the second terminal, and therefore after the first terminal verifies the verification data successfully, the second terminal information is identified as the binding equipment information of the first terminal, the legality of the first terminal binding the second terminal is verified, information leakage is avoided, and user data safety is improved.

On the basis of the foregoing embodiments, an information binding process is performed between a first terminal (e.g., an intelligent terminal) and a second terminal (e.g., a mobile terminal), as shown in fig. 2b, first, the mobile terminal initiates binding to the intelligent terminal, where the binding includes sending terminal identification information, the intelligent terminal returns an authentication request to the mobile terminal, where the authentication request includes an authentication packet, the authentication packet is forwarded to a server through the mobile terminal, and after being verified by the server, verification data, which includes a verification code and additional information, is returned to the intelligent terminal through the mobile terminal, and after the verification data is verified by the intelligent terminal, the intelligent terminal feeds back device binding success information to the mobile terminal.

To take a practical example, after the mobile phone and the smart band are bound, the key of the smart is stored in the secure chip in the smart band. After the bracelet finishes user information binding, the user ensures the information security of the fingerprint through the security key in the bracelet. If the user bracelet is lost, even other people take the bracelet, also can't match with the user identity information who binds in the bracelet, consequently can't acquire user data, guarantee user data safety. For another example, after the smart home and the mobile phone are bound, the use safety of the smart home can be ensured, and illegal control is prevented.

EXAMPLE III

Fig. 3 is a schematic structural diagram of an information binding apparatus according to a third embodiment of the present invention. Referring to fig. 3, the information binding apparatus of the present embodiment may be configured in the first terminal, and the information binding apparatus includes: the information receiving module 310, the request sending module 320, the data verifying module 330, and the information identifying module 340 are described in detail below.

An information receiving module 310, configured to receive a device binding request containing second terminal information sent by a communicatively coupled second terminal;

a request sending module 320, configured to generate an authentication request including first terminal information and the second terminal information according to the binding request, and send the authentication request to a server through the second terminal, so that the server verifies, according to the first terminal information and the second terminal information, that the first terminal binds to the second terminal legality;

a data verification module 330, configured to receive verification data sent by the server after the validity verification that the first terminal binds to the second terminal is successful, and verify the verification data;

and the information identification module 340 is configured to identify the second terminal information as the bound device information after determining that the verification is successful.

The information binding apparatus provided in this embodiment receives, by a first terminal, a device binding request containing second terminal information sent by a communicatively coupled second terminal, generates, according to the binding request, an authentication request containing the first terminal information and the second terminal information, and sends, by the second terminal, to a server, so that the server verifies the legitimacy of the first terminal binding the second terminal according to the first terminal information and the second terminal information, when the first terminal receives verification data sent by the second terminal after the legitimacy of the first terminal binding the second terminal by the server is successfully verified, the verification data is verified, and after the verification is successful, the second terminal information is identified as binding device information, and by binding the first terminal and the second terminal, the problem that user privacy and information leakage are easily caused when the first terminal is communicatively connected to other terminals in the prior art is solved, the effects of avoiding information leakage and improving the safety of user data are achieved.

Optionally, the first terminal information and the second terminal information in the authentication request are first ciphertexts generated by the first terminal through encryption by using a first pre-established key, so that the server verifies the validity of the first terminal binding the second terminal according to the first terminal information and the second terminal information after successfully decrypting the first ciphertexts.

Optionally, the verification data includes a first checksum generated by the server according to part or all of the first terminal information and/or the second terminal information;

accordingly, the data verification module 330 may be specifically configured to:

generating a second checksum according to part or all of the first terminal information and/or the second terminal information, and comparing the second checksum with the first checksum;

if the comparison is consistent, the verification of the verification data is determined to be successful, otherwise, the verification of the verification data is determined to be failed.

Optionally, the verification data includes a key factor and a second ciphertext, and the second ciphertext is generated by encrypting, by the server, part or all of the first terminal information and/or the second terminal information;

correspondingly, the data verification module 330 may be further configured to:

synthesizing a symmetric key according to the key factor and a second prefabricated key, decrypting the second ciphertext by using the symmetric key, and comparing the information obtained after decryption with corresponding information stored in the first terminal;

if the comparison is consistent, the verification of the verification data is determined to be successful, otherwise, the verification of the verification data is determined to be failed.

The product can execute the method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.

Example four

Fig. 4 is a schematic structural diagram of an information binding apparatus according to a fourth embodiment of the present invention. Referring to fig. 4, the information binding apparatus of the present embodiment may be configured in a server, and the information binding apparatus includes: the request receiving module 410, the information verifying module 420 and the data generating module 430 are described in detail below.

A request receiving module 410, configured to receive an authentication request sent by a first terminal through a second terminal, where the authentication request includes first terminal information and second terminal information;

an information verifying module 420, configured to verify validity of the first terminal binding the second terminal according to the first terminal information and the second terminal information;

a data generating module 430, configured to generate verification data after determining that the validity verification of binding the second terminal to the first terminal is successful, and forward the verification data to the first terminal through the second terminal, so that after the verification of the verification data by the first terminal is successful, the second terminal information is identified as the binding device information of the first terminal.

The information binding device provided by this embodiment verifies, by the server, the validity of the first terminal binding the second terminal according to the authentication request, which is sent by the first terminal through the second terminal and includes the first terminal information and the second terminal information, generates the verification data after the validity verification of the first terminal binding the second terminal is determined to be successful, and forwards the verification data to the first terminal through the second terminal, so that the first terminal identifies the second terminal information as the binding device information of the first terminal after the verification of the verification data is successful, and verifies the validity of the first terminal binding the second terminal by using the binding device information, thereby achieving the effects of avoiding information leakage and improving the security of user data.

Optionally, the first terminal information and the second terminal information in the authentication request are a first ciphertext generated by the first terminal through encryption by using a first pre-formed key;

correspondingly, the information verification module 420 may be specifically configured to:

decrypting the first ciphertext using a decryption key that matches the first pre-formed key;

comparing the decrypted second terminal information and the decrypted first terminal information with reserved information;

if the comparison is consistent, the validity verification of the first terminal binding the second terminal is determined to be successful, otherwise, the validity verification of the first terminal binding the second terminal is determined to be failed.

The product can execute the method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.

EXAMPLE five

Fig. 5 is a schematic structural diagram of a computer device according to a fifth embodiment of the present invention, and as shown in fig. 5, the computer device according to the fifth embodiment of the present invention may be an intelligent terminal device, and includes: a processor 51 and a memory 52. The number of the processors in the computer device may be one or more, fig. 5 illustrates one processor 51, the processor 51 and the memory 52 in the computer device may be connected by a bus or in other ways, and fig. 5 illustrates the connection by a bus.

The processor 51 of the computer device in this embodiment is integrated with the information binding apparatus provided in the third embodiment. Further, the memory 52 in the computer device is used as a computer-readable storage medium for storing one or more programs, which may be software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the information binding method in the embodiment of the present invention (for example, the modules in the information binding apparatus shown in fig. 3 include an information receiving module 310, a request sending module 320, a data verifying module 330, and an information identifying module 340). The processor 51 executes various functional applications and data processing of the device by executing software programs, instructions and modules stored in the memory 52, that is, implements the information binding method in the above method embodiments.

The memory 52 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory 52 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 52 may further include memory located remotely from the processor 51, which may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.

The processor 51 executes various functional applications and data processing by executing programs stored in the memory 52, thereby implementing, for example, an information binding method provided in the first embodiment of the present invention:

that is, the processor 51 implements, when executing the program: receiving a device binding request containing second terminal information sent by a second terminal in communication coupling; generating an authentication request containing first terminal information and second terminal information according to the binding request, and sending the authentication request to a server through the second terminal so that the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information; receiving verification data which is sent by the second terminal after the legitimacy verification that the first terminal is bound with the second terminal by the server is successful, and verifying the verification data; and after the verification is determined to be successful, identifying the second terminal information as the binding equipment information.

EXAMPLE six

Fig. 6 is a schematic structural diagram of a computer device according to a sixth embodiment of the present invention, and as shown in fig. 6, a computer device provided in this embodiment may be a server device, and includes: a processor 61 and a memory 62. The number of the processors in the computer device may be one or more, and fig. 6 illustrates one processor 61, and the processor 61 and the memory 62 in the computer device may be connected by a bus or in other ways, and fig. 6 illustrates the connection by a bus.

The processor 61 of the computer device in this embodiment is integrated with the information binding apparatus provided in the fourth embodiment. Further, the memory 62 in the computer device is used as a computer-readable storage medium for storing one or more programs, which may be software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the information binding method in the embodiment of the present invention (for example, the modules in the information binding apparatus shown in fig. 4 include a request receiving module 410, an information verifying module 420, and a data generating module 430). The processor 61 executes various functional applications and data processing of the device by executing software programs, instructions and modules stored in the memory 62, that is, implements the information binding method in the above method embodiment.

The memory 62 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory 62 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 62 may further include memory located remotely from the processor 61, which may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.

The processor 61 executes various functional applications and data processing by executing programs stored in the memory 62, thereby implementing, for example, an information binding method provided in the second embodiment of the present invention:

that is, the processor 61 implements, when executing the program: receiving an authentication request sent by a first terminal through a second terminal, wherein the authentication request comprises first terminal information and second terminal information; verifying the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information; and after the validity verification that the first terminal is bound with the second terminal is successful is determined, generating verification data, and forwarding the verification data to the first terminal through the second terminal, so that the first terminal identifies the second terminal information as the binding equipment information of the first terminal after the verification of the verification data by the first terminal is successful.

EXAMPLE seven

The seventh embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by an information binding apparatus, implements an information binding method according to the first embodiment of the present invention, where the method includes: receiving a device binding request containing second terminal information sent by a second terminal in communication coupling; generating an authentication request containing first terminal information and second terminal information according to the binding request, and sending the authentication request to a server through the second terminal so that the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information; receiving verification data which is sent by the second terminal after the legitimacy verification that the first terminal is bound with the second terminal by the server is successful, and verifying the verification data; and after the verification is determined to be successful, identifying the second terminal information as the binding equipment information.

Of course, the computer-readable storage medium provided in the embodiments of the present invention, when being executed, is not limited to implement the method operations described above, and may also implement the relevant operations in the information binding method provided in any embodiment of the present invention.

From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.

It should be noted that, in the embodiment of the information binding apparatus, each unit and each module included in the embodiment are only divided according to functional logic, but are not limited to the above division as long as the corresponding function can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.

Example eight

An eighth embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by an information binding apparatus, implements an information binding method according to the second embodiment of the present invention, where the method includes: receiving an authentication request sent by a first terminal through a second terminal, wherein the authentication request comprises first terminal information and second terminal information; verifying the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information; and after the validity verification that the first terminal is bound with the second terminal is successful is determined, generating verification data, and forwarding the verification data to the first terminal through the second terminal, so that the first terminal identifies the second terminal information as the binding equipment information of the first terminal after the verification of the verification data by the first terminal is successful.

Of course, the computer-readable storage medium provided in the embodiments of the present invention, when being executed, is not limited to implement the method operations described above, and may also implement the relevant operations in the information binding method provided in any embodiment of the present invention.

From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.

It should be noted that, in the embodiment of the information binding apparatus, each unit and each module included in the embodiment are only divided according to functional logic, but are not limited to the above division as long as the corresponding function can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.

It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. An information binding method, comprising:
a first terminal receives a device binding request containing second terminal information sent by a second terminal in communication coupling;
the first terminal generates an authentication request containing first terminal information and second terminal information according to the binding request, and sends the authentication request to a server through the second terminal, so that the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information, wherein the first terminal information and the second terminal information are serial numbers of terminal equipment, terminal communication identifiers or user information registered in the terminal;
the first terminal receives verification data sent by the second terminal after the server successfully verifies the validity of the first terminal binding the second terminal, and verifies the verification data, wherein the verification data comprises a first checksum generated by the server according to part or all of the first terminal information and/or the second terminal information, or the verification data comprises a key factor and a second ciphertext, and the second ciphertext is generated by encrypting part or all of the first terminal information and/or the second terminal information by the server;
and after the first terminal determines that the verification is successful, identifying the second terminal information as binding equipment information, wherein the second terminal information is used for uniquely identifying the second terminal.
2. The method according to claim 1, wherein the first terminal information and the second terminal information in the authentication request are first ciphertexts generated by the first terminal through encryption by using a first pre-formed key, so that the server verifies the validity of the first terminal for binding the second terminal according to the first terminal information and the second terminal information after successfully decrypting the first ciphertexts.
3. The method of claim 1 or 2, wherein the verifying the verification data by the first terminal comprises:
the first terminal generates a second checksum according to part or all of the first terminal information and/or the second terminal information, and compares the second checksum with the first checksum;
if the comparison is consistent, the verification of the verification data is determined to be successful, otherwise, the verification of the verification data is determined to be failed.
4. The method according to claim 1 or 2,
the first terminal verifies the verification data, including:
the first terminal synthesizes a symmetric key according to the key factor and a second prefabricated key, decrypts the second ciphertext by using the symmetric key, and compares the information obtained after decryption with corresponding information stored in the first terminal;
if the comparison is consistent, the verification of the verification data is determined to be successful, otherwise, the verification of the verification data is determined to be failed.
5. An information binding method, comprising:
the method comprises the steps that a server receives an authentication request sent by a first terminal through a second terminal, wherein the authentication request comprises first terminal information and second terminal information;
the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information, wherein the first terminal information and the second terminal information are the serial number of the terminal equipment, the terminal communication identifier or the user information registered in the terminal;
the server generates verification data after determining that the validity verification of the binding of the first terminal to the second terminal is successful, and forwards the verification data to the first terminal through the second terminal, so that the first terminal identifies the second terminal information as binding equipment information of the first terminal after the verification of the verification data is successful, wherein the second terminal information is used for uniquely identifying the second terminal, the verification data comprises a first checksum generated by the server according to part or all of the first terminal information and/or the second terminal information, or the verification data comprises a key factor and a second ciphertext, and the second ciphertext is generated by the server by encrypting part or all of the first terminal information and/or the second terminal information.
6. The method according to claim 5, wherein the first terminal information and the second terminal information in the authentication request are a first ciphertext generated by the first terminal using a first pre-formed key encryption;
the server verifies the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information, and the method comprises the following steps:
decrypting the first ciphertext using a decryption key that matches the first pre-formed key;
comparing the decrypted second terminal information and the decrypted first terminal information with reserved information;
if the comparison is consistent, the validity verification of the first terminal binding the second terminal is determined to be successful, otherwise, the validity verification of the first terminal binding the second terminal is determined to be failed.
7. An information binding apparatus configured in a first terminal, comprising:
the information receiving module is used for receiving a device binding request containing second terminal information, which is sent by a second terminal in communication coupling;
a request sending module, configured to generate an authentication request including first terminal information and the second terminal information according to the binding request, and send the authentication request to a server through the second terminal, so that the server verifies the validity of the first terminal binding the second terminal according to the first terminal information and the second terminal information, where the first terminal information and the second terminal information are a serial number of a terminal device, a terminal communication identifier, or user information registered in the terminal;
the data verification module is used for receiving verification data which is sent by the server through the second terminal after the legitimacy verification of the first terminal binding the second terminal is successful, and verifying the verification data, wherein the verification data comprises a first checksum generated by the server according to part or all of the first terminal information and/or the second terminal information, or the verification data comprises a key factor and a second ciphertext, and the second ciphertext is generated by encrypting part or all of the first terminal information and/or the second terminal information by the server;
and the information identification module is used for identifying the second terminal information as binding equipment information after the verification is determined to be successful, wherein the second terminal information is used for uniquely identifying the second terminal.
8. An information binding apparatus configured in a server, comprising:
the terminal comprises a request receiving module, a first sending module and a second sending module, wherein the request receiving module is used for receiving an authentication request sent by a first terminal through a second terminal, and the authentication request comprises first terminal information and second terminal information;
the information verification module is used for verifying the legality of the first terminal binding the second terminal according to the first terminal information and the second terminal information, wherein the first terminal information and the second terminal information are a serial number of terminal equipment, a terminal communication identifier or user information registered in the terminal;
the data generating module is configured to generate verification data after it is determined that the validity verification of binding the second terminal to the first terminal is successful, and forward the verification data to the first terminal through the second terminal, so that the first terminal identifies the second terminal information as binding device information of the first terminal after the verification of the verification data is successful, where the second terminal information is used to uniquely identify the second terminal, where the verification data includes a first checksum generated by the server according to part or all of the first terminal information and/or the second terminal information, or the verification data includes a key factor and a second ciphertext generated by the server by encrypting part or all of the first terminal information and/or the second terminal information.
9. A computer device, the device comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the information binding method of any one of claims 1-4 or 5-6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the information binding method according to any one of claims 1 to 4 or 5 to 6.
CN201811652964.9A 2018-12-28 2018-12-28 Information binding method, device, equipment and storage medium CN109714769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811652964.9A CN109714769B (en) 2018-12-28 2018-12-28 Information binding method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811652964.9A CN109714769B (en) 2018-12-28 2018-12-28 Information binding method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109714769A CN109714769A (en) 2019-05-03
CN109714769B true CN109714769B (en) 2020-01-14

Family

ID=66260567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811652964.9A CN109714769B (en) 2018-12-28 2018-12-28 Information binding method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109714769B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616136A (en) * 2008-06-26 2009-12-30 阿里巴巴集团控股有限公司 A kind of method and service integration platform system that Internet service is provided
CN101765108A (en) * 2009-07-01 2010-06-30 北京华胜天成科技股份有限公司 Safety certification service platform system, device and method based on mobile terminal
CN104639549A (en) * 2015-02-05 2015-05-20 小米科技有限责任公司 Equipment binding method and equipment binding device
CN105636023A (en) * 2014-10-28 2016-06-01 福建天晴数码有限公司 Smart device binding method and system
CN107612909A (en) * 2017-09-18 2018-01-19 阿里巴巴集团控股有限公司 Information interacting method, device and equipment on internet of things equipment

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102299930B (en) * 2011-09-19 2014-09-10 北京无限新锐网络科技有限公司 Method for ensuring security of client software
CN103139210B (en) * 2013-02-06 2016-09-14 平安银行股份有限公司 A kind of safety certifying method
CN104063243A (en) * 2014-06-17 2014-09-24 成都雅鲁科技有限公司 Application store solution applied to intelligent dressing equipment
CN104780154B (en) * 2015-03-13 2018-06-19 小米科技有限责任公司 Apparatus bound method and apparatus
CN106161354A (en) * 2015-03-31 2016-11-23 阿里巴巴集团控股有限公司 Service authentication method, device, equipment and service server
CN105553931B (en) * 2015-11-27 2018-09-21 深圳市美贝壳科技有限公司 A kind of method that mobile phone is quickly activated, bound with domestic intelligent equipment
CN105516103A (en) * 2015-11-30 2016-04-20 青岛海尔智能家电科技有限公司 Method, device and system for binding intelligent household electrical appliances
CN106856497A (en) * 2015-12-09 2017-06-16 北京奇虎科技有限公司 The binding method and device of a kind of mobile device and accessory
US9787624B2 (en) * 2016-02-22 2017-10-10 Pebble Technology, Corp. Taking actions on notifications using an incomplete data set from a message
CN106302544A (en) * 2016-10-18 2017-01-04 深圳市金立通信设备有限公司 A kind of safe verification method and system
CN107911337A (en) * 2017-10-11 2018-04-13 海信集团有限公司 A kind of apparatus bound method, server and equipment
CN108173720B (en) * 2017-12-07 2020-09-04 无锡小净共享网络科技有限公司 Control method and system of household appliance and household appliance system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616136A (en) * 2008-06-26 2009-12-30 阿里巴巴集团控股有限公司 A kind of method and service integration platform system that Internet service is provided
CN101765108A (en) * 2009-07-01 2010-06-30 北京华胜天成科技股份有限公司 Safety certification service platform system, device and method based on mobile terminal
CN105636023A (en) * 2014-10-28 2016-06-01 福建天晴数码有限公司 Smart device binding method and system
CN104639549A (en) * 2015-02-05 2015-05-20 小米科技有限责任公司 Equipment binding method and equipment binding device
CN107612909A (en) * 2017-09-18 2018-01-19 阿里巴巴集团控股有限公司 Information interacting method, device and equipment on internet of things equipment

Also Published As

Publication number Publication date
CN109714769A (en) 2019-05-03

Similar Documents

Publication Publication Date Title
US20190364032A1 (en) Method for carrying out a two-factor authentication
US20170006473A1 (en) Apparatus and methods for controlling distribution of electronic access clients
JP6262278B2 (en) Method and apparatus for storage and computation of access control client
US8646063B2 (en) Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
US9338647B2 (en) Mobile station with bond between end device and security element
US9578025B2 (en) Mobile network-based multi-factor authentication
US20150222438A1 (en) System and method for data authentication among processors
EP2957086B1 (en) Method for creating a profile in a security domain of a secured element
US9003516B2 (en) System and method for encrypted smart card pin entry
US9268545B2 (en) Connecting mobile devices, internet-connected hosts, and cloud services
KR100506432B1 (en) Method for enabling pki functions in a smart card
US9094823B2 (en) Data processing for securing local resources in a mobile device
US8606234B2 (en) Methods and apparatus for provisioning devices with secrets
CN101077027B (en) Equipped parameters for changing mobile terminal
DE60207869T2 (en) Method and system for processing information in an electronic device
JP4263384B2 (en) Improved method for authentication of user subscription identification module
US8775794B2 (en) System and method for end to end encryption
US9112905B2 (en) Authentication of access terminal identities in roaming networks
TWI667585B (en) Method and device for safety authentication based on biological characteristics
US7231526B2 (en) System and method for validating a network session
KR100657532B1 (en) A method for securing an electronic device, a security system and an electronic device
US8880036B2 (en) Retrieving data wirelessly from a mobile device
US9769654B2 (en) Method of implementing a right over a content
KR100636111B1 (en) Method protecting data stored in lost mobile terminal and recording medium therefor
CN101958892B (en) Electronic data protection method, device and system based on face recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant