CN110224713B - Safety protection method and system based on high-safety intelligent child watch - Google Patents

Safety protection method and system based on high-safety intelligent child watch Download PDF

Info

Publication number
CN110224713B
CN110224713B CN201910507893.1A CN201910507893A CN110224713B CN 110224713 B CN110224713 B CN 110224713B CN 201910507893 A CN201910507893 A CN 201910507893A CN 110224713 B CN110224713 B CN 110224713B
Authority
CN
China
Prior art keywords
information
child watch
server
watch
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910507893.1A
Other languages
Chinese (zh)
Other versions
CN110224713A (en
Inventor
秦曙光
陈家峰
季英会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Readboy Education Technology Co Ltd
Original Assignee
Readboy Education Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Readboy Education Technology Co Ltd filed Critical Readboy Education Technology Co Ltd
Priority to CN201910507893.1A priority Critical patent/CN110224713B/en
Publication of CN110224713A publication Critical patent/CN110224713A/en
Application granted granted Critical
Publication of CN110224713B publication Critical patent/CN110224713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/385Transceivers carried on the body, e.g. in helmets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/385Transceivers carried on the body, e.g. in helmets
    • H04B2001/3861Transceivers carried on the body, e.g. in helmets carried in a hand or on fingers

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a safety protection method based on an intelligent child watch.A third-party verification end is arranged on a server connected with the intelligent child watch, and when a background needs to read related information of the intelligent child watch in the server, a reading authority needs to be acquired from the third-party verification end; the server does not record ID information in watch equipment, and only records a signature timestamp and permission information corresponding to the intelligent child watch; compared with the prior art, the invention has the advantages that by arranging the third party verification unit and the ID setting unit, the parent information of the children and the accurate positions of the children cannot be obtained because the server side is attacked by the client, and meanwhile, a hacker can not eavesdrop and monitor under the condition that the parents and the children are completely unaware of the eavesdropping and monitoring by adopting the mode that the answering call needs identity authentication and the SIM card communication is disconnected at regular time to obtain and analyze the communication record.

Description

Safety protection method and system based on high-safety intelligent child watch
Technical Field
The invention relates to the field of information security, in particular to a high-security intelligent child watch and a safety protection method thereof.
Background
All information of the child smart phone is actually on the background server, and after the networking function of the common watch is added by each manufacturer, the parent smart phone and the child watch are linked through the background server as a pivot. Because some manufacturers have insufficient visibility to the server, even some manufacturers do not have the server at all, the most critical service content of the children telephone watch is outsourced to other service providers, and the safety is questioned. Hackers attack the server as a node, and weak vendors of the server are easily controlled. A hacker can check the client information by inquiring a server connected with the intelligent watch through the loophole, and can directly check the geographic position of the child, and monitor the privacy contents of the child, such as the geographic coordinate, the daily activity track, the environmental record and the like in real time according to the corresponding ID.
For those who are malicious, the attack code is not complex for the professional, and some websites have even published the code. In reality, the parent's mobile phone number is bound to the child's phone watch. Therefore, a hacker only needs to know the parent's mobile phone number and can push the ID number of the child telephone watch backwards through the mobile phone number. The ID number of each child telephone watch is unique, after the ID number is obtained, the child telephone watch can be attacked by directly inputting an attack program, and the accurate position of the attacked telephone watch can be displayed quickly.
In addition, by utilizing the loophole, a hacker can not only accurately master the position of the watch, but also completely acquire the daily walking route of the child. This means that the positioning information originally held only by the parents may be obtained by lawbreakers due to the existence of security holes. In addition, hackers can monitor the environment of the child, eavesdrop on the children's conversation and surrounding sounds. That is, as long as the watch is in a normal use state, a hacker can eavesdrop and monitor without knowing a parent and a child at all, which is equivalent to putting a positioning eavesdropper in the home. A hacker controls the smart phone to dial out through a program, the attacked child phone watch is always in a black screen state and has no any sign, and the connected party can hear all sounds at the child phone watch.
Meanwhile, preschool children in the rapid development stage know surrounding things on shallow surfaces, and do not understand how to protect themselves. The market of fire and heat and the image of products which frequently appear nowadays cause the protection measure to lose secrecy, criminals try to discard the child intelligent watch as long as finding the child intelligent watch, and even children can take off the watch for various reasons. In the prior art, in order to overcome the problem, when the wearable device is not in use, the appearance, shape, color, material and the like of the wearable device should follow the secret principle; avoid dispersing the limited attention of child in the molding, to the preschool child that is imperfect to social cognition, lacks the safety consciousness simultaneously, do not let other people notice whether child wears wearable equipment.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. Therefore, the invention discloses a safety protection method based on an intelligent child watch, wherein a third party verification end is arranged on a server connected with the intelligent child watch, and when a background needs to read related information of the intelligent child watch in the server, reading permission needs to be obtained from the third party verification end; and the server does not record the ID information in the watch equipment, and only records the corresponding signature timestamp and the permission information of the intelligent child watch.
Preferably, the third party verifying end is a home computer, the third party verifying end comprises a password generator consistent with the smart child watch, when a background needs to read related information of the smart child watch in the server, the third party verifying end sends permission and a signature key generated by the password generator to the server, the signature key is associated with the smart child watch and the server to share the verification key, and the server performs authority verification through signature timestamp information in the verification key.
Preferably, the ID information of the smart child watch is dynamically changing information, and the smart child watch generates the dynamic ID information through a password generator, a SIM card PIN code, and a timestamp.
Preferably, when the smart child watch receives the communication request, the smart child watch permits to be connected after needing to verify the biological information, where the biological information includes: one or more of face information, fingerprints, voiceprints and irises.
Preferably, when the screen of the intelligent child watch is turned off, the connection of the SIM card is disconnected in a fixed period, the intelligent child watch inquires the communication record of the intelligent child watch during the disconnection of the SIM card, and if suspicious communication records are detected, alarm information is sent to the server.
The invention also discloses a high-safety intelligent child watch, which comprises: the system comprises a smart watch, a server and a third party verification terminal; the method comprises the steps that a third party verification end is arranged on a server connected with an intelligent child watch, and when a background needs to read related information of the intelligent child watch in the server, reading permission needs to be obtained from the third party verification end; the server does not record ID information in the watch equipment, and only records a signature timestamp and permission information corresponding to the intelligent child watch.
Furthermore, the third party verifying end is a home computer, the third party verifying end comprises a password generator consistent with the intelligent child watch, when a background needs to read related information of the intelligent child watch in the server, the third party verifying end sends permission and a signature key generated by the password generator to the server, the signature key is associated with the intelligent child watch and the server to share the verification key, and the server performs authority verification through signature timestamp information in the verification key.
Furthermore, the ID setting module is used for generating dynamic ID information through a password generator, an SIM card PIN code and a time stamp.
Furthermore, the smart child watch is provided with a communication verification module, when receiving a communication request, the smart child watch permits connection after needing to verify biological information, wherein the biological information includes: one or more of face information, fingerprints, voiceprints and irises.
Furthermore, the intelligent child watch is provided with a communication anti-hijack module, when the screen of the intelligent child watch is turned off, the connection of the SIM card is disconnected in a fixed period, the intelligent child watch inquires communication records of the intelligent child watch during the disconnection of the SIM card, and if suspicious communication records are detected, alarm information is sent to the server.
Compared with the prior art, the invention has the advantages that by arranging the third party verification unit and the ID setting unit, the parent information of the children and the accurate positions of the children cannot be obtained because the server side is attacked by the client, and meanwhile, a hacker can not eavesdrop and monitor under the condition that the parents and the children are completely unaware of the eavesdropping and monitoring by adopting the mode that the answering call needs identity authentication and the SIM card communication is disconnected at regular time to obtain and analyze the communication record.
Drawings
The invention will be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. In the drawings, like reference numerals designate corresponding parts throughout the different views.
Fig. 1 is a flowchart of a security protection method based on an intelligent child terminal according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. It should be noted that the detailed description set forth in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. The apparatus embodiments and method embodiments described herein are described in the following detailed description and illustrated in the accompanying drawings by various blocks, modules, units, components, circuits, steps, processes, algorithms, etc. (collectively referred to as "elements"). These elements may be implemented using electronic hardware, computer software, or any combination thereof. Whether such elements are implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. The terms first, second, etc. in the description and claims of the present invention and in the drawings of the specification, if used in describing various aspects, are used for distinguishing between different objects and not for describing a particular order.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Example one
As shown in fig. 1, in the safety protection method based on the intelligent child terminal, a third party verification terminal is arranged on a server connected to an intelligent child watch, and when a background needs to read related information of the intelligent child watch in the server, a reading right needs to be acquired from the third party verification terminal; and the server does not record the ID information in the watch equipment, and only records the corresponding signature timestamp and the permission information of the intelligent child watch.
Preferably, the third party verifying end is a home computer, the third party verifying end comprises a password generator consistent with the smart child watch, when a background needs to read related information of the smart child watch in the server, the third party verifying end sends permission and a signature key generated by the password generator to the server, the signature key is associated with the smart child watch and the server to share the verification key, and the server performs authority verification through signature timestamp information in the verification key.
Preferably, the ID information of the smart child watch is dynamically changing information, and the smart child watch generates the dynamic ID information through a password generator, a SIM card PIN code, and a timestamp.
Preferably, when the smart child watch receives the communication request, the smart child watch permits to be connected after needing to verify the biological information, where the biological information includes: one or more of face information, fingerprints, voiceprints and irises.
Preferably, when the screen of the intelligent child watch is turned off, the connection of the SIM card is disconnected in a fixed period, the intelligent child watch inquires the communication record of the intelligent child watch during the disconnection of the SIM card, and if suspicious communication records are detected, alarm information is sent to the server.
The invention also discloses a high-safety intelligent child watch, which comprises: the system comprises a smart watch, a server and a third party verification terminal; the method comprises the steps that a third party verification end is arranged on a server connected with an intelligent child watch, and when a background needs to read related information of the intelligent child watch in the server, reading permission needs to be obtained from the third party verification end; the server does not record ID information in the watch equipment, and only records a signature timestamp and permission information corresponding to the intelligent child watch.
Furthermore, the third party verifying end is a home computer, the third party verifying end comprises a password generator consistent with the intelligent child watch, when a background needs to read related information of the intelligent child watch in the server, the third party verifying end sends permission and a signature key generated by the password generator to the server, the signature key is associated with the intelligent child watch and the server to share the verification key, and the server performs authority verification through signature timestamp information in the verification key.
Furthermore, the ID setting module is used for generating dynamic ID information through a password generator, an SIM card PIN code and a time stamp.
Furthermore, the smart child watch is provided with a communication verification module, when receiving a communication request, the smart child watch permits connection after needing to verify biological information, wherein the biological information includes: one or more of face information, fingerprints, voiceprints and irises.
Furthermore, the intelligent child watch is provided with a communication anti-hijack module, when the screen of the intelligent child watch is turned off, the connection of the SIM card is disconnected in a fixed period, the intelligent child watch inquires communication records of the intelligent child watch during the disconnection of the SIM card, and if suspicious communication records are detected, alarm information is sent to the server.
The smart child watch is not limited to a watch-shaped smart terminal carried by a child, but includes other portable child smart communication devices such as a mobile phone, smart glasses and the like, and these equivalent changes and modifications also fall within the scope of the present invention as defined in the claims.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Although the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications may be made without departing from the scope of the invention. It is therefore intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that it is the following claims, including all equivalents, that are intended to define the spirit and scope of this invention. The above examples are to be construed as merely illustrative and not limitative of the remainder of the disclosure. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.

Claims (8)

1. A safety protection method based on an intelligent child watch is characterized in that a third-party verification end is arranged on a server connected with the intelligent child watch, and when a background needs to read related information of the intelligent child watch in the server, reading permission needs to be obtained from the third-party verification end; the method comprises the steps that ID information in watch equipment is not recorded in a server, only signature time stamps and permission information corresponding to the intelligent child watch are recorded, a third party verification end is a home computer and comprises a password generator consistent with the intelligent child watch, when a background needs to read related information of the intelligent child watch in the server, the third party verification end sends the permission information and signature keys generated by the password generator to the server, the signature keys are associated with the intelligent child watch and the server, and the server conducts authority verification through the signature time stamp information in the signature keys.
2. The method of claim 1, wherein the ID information of the smart child watch is dynamically changing information, and the smart child watch generates the dynamic ID information through the password generator, the SIM PIN code, and the signature timestamp.
3. The smart child watch-based security protection method of claim 2, wherein the smart child watch permits to turn on after needing to verify the biological information when receiving the communication request, wherein the biological information comprises: one or more of face information, fingerprints, voiceprints and irises.
4. The safety protection method based on the smart child watch is characterized in that when the screen of the smart child watch is turned off, the connection of the SIM card is disconnected in a fixed period, the smart child watch inquires the communication record of the smart child watch during the disconnection of the SIM card, and if suspicious communication records are detected, alarm information is sent to the server.
5. The utility model provides an intelligent security protection system of high security which characterized in that includes: the intelligent child watch, the server and the third party verification terminal; the method comprises the steps that a third party verification end is arranged on a server connected with an intelligent child watch, and when a background needs to read related information of the intelligent child watch in the server, reading permission needs to be obtained from the third party verification end; the server does not record ID information in watch equipment, only records signature time stamp and permission information corresponding to the intelligent child watch, the third party verification end is a home computer, the third party verification end comprises a password generator consistent with the intelligent child watch, when a background needs to read related information of the intelligent child watch in the server, the third party verification end sends permission information and a signature key generated by the password generator to the server, the signature key is associated with the intelligent child watch and the server, and the server carries out authority verification through the signature time stamp information in the signature key.
6. The high-security intelligent security protection system of claim 5, wherein the intelligent child watch comprises an ID setting module, the ID information of the intelligent child watch is dynamically changed information, and the ID setting module generates dynamic ID information through the password generator, a SIM card PIN code and the signature timestamp.
7. The high-security intelligent safety protection system according to claim 6, wherein the intelligent child watch includes a communication authentication module, the communication authentication module, upon receiving a communication request, requires authentication of the biometric information, and then permits the connection, and the biometric information includes: one or more of face information, fingerprints, voiceprints and irises.
8. The high-security intelligent safety protection system according to claim 7, wherein the intelligent child watch includes a communication anti-hijack module, the intelligent child watch disconnects the SIM card at a fixed period when the screen is turned off, the communication anti-hijack module queries a communication record of the intelligent child watch during disconnection of the SIM card, and sends an alarm message to the server if a suspicious communication record is detected.
CN201910507893.1A 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch Active CN110224713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910507893.1A CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910507893.1A CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Publications (2)

Publication Number Publication Date
CN110224713A CN110224713A (en) 2019-09-10
CN110224713B true CN110224713B (en) 2020-09-15

Family

ID=67816763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910507893.1A Active CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Country Status (1)

Country Link
CN (1) CN110224713B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022845B (en) * 2022-06-15 2023-07-07 中国联合网络通信集团有限公司 User contact person identification method, operator platform, device and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104757937A (en) * 2015-03-25 2015-07-08 北京良舟通讯科技有限公司 Wearable device and method for old-age affection care and remote health care nursing
CN105007302A (en) * 2015-06-04 2015-10-28 成都果豆数字娱乐有限公司 Mobile terminal data storage method
CN105323245A (en) * 2015-09-29 2016-02-10 北京元心科技有限公司 Intelligent terminal, authorization method and system thereof
CN105656627A (en) * 2014-11-10 2016-06-08 腾讯数码(天津)有限公司 Identity verification method, device and system
CN105871867A (en) * 2016-04-27 2016-08-17 腾讯科技(深圳)有限公司 Identity authentication method, system and equipment
CN108875411A (en) * 2018-07-11 2018-11-23 成都理工大学 The storage of Intelligent bracelet data and sharing method based on block chain
CN109273086A (en) * 2018-07-02 2019-01-25 北京市天元网络技术股份有限公司 User health data management system and method
CN109714760A (en) * 2019-01-18 2019-05-03 浙江科技学院 A kind of right access control method suitable for smart machine under direct-connected communication environment
CN109815731A (en) * 2018-12-29 2019-05-28 深圳云天励飞技术有限公司 Permission processing method and relevant device

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2505678B (en) * 2012-09-06 2014-09-17 Visa Europe Ltd Method and system for verifying an access request
EP3259877B1 (en) * 2015-02-17 2021-06-02 Visa International Service Association Methods and apparatus for secure authentication of user and mobile device
CN113918914A (en) * 2015-10-23 2022-01-11 甲骨文国际公司 Password-free authentication for access management
CN106878233B (en) * 2015-12-10 2020-11-10 联芯科技有限公司 Method for reading security data, security server, terminal and system
CN106506168A (en) * 2016-12-07 2017-03-15 北京信任度科技有限公司 A kind of safe method based on biological characteristic long-distance identity-certifying
CN107770275A (en) * 2017-10-25 2018-03-06 成都猴子软件有限公司 Intelligent bracelet data safe processing system
CN108881471B (en) * 2018-07-09 2020-09-11 北京信息科技大学 Union-based whole-network unified trust anchor system and construction method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656627A (en) * 2014-11-10 2016-06-08 腾讯数码(天津)有限公司 Identity verification method, device and system
CN104757937A (en) * 2015-03-25 2015-07-08 北京良舟通讯科技有限公司 Wearable device and method for old-age affection care and remote health care nursing
CN105007302A (en) * 2015-06-04 2015-10-28 成都果豆数字娱乐有限公司 Mobile terminal data storage method
CN105323245A (en) * 2015-09-29 2016-02-10 北京元心科技有限公司 Intelligent terminal, authorization method and system thereof
CN105871867A (en) * 2016-04-27 2016-08-17 腾讯科技(深圳)有限公司 Identity authentication method, system and equipment
CN109273086A (en) * 2018-07-02 2019-01-25 北京市天元网络技术股份有限公司 User health data management system and method
CN108875411A (en) * 2018-07-11 2018-11-23 成都理工大学 The storage of Intelligent bracelet data and sharing method based on block chain
CN109815731A (en) * 2018-12-29 2019-05-28 深圳云天励飞技术有限公司 Permission processing method and relevant device
CN109714760A (en) * 2019-01-18 2019-05-03 浙江科技学院 A kind of right access control method suitable for smart machine under direct-connected communication environment

Also Published As

Publication number Publication date
CN110224713A (en) 2019-09-10

Similar Documents

Publication Publication Date Title
CN109472166B (en) Electronic signature method, device, equipment and medium
CN105848134B (en) Virtual SIM card management device, communication terminal, access control method and management method
US8719909B2 (en) System for monitoring the unauthorized use of a device
US20100115591A1 (en) Method and system for authenticating users with optical code tokens
KR20180016235A (en) Authentication techniques including speech and/or lip movement analysis
KR20180016232A (en) Authentication techniques including speech and/or lip movement analysis
US20090249443A1 (en) Method for monitoring the unauthorized use of a device
CN111475841A (en) Access control method, related device, equipment, system and storage medium
KR20070024633A (en) Renewable and private biometrics
CN107103245A (en) The right management method and device of file
EP3937040B1 (en) Systems and methods for securing login access
CN110268406A (en) Cipher safety
CN106648583A (en) Information processing method and terminal
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
WO2020190099A1 (en) Electronic device for managing personal information and operating method thereof
CN104796262B (en) Data ciphering method and terminal system
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN109740319B (en) Digital identity verification method and server
CN109714169B (en) Data credible circulation platform based on strict authorization and circulation method thereof
CN110224713B (en) Safety protection method and system based on high-safety intelligent child watch
WO2018151392A1 (en) Smart login method using messenger service and apparatus therefor
CN109522694A (en) A kind of identification system based on computer network
CN108769366A (en) Right management method, device, mobile terminal and storage medium
JP2007053658A (en) Inquiry answering system, terminal, server, and program
EP3435601A1 (en) Certified messaging system, method and service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant