CN112218297A - Mobile device authentication method - Google Patents
Mobile device authentication method Download PDFInfo
- Publication number
- CN112218297A CN112218297A CN202010040204.3A CN202010040204A CN112218297A CN 112218297 A CN112218297 A CN 112218297A CN 202010040204 A CN202010040204 A CN 202010040204A CN 112218297 A CN112218297 A CN 112218297A
- Authority
- CN
- China
- Prior art keywords
- mobile device
- authentication method
- control device
- sensor
- device authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000013459 approach Methods 0.000 claims abstract description 7
- 230000001960 triggered effect Effects 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 3
- 230000002618 waking effect Effects 0.000 claims description 3
- 238000001514 detection method Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a mobile device authentication method, which comprises the following steps: (a) using wireless broadcast by a control device; (b) connecting with a mobile device; (c) sensing whether the mobile device approaches through a sensor of the control device; (d) detecting whether the mobile device approves through the control device; (e) connecting the mobile device; and (f) identifying the mobile device.
Description
Technical Field
The present invention relates to an authentication method, and more particularly to an authentication method for a mobile device.
Background
In addition to being configured to provide various communication services such as video, voice, broadcast, messaging, etc., wireless networks may also be configured to perform various application services for mobile devices.
These Wireless Networks may support communications of the user's mobile device by sharing available Network resources, such as Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Wireless Wide Area Networks (WWANs), and Wireless Personal Area Networks (WPANs), to perform application services, such as credit card, payment, registration, station passing, access control, etc.
The number of Access Points (APs) and stations (stations) in a wireless network is not limited, such as an unlimited number of mobile devices and control devices. Therefore, it is desirable to provide an efficient authentication and mobile device communication method to improve the convenience of application services.
Disclosure of Invention
To achieve the above object, the present invention provides a method for authenticating a mobile device, comprising: (a) using wireless broadcast by a control device; (b) connecting with a mobile device; (c) sensing whether the mobile device approaches through a sensor of the control device; (d) detecting whether the mobile device approves through the control device; (e) connecting the mobile device; and (f) identifying the mobile device.
Preferably, step (f) is performed by wireless data transmission.
Preferably, the sensor is a proximity sensor.
Preferably, the sensor is an electromagnetic sensor.
Preferably, when the proximity of the mobile device is sensed in step (c), the method further comprises: (c1) using wireless broadcast by the control device; and (c2) triggering/waking up the mobile device.
Preferably, when the mobile device is sensed not to be in proximity in step (c), the process returns to step (a) and is repeated.
Preferably, step (c2) is to trigger/wake up the mobile device by using sound waves.
Preferably, the mobile device is triggered/awakened and a microphone of the mobile device is turned on.
Preferably, step (d) further comprises: (d1) sending an approval request to the mobile device; and (d2) receiving the request result returned from the mobile device to determine whether the request result is approved by the mobile device.
Preferably, when the mobile device does not recognize in step (d), the process returns to step (a) and is repeated.
By using the mobile device authentication method provided by the invention, whether the user enters a standby area or is close to the mobile device of the control device can be detected under a wireless broadcast environment, so that the mobile phone is triggered to carry out an identification program, and the user can conveniently use the mobile device to carry out various application services.
Drawings
The various aspects of the present invention and the particular features and advantages thereof will become more readily apparent to those having ordinary skill in the art upon reading the following detailed description and upon viewing the accompanying drawings in which:
FIG. 1 is a diagram illustrating authentication of a mobile device according to an embodiment of the invention.
FIG. 2 is a flowchart illustrating an authentication method for a mobile device according to an embodiment of the invention.
FIG. 3 is a flowchart illustrating an authentication method of a mobile device according to another embodiment of the present invention.
The reference numerals in the drawings are explained below.
Steps S200-S207
Steps S300-S307.
Detailed Description
The embodiments of the present invention will be described in more detail with reference to the drawings and the reference numerals, so that those skilled in the art can read the description to implement the embodiments.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating authentication of a mobile device according to an embodiment of the invention.
As shown in fig. 1, the authentication process of the mobile device in this embodiment starts from a standby area, in which wireless broadcasting is performed in a wireless network environment, and then to a start area, in which the mobile device is detected by a proximity sensor or an electromagnetic sensor, and if the mobile device, such as a mobile phone, is detected, the mobile phone is triggered/woken up from a standby/sleep mode by sound waves to perform a next recognition procedure, which is achieved by performing wireless data transmission on the mobile phone. The manner of waking up is used herein for example only and is not intended to limit the present invention.
Referring to fig. 2, fig. 2 is a flowchart illustrating an authentication method of a mobile device according to an embodiment of the invention, which can be used in the embodiment of fig. 1.
As described above, from the standby area, step S200 is executed to use the wireless broadcast by the control device to perform the wireless broadcast in the wireless network environment, step S201 is executed to connect with the mobile device, and then to the start area, the mobile device is moved close to the control device in step S202, step S203 is executed to sense whether the mobile device approaches through the proximity sensor by the control device, if the mobile device is detected, step S204 is executed to use the wireless broadcast by the control device, and then the mobile device is awakened/triggered and the microphone is turned on. If the mobile device is not detected to approach, the process returns to step S200 to be executed repeatedly.
If the mobile device is detected, step S205 is performed to send an approval request to the mobile device through wireless communication, the control device detects whether the mobile device approves the mobile device, if the mobile device is not approved, the step S200 is repeated, if the mobile device is approved, step S206 is performed to connect the mobile device through wireless communication, and then the mobile device is identified in step S207.
Referring to fig. 3, fig. 3 is a flowchart illustrating an authentication method of a mobile device according to another embodiment of the invention, which can be used in the embodiment of fig. 1.
Similar to steps S301, S302, S304 to S307 and steps S201, S202, S204 to S207 in fig. 2, the difference is that a proximity sensor is used in step S203, and an electromagnetic sensor is used in step S303, which may have a larger sensing range using electromagnetic sensing.
For example, when a user is in a standby area from the beginning, the mobile phone is in a standby/sleep state in a wireless network environment using a wireless broadcast by the control device, and the mobile phone is in a network connection state, and when the mobile phone approaches the control device, the control device senses the approach of the mobile device through a proximity sensor installed in the control device, and then the wireless broadcast wakes up/triggers the mobile phone to enable the mobile phone to turn on a sound receiving function, such as a microphone, after the mobile phone detects the mobile device. If the mobile device is not detected to be approaching, the detection is continued.
After the mobile phone is detected, the control device sends an approval request to the mobile phone through wireless communication, the control device detects whether the mobile phone is approved or not, if the mobile phone is not approved, the control device returns to the detection step to execute, the mobile phone is connected through the wireless communication when the mobile phone is approved, and then the mobile phone is identified so that the mobile phone can perform each application function.
By using the mobile device authentication method provided by the invention, whether the user enters a standby area or is close to the mobile device of the control device can be detected in a wireless broadcast environment, so that the mobile phone is triggered/awakened to carry out an identification program, and the user can conveniently use the mobile device to carry out various application services such as credit card, payment, registration, station passing, access control and the like.
It will be apparent to those skilled in the art that the present invention may be embodied in other specific forms without departing from the spirit of the invention. The description is thus not to be construed in a limiting sense in all respects, but rather as illustrative.
The scope of the invention should be determined by reasonable interpretation of the appended claims and all changes which come within the range of equivalents of the invention are intended to be embraced therein.
Claims (10)
1. A method for authenticating a mobile device, comprising:
step (a): using wireless broadcast by a control device;
step (b): connecting with a mobile device;
step (c): sensing whether the mobile device approaches through a sensor of the control device;
step (d): detecting whether the mobile device approves through the control device;
a step (e): connecting the mobile device; and
step (f): the mobile device is identified.
2. The mobile device authentication method of claim 1, wherein: step (f) is to perform identification through wireless data transmission.
3. The mobile device authentication method of claim 1, wherein: the sensor is a proximity sensor.
4. The mobile device authentication method of claim 1, wherein: the sensor is an electromagnetic sensor.
5. The mobile device authentication method of claim 1, wherein: when the proximity of the mobile device is sensed in step (c), further comprising: (c1) using wireless broadcast by the control device; and (c2) triggering/waking up the mobile device.
6. The mobile device authentication method of claim 1, wherein: when the mobile device is sensed not to be close in the step (c), the process returns to the step (a) to be repeatedly executed.
7. The mobile device authentication method of claim 5, wherein: step (c2) is to use sound waves to trigger/wake up the mobile device.
8. The mobile device authentication method of claim 7, wherein: the mobile device is triggered/awakened and the microphone of the mobile device is turned on.
9. The mobile device authentication method of claim 5, wherein: step (d) further comprises: (d1) sending an approval request to the mobile device; and (d2) receiving the request result returned from the mobile device to determine whether the request result is approved by the mobile device.
10. The mobile device authentication method of claim 1, wherein: when the mobile device does not recognize in step (d), the process returns to step (a) and is repeated.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962873238P | 2019-07-12 | 2019-07-12 | |
US62/873,238 | 2019-07-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112218297A true CN112218297A (en) | 2021-01-12 |
Family
ID=74058573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010040204.3A Withdrawn CN112218297A (en) | 2019-07-12 | 2020-01-15 | Mobile device authentication method |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112218297A (en) |
TW (1) | TW202103504A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014095223A (en) * | 2012-11-09 | 2014-05-22 | Kddi Corp | Radio terminal, system, method, and program for unlocking and locking control with wake-up function |
US20150121108A1 (en) * | 2013-10-25 | 2015-04-30 | Motorola Mobility Llc | Sensor-based near-field communication authentication |
GB2531711A (en) * | 2014-10-24 | 2016-05-04 | Canon Europa Nv | Authentication system and method of authentication |
TW201709120A (en) * | 2015-08-27 | 2017-03-01 | Linctronix Ltd | Automatic electronic voucher transaction system for issuing a voucher of transaction or identity authentication upon a mobile device entering a preset distance range |
-
2019
- 2019-12-25 TW TW108147581A patent/TW202103504A/en unknown
-
2020
- 2020-01-15 CN CN202010040204.3A patent/CN112218297A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014095223A (en) * | 2012-11-09 | 2014-05-22 | Kddi Corp | Radio terminal, system, method, and program for unlocking and locking control with wake-up function |
US20150121108A1 (en) * | 2013-10-25 | 2015-04-30 | Motorola Mobility Llc | Sensor-based near-field communication authentication |
GB2531711A (en) * | 2014-10-24 | 2016-05-04 | Canon Europa Nv | Authentication system and method of authentication |
TW201709120A (en) * | 2015-08-27 | 2017-03-01 | Linctronix Ltd | Automatic electronic voucher transaction system for issuing a voucher of transaction or identity authentication upon a mobile device entering a preset distance range |
Also Published As
Publication number | Publication date |
---|---|
TW202103504A (en) | 2021-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107464557B (en) | Call recording method and device, mobile terminal and storage medium | |
US9183683B2 (en) | Method and system for access to secure resources | |
US7643798B2 (en) | Passive NFC activation of short distance wireless communication | |
CN111432339A (en) | Near field communication card switching method and device, storage medium and electronic equipment | |
EP1969883B1 (en) | Method, subscriber identity module and system for providing mobile communication terminal location data | |
CN105320924A (en) | Electronic device and fingerprint identification device control method | |
CN109618316B (en) | Network sharing method, mobile terminal and storage medium | |
CN105792328B (en) | Terminal device method for connecting network, device and terminal device | |
CN103812534B (en) | information sharing method and system | |
CN103167184A (en) | Terminal device and control method thereof | |
CN111261160B (en) | Signal processing method and device | |
CN109816830B (en) | Unlocking method and device | |
CN105657656A (en) | Transmission power adjustment method and user equipment | |
CN103889034A (en) | Mobile terminal mobile communication network information receiving method and mobile terminal | |
CN108133180A (en) | Fingerprint identification method, device and terminal | |
CN106572488B (en) | WIFI hotspot sharing method of terminal equipment and terminal equipment | |
US20130091553A1 (en) | Method and apparatus for determining input | |
CN112218297A (en) | Mobile device authentication method | |
CN108513302B (en) | Identify the method, apparatus and mobile terminal of pseudo-base station | |
CN112492518A (en) | Card determination method and device, electronic equipment and storage medium | |
CN108632822B (en) | Wireless access point detection method and device and mobile terminal | |
CN106792649A (en) | A kind of tracing section updating method and terminal | |
CN108848557A (en) | Output power method of adjustment, device, mobile terminal and computer-readable medium | |
CN105530332B (en) | The processing method and processing device of location information | |
US20170208433A1 (en) | Solution for controlling an operating mode of a mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210112 |
|
WW01 | Invention patent application withdrawn after publication |