CN113596788A - Identity information acquisition method, mobile terminal and wearable device - Google Patents

Identity information acquisition method, mobile terminal and wearable device Download PDF

Info

Publication number
CN113596788A
CN113596788A CN202010361557.3A CN202010361557A CN113596788A CN 113596788 A CN113596788 A CN 113596788A CN 202010361557 A CN202010361557 A CN 202010361557A CN 113596788 A CN113596788 A CN 113596788A
Authority
CN
China
Prior art keywords
wearable device
information
identity
mobile terminal
target wearable
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010361557.3A
Other languages
Chinese (zh)
Inventor
廖红卫
蒋兴
张闯
董庆民
郭岩海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TD Tech Chengdu Co Ltd
Chengdu TD Tech Ltd
Original Assignee
Chengdu TD Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu TD Tech Ltd filed Critical Chengdu TD Tech Ltd
Priority to CN202010361557.3A priority Critical patent/CN113596788A/en
Publication of CN113596788A publication Critical patent/CN113596788A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Abstract

The invention provides an identity information acquisition method, a mobile terminal and wearable equipment, wherein the method comprises the following steps: identifying a target wearable device and establishing a Bluetooth connection with the target wearable device, wherein the target wearable device is provided with a Near Field Communication (NFC) module; sending an identity card information reading request to the target wearable device, wherein the identity card information reading request is used for indicating the target wearable device to read information of an identity card based on the NFC module to obtain encrypted identity information; and receiving the encrypted identity information sent by the target wearable device, decrypting the encrypted identity information to obtain the identity information corresponding to the identity card, and not needing to install the target wearable device on a mobile terminal, so that the problem of complicated reading process of the existing identity card can be avoided.

Description

Identity information acquisition method, mobile terminal and wearable device
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to an identity information acquisition method, a mobile terminal and wearable equipment.
Background
The resident identification card is a legal certificate for proving the identity of a holder, and the name, birth date, address, ethnicity, identification card number, photo and the like of a citizen are marked on the identification card. Currently, most identity cards already support Near Field Communication (NFC), and when the identity card information needs to be read, the identity card information can be read by using a mobile terminal.
In the prior art, when a mobile terminal is used for reading information of an identity card, the information is generally read through an NFC functional module on the mobile terminal, that is, the identity card is close to the mobile terminal, and the mobile terminal reads the information of the identity card through the NFC functional module.
However, the inventors found that at least the following problems exist in the prior art: because some mobile terminals do not have the NFC functional module, it can't utilize the NFC functional module to read the information of the identity card, therefore, need to install the NFC back clip on this mobile terminal to make the mobile terminal utilize this NFC back clip to read the information of the identity card, in order not to influence the user's normal use of the mobile terminal, after the information reading finishes, still need to detach this NFC back clip from the mobile terminal, cause the identity card information to read the process loaded down with trivial details.
Disclosure of Invention
The embodiment of the invention provides an identity information acquisition method, a mobile terminal and wearable equipment, and aims to solve the problem that the identity card information reading process is complicated in the prior art.
In a first aspect, an embodiment of the present invention provides an identity information obtaining method, which is applied to a mobile terminal, and the method includes:
identifying a target wearable device and establishing a Bluetooth connection with the target wearable device, wherein the target wearable device is provided with a Near Field Communication (NFC) module;
sending an identity card information reading request to the target wearable device, wherein the identity card information reading request is used for indicating the target wearable device to read the information of the identity card based on the NFC module to obtain encrypted identity information;
and receiving the encrypted identity information sent by the target wearable device, and decrypting the encrypted identity information to obtain the identity information corresponding to the identity card.
In one possible design, the sending an identification card information reading request to the target wearable device includes:
encrypting the preset authentication information according to the first preset key to obtain encrypted authentication information;
sending the encrypted authentication information to the target wearable device so that the target wearable device decrypts the encrypted authentication information and generates an authentication result according to the decrypted authentication information and the preset authentication information;
and receiving an authentication result sent by the target wearable device, and sending an identity card information reading request to the target wearable device when the authentication result is that authentication is successful.
In one possible design, the establishing a bluetooth connection with the target wearable device includes:
and when the target wearable device is determined to be the low-power-consumption Bluetooth device, establishing Bluetooth connection with the target wearable device based on a general attribute configuration protocol.
In one possible design, after the identifying the target wearable device, the method further includes:
and if the target wearable device is obtained by scanning in a preset low-power-consumption scanning mode, determining that the target wearable device is a low-power-consumption Bluetooth device.
In a possible design, the decrypting the encrypted identity information to obtain the identity information corresponding to the identity card includes:
sending the encrypted identity information to an identity recognition system so that the identity recognition system decrypts the encrypted identity information to obtain identity information corresponding to the identity card;
and receiving the identity information corresponding to the identity card sent by the identity recognition system.
In one possible design, the target wearable device includes at least one of a smart bracelet and a smart watch.
In a second aspect, an embodiment of the present invention provides an identity information obtaining method, which is applied to a wearable device, where the wearable device has an NFC module, and the method includes:
establishing Bluetooth connection with a mobile terminal, and reading the information of an identity card based on the NFC module to obtain encrypted identity information when receiving an identity card information reading request sent by the mobile terminal;
and sending the encrypted identity information to the mobile terminal so that the mobile terminal decrypts the encrypted identity information to obtain the identity information corresponding to the identity card.
In one possible design, after the establishing the bluetooth connection with the mobile terminal, the method further includes:
receiving encrypted authentication information sent by the mobile terminal, and decrypting the encrypted authentication information according to a second preset key;
and generating an authentication result according to the decrypted authentication information and preset authentication information, and sending the authentication result to the mobile terminal.
In a possible design, the generating an authentication result according to the decrypted authentication information and preset authentication information includes:
and if the decrypted authentication information is the same as the preset authentication information, determining that the authentication result is successful.
And if the decrypted authentication information is different from the preset authentication information, determining that the authentication result is authentication failure.
In a third aspect, an embodiment of the present invention provides an identity information obtaining device, which is applied to a mobile terminal, where the identity information obtaining device includes:
the first processing module is used for identifying a target wearable device and establishing Bluetooth connection with the target wearable device, wherein the target wearable device is provided with a Near Field Communication (NFC) module;
the first transceiver module is configured to send an identity card information reading request to the target wearable device, where the identity card information reading request is used to instruct the target wearable device to read information of an identity card based on the NFC module, so as to obtain encrypted identity information;
the first processing module is further configured to receive the encrypted identity information sent by the target wearable device, and decrypt the encrypted identity information to obtain identity information corresponding to the identity card.
In a possible design, the first processing module is further configured to encrypt preset authentication information according to a first preset key to obtain encrypted authentication information;
the first processing module is further configured to send the encrypted authentication information to the target wearable device, so that the target wearable device decrypts the encrypted authentication information, and generates an authentication result according to the decrypted authentication information and the preset authentication information;
the first processing module is further configured to receive an authentication result sent by the target wearable device, and send an identity card information reading request to the target wearable device when the authentication result is that authentication is successful.
In one possible design, the first processing module is further configured to establish a bluetooth connection with the target wearable device based on a generic attribute configuration protocol when the target wearable device is determined to be a bluetooth low energy device.
In a possible design, the first processing module is further configured to, after the target wearable device is identified, determine that the target wearable device is a bluetooth low energy device if the target wearable device is obtained by scanning in a preset low energy scanning manner.
In a possible design, the first processing module is further configured to send the encrypted identity information to an identity recognition system, so that the identity recognition system decrypts the encrypted identity information to obtain identity information corresponding to the identity card;
the first processing module is further configured to receive identity information corresponding to the identity card sent by the identity recognition system.
In one possible design, the target wearable device includes at least one of a smart bracelet and a smart watch.
In a fourth aspect, an embodiment of the present invention provides an identity information acquiring device, which is applied to a wearable device, where the wearable device has an NFC module, and the device includes:
the second processing module is used for establishing Bluetooth connection with the mobile terminal and reading the information of the identity card based on the NFC module to obtain encrypted identity information when receiving an identity card information reading request sent by the mobile terminal;
and the second transceiver module is used for sending the encrypted identity information to the mobile terminal so that the mobile terminal decrypts the encrypted identity information to obtain the identity information corresponding to the identity card.
In a possible design, the second processing module is further configured to receive encrypted authentication information sent by the mobile terminal after the bluetooth connection is established with the mobile terminal, and decrypt the encrypted authentication information according to a second preset key;
and the second processing module is further configured to generate an authentication result according to the decrypted authentication information and preset authentication information, and send the authentication result to the mobile terminal.
In a possible design, the second processing module is further configured to determine whether the decrypted authentication information is the same as the preset authentication information;
the second processing module is further configured to determine that the authentication result is successful when the decrypted authentication information is the same as the preset authentication information.
The second processing module is further configured to determine that the authentication result is authentication failure when the decrypted authentication information is different from the preset authentication information.
In a fifth aspect, an embodiment of the present invention provides a mobile terminal, including: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the identity information acquisition method of any one of the first aspects.
In a sixth aspect, an embodiment of the present invention provides a wearable device, including: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the identity information acquisition method of any one of the second aspects.
In a seventh aspect, an embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and when a processor executes the computer-executable instructions, the identity information obtaining method according to any one of the first aspect is implemented.
In an eighth aspect, an embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores computer-executable instructions, and when a processor executes the computer-executable instructions, the identity information acquiring method according to any one of the second aspects is implemented.
The embodiment of the invention provides an identity information acquisition method, a mobile terminal and wearable equipment, wherein the method identifies target wearable equipment through a root and establishes Bluetooth connection with the target wearable equipment, wherein the target wearable equipment is provided with a Near Field Communication (NFC) module; sending an identity card information reading request to the target wearable device, wherein the identity card information reading request is used for indicating the target wearable device to read information of an identity card based on the NFC module to obtain encrypted identity information; and receiving the encrypted identity information sent by the target wearable device, and decrypting the encrypted identity information to obtain the identity information corresponding to the identity card. After the Bluetooth connection with the identified target wearable device is established, the target wearable device is provided with the NFC module, the NFC module on the target wearable device is used for reading the information of the identity card, the reading of the information of the identity card is realized, the portability is improved, and the target wearable device does not need to be installed on a mobile terminal, so that the problem that the existing identity card reading process is complicated can be avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an identity information acquiring system according to an embodiment of the present invention;
fig. 2 is a first flowchart of an identity information obtaining method according to an embodiment of the present invention;
fig. 3 is a second flowchart of an identity information obtaining method according to an embodiment of the present invention;
fig. 4 is a third flowchart of the identity information obtaining method according to the embodiment of the present invention;
fig. 5 is a fourth flowchart of an identity information obtaining method according to an embodiment of the present invention;
fig. 6 is an interaction flowchart of an identity information obtaining method according to an embodiment of the present invention;
fig. 7 is a first schematic structural diagram of an identity information acquiring device according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an identity information acquiring apparatus according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a hardware structure of a mobile terminal according to an embodiment of the present invention;
fig. 10 is a schematic hardware structure diagram of a wearable device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the prior art, when a mobile terminal is used for reading information of an identity card, the information is generally read through an NFC functional module on the mobile terminal, that is, the identity card is close to the mobile terminal, and the mobile terminal reads the information of the identity card through the NFC functional module. However, since some mobile terminals do not have the NFC functional module, the NFC folder needs to be installed on the mobile terminal, so that the mobile terminal can read the information of the identity card by using the NFC folder.
Therefore, in order to solve the above problems, the technical idea of the present invention is that a mobile terminal scans and discovers a wearable device, establishes a bluetooth connection with the wearable device, after the connection is successful, symmetrically encrypts preset authentication information according to a symmetric key to obtain encrypted authentication information, sends the encrypted authentication information to the wearable device, the wearable device decrypts the encrypted authentication information by using the symmetric key to obtain decrypted authentication information, generates a corresponding authentication result according to the decrypted authentication information and the preset authentication information, the authentication result indicates whether the wearable device is legal or not, returns the authentication result to the mobile terminal, and when the authentication result is determined to be successful, that is, after the wearable device is determined to be legal, the mobile terminal reads information of an identity card by using an NFC communication module on the wearable device, the safety of information reading is guaranteed, the wearable device is used for reading, the portability is increased, the wearable device does not need to be installed on the mobile terminal, and the complexity of the information reading process of the identity card is reduced.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 1 is a schematic structural diagram of an identity information acquiring system according to an embodiment of the present invention, and as shown in fig. 1, the system includes a wearable device 101, a mobile terminal 102, and an identification card recognition terminal 103. The mobile terminal 102 reads the identification card information by using the wearable device 101, and since the identification card information read by the wearable device 101 is encrypted, the mobile terminal 102 further needs to decrypt the identification card information by using the identification card recognition terminal 103.
The wearable device 101 comprises at least one of an intelligent bracelet and an intelligent watch, the wearable device comprises a Bluetooth module and an NFC module, the wearable device 101 is communicated with the mobile terminal 102 based on the Bluetooth module, and information of the identity card is read based on the NFC module.
Fig. 2 is a first flowchart of an identity information obtaining method according to an embodiment of the present invention, where an executing entity in the method according to the embodiment may be the mobile terminal in fig. 1. As shown in fig. 2, the method of this embodiment may include:
s201, identifying a target wearable device and establishing Bluetooth connection with the target wearable device, wherein the target wearable device is provided with a Near Field Communication (NFC) module.
In this embodiment, the mobile terminal identifies a target wearable device, the target wearable device is determined by the mobile terminal according to the scanned bluetooth device, the target wearable device is a bluetooth device, that is, a bluetooth module is provided, and the target wearable device is provided with a near field communication NFC module, that is, the target wearable device can read an identity card.
Optionally, when the target wearable device is determined, the mobile terminal displays the scanned bluetooth devices, and the user may select a wearable device capable of reading the identity card from the bluetooth devices, and use the wearable device as the target wearable device.
S202, sending an identity card information reading request to the target wearable device, wherein the identity card information reading request is used for indicating the target wearable device to read information of an identity card based on an NFC module, and obtaining encrypted identity information.
In this embodiment, after the bluetooth connection with the target wearable device is successfully established, the mobile terminal sends an identification card information reading request to the target wearable device based on the bluetooth connection, and after the target wearable device receives the identification card information reading request, the target wearable device reads the information of the identification card by using the NFC module thereon to obtain encrypted identification information, thereby implementing the reading of the identification card, and sends the encrypted identification information to the mobile terminal based on the bluetooth connection.
It should be noted that, due to NFC near-field communication, when the target wearable device reads the identification card by using the NFC module, the identification card needs to be closer to the target wearable device.
In this embodiment, after establishing a bluetooth connection with a target wearable device, the mobile terminal performs bluetooth communication with the target wearable device, that is, based on a bluetooth transmission related request or information, for example, an identity card information reading request or encrypted identity information, the communication between the mobile terminal and the target wearable device is realized.
S203, receiving the encrypted identity information sent by the target wearable device, and decrypting the encrypted identity information to obtain the identity information corresponding to the identity card.
Specifically, in order to ensure the safety of the identity information, the information of the identity card read by the target wearable device through the NFC module is encrypted identity information, and therefore, after the mobile terminal acquires the encrypted identity information sent by the target wearable device, the encrypted identity information, that is, the encrypted identity information needs to be decrypted to obtain the identity information corresponding to the identity card.
The identity information comprises information such as name, address, date of birth, sex, ethnicity and the like.
As can be seen from the above description, after the bluetooth connection is established with the acquired target wearable device, the target wearable device in the embodiment of the present invention has the NFC module, and the NFC module on the target wearable device is used to read the information of the identity card, so as to read the information of the identity card, increase portability, and the target wearable device does not need to be installed on the mobile terminal, so that the problem of the existing identity card that the reading process is complicated does not occur.
In addition, after the mobile terminal establishes the bluetooth connection with the target wearable device, the identity of the target wearable device may be authenticated to determine whether the target wearable device is trusted, so as to ensure the security of the communication between the mobile terminal and the target wearable device.
Fig. 3 is a second flowchart of the identity information obtaining method according to the embodiment of the present invention, and this embodiment describes in detail a specific implementation process of authenticating the identity of the target wearable device after establishing a bluetooth connection with the target wearable device on the basis of the embodiment of fig. 2. As shown in fig. 3, the method includes:
s301, identifying a target wearable device and establishing Bluetooth connection with the target wearable device, wherein the target wearable device is provided with a Near Field Communication (NFC) module.
Specifically, because the currently common Bluetooth modules include a conventional Bluetooth module and a Bluetooth Low Energy (BLE) module, the Bluetooth connections established based on different Bluetooth modules are different, when the mobile terminal establishes a Bluetooth connection with a target wearable device, it is necessary to establish a corresponding Bluetooth connection according to the Bluetooth module on the target wearable device, that is, establish a corresponding Bluetooth connection according to the type of the target wearable device, and when it is determined that the target wearable device is a Bluetooth Low Energy device, it indicates that the Bluetooth module on the target wearable device is a BLE Bluetooth module, and then establish a Bluetooth connection with the target wearable device, that is, establish a GATT connection, based on a Generic Attribute configuration protocol (GATT).
In addition, when the target wearable device is determined to be the traditional Bluetooth device, the Bluetooth module on the target wearable device is indicated to be the traditional Bluetooth module, and the SOCKET connection is established with the target wearable device.
Optionally, the type of the target wearable device may be determined according to a scanning mode corresponding to the target wearable device, that is, if the target wearable device is obtained by scanning in a preset low-power-consumption scanning mode, the target wearable device is determined to be a low-power-consumption bluetooth device. And if the target wearable device is obtained by scanning in a preset traditional scanning mode, determining that the target wearable device is a traditional Bluetooth device.
The preset low-power scanning mode may be scanning by calling a StartLeScan interface, and the preset conventional scanning mode may be scanning by calling a StartDiscovery interface.
Specifically, the mobile terminal determines the bluetooth device obtained by calling the StartLeScan interface for scanning as a BLE bluetooth device, and determines the bluetooth device obtained by calling the StartDiscovery interface for scanning as a traditional bluetooth device.
In this embodiment, when the mobile terminal establishes a bluetooth connection with the target wearable device, a corresponding bluetooth connection is established according to the type of the target wearable device, that is, a bluetooth connection matched with the target wearable device is established, so that the mobile terminal can perform normal communication with the target wearable device, thereby ensuring that the mobile terminal can normally utilize the target wearable device to read the identity card.
S302, encrypting the preset authentication information according to the first preset secret key to obtain encrypted authentication information.
In this embodiment, a first predetermined key is used to encrypt predetermined authentication information, where the predetermined authentication information is information commonly agreed in advance by the mobile terminal and the target wearable device, and for example, the predetermined authentication information is a Universal Integrated Circuit Card (UICC) Identification code or a smart Card (SIM) Card number of the mobile terminal.
Optionally, the first preset key is a key pre-stored in the mobile terminal, and the first preset key may be a symmetric key, a public key, or a private key.
And S303, sending the encrypted authentication information to the target wearable device so that the target wearable device decrypts the encrypted authentication information and generates an authentication result according to the decrypted authentication information and preset authentication information.
In this embodiment, the mobile terminal sends the encrypted authentication information to the target wearable device, the target wearable device obtains the decrypted authentication information by using a second preset key to the encrypted authentication information, and if the decrypted authentication information is the same as the preset authentication information, it indicates that the second preset key is the same as the first preset key, that is, the symmetric key on the mobile terminal is the same as the symmetric key of the target wearable device, and the identity of the target wearable device is authentic, it is determined that the authentication result is successful.
If the decrypted authentication information is different from the preset authentication information, it is indicated that the second preset secret key is different from the first preset secret key, that is, the symmetric secret key on the mobile terminal is different from the symmetric secret key of the target wearable device, and the identity of the target wearable device is not authentic, the authentication result is determined to be authentication failure.
S304, receiving an authentication result sent by the target wearable device, and sending an identity card information reading request to the target wearable device when the authentication result is successful.
In this embodiment, the mobile terminal obtains an authentication result sent by the target wearable device, where the authentication result is authentication failure or authentication success. And when the authentication result is that the authentication is successful, the identity of the target wearable device is confirmed to be credible, namely the identity card can be read by the target wearable device, and then an identity card information reading request is sent to the target wearable device.
When the authentication result is that the authentication is successful, the identity of the target wearable device is not trusted, namely the target wearable device cannot be used for reading the identity card, and then prompt information is output to enable the user to reselect the Bluetooth device for reading the identity card, so that the information reading safety of the identity card is ensured.
S305, receiving the encrypted identity information sent by the target wearable device, and decrypting the encrypted identity information to obtain identity information corresponding to the identity card.
In this embodiment, because the security degree of the information of the identity card is higher, only a specific system can decrypt, and therefore, after acquiring the encrypted identity information returned by the target wearable device, the mobile terminal sends the encrypted identity information to the identity recognition system, so that the identity recognition system decrypts the encrypted identity information to obtain the identity information corresponding to the identity card, and receives the identity information corresponding to the identity card sent by the identity recognition system, so that the mobile terminal can obtain the identity information corresponding to the identity card.
In addition, when the mobile terminal sends the encrypted identity information to the identity recognition system, the encrypted identity information is transmitted through a wireless private network in order to ensure the security of data transmission.
In addition, the mobile terminal is actually verified by the wearable service APP on the mobile terminal when verifying whether the identity of the target wearable device is trusted. After determining that the identity of the target wearable device is trusted, an identity card identification Application (APP) on the mobile terminal reads the identity card with the target wearable device.
Specifically, the wearable service APP provides an SDK API to the outside, and the SDK API authenticates the legitimacy of the caller. The identity card recognition APP calls the SDK interface to initiate communication to the target wearable device, namely the target wearable device is used for reading the identity card.
In this embodiment, before sending the identification card information reading request to the target wearable device, that is, before reading the identification card information by using the target wearable device, validity authentication is performed, that is, whether the target wearable device is legal is determined by using encrypted authentication information, that is, whether the identity of the target wearable device is trusted is determined, and when the identity of the target wearable device is determined to be trusted, the target wearable device is used to read the information of the identification card, so that the security of communication and the security of information reading of the identification card are ensured.
Fig. 4 is a third flowchart of the identity information obtaining method according to the embodiment of the present invention, where an execution subject in the method according to the embodiment may be the wearable device in fig. 1, and the wearable device is provided with an NFC module. As shown in fig. 4, the method of this embodiment may include:
s401, Bluetooth connection is established with the mobile terminal, and when an identity card information reading request sent by the mobile terminal is received, information of the identity card is read based on the NFC module, and encrypted identity information is obtained.
In this embodiment, after receiving a related connection request sent by a mobile terminal, a wearable device establishes a bluetooth connection with the mobile terminal to communicate with the mobile terminal.
When the wearable device receives an identity card information reading request sent by the mobile terminal based on the Bluetooth connection, the wearable device indicates that the information of the identity card needs to be read, and then the information of the identity card is read based on the NFC module of the wearable device, so that encrypted identity card information is obtained.
In addition, because NFC is near field communication, the distance between the identity card to be read and the wearable device is short, so that the wearable device can successfully read the identity card.
S402, sending the encrypted identity information to the mobile terminal so that the mobile terminal can decrypt the encrypted identity information to obtain the identity information corresponding to the identity card.
In this embodiment, wearable equipment sends this encryption identity to mobile terminal after obtaining encryption identity card information to make mobile terminal decrypt this encryption identity information, obtain the identity information that the identity card corresponds, realize the acquirement of identity card information.
In this embodiment, wearable equipment easily carries, need not to install it on mobile terminal at the information in-process of reading the ID card, more need not to unload it from mobile terminal, reduces the loaded down with trivial details nature of ID card information reading process to improve the efficiency that ID card information read.
In addition, after the wearable device establishes the bluetooth connection with the mobile terminal, the identity of the mobile terminal may be authenticated to determine whether the target wearable device is trusted, so as to ensure the security of the communication between the mobile terminal and the wearable device.
Fig. 5 is a fourth flowchart of the identity information obtaining method according to the embodiment of the present invention, and this embodiment describes in detail a specific implementation process of authenticating the identity of the mobile terminal after establishing a bluetooth connection with the mobile terminal on the basis of the embodiment of fig. 3. As shown in fig. 5, the method includes:
s501, Bluetooth connection is established with the mobile terminal.
S502, receiving the encrypted authentication information sent by the mobile terminal, and decrypting the encrypted authentication information according to a second preset key.
In this embodiment, after the wearable device establishes the bluetooth connection with the mobile terminal, if encrypted authentication information sent by the mobile terminal based on the bluetooth connection is received, a second preset key is obtained, and the encrypted authentication information is decrypted by using the second preset key.
The second preset key is a key prestored on the wearable device, and when the mobile terminal is a mobile terminal trusted by the wearable device, the second preset key is matched with the first preset key on the mobile terminal, for example, when the first preset key is a symmetric key, the second preset key is a symmetric key same as the first preset key; for another example, when the first preset key is a public key, the second preset key is a private key paired with the first preset key; for another example, when the first preset key is a private key, the second preset key is a public key paired with the first preset key, and the second preset key and the first preset key are symmetric keys.
S503, generating an authentication result according to the decrypted authentication information and the preset authentication information, and sending the authentication result to the mobile terminal.
In this embodiment, after the encrypted authentication information is decrypted by using the second preset key to obtain the decrypted authentication information, the decrypted authentication information is compared with the preset authentication information to generate a corresponding authentication result, where the authentication result is authentication success or authentication failure.
Optionally, generating an authentication result according to the decrypted authentication information and the preset authentication information, including: and judging whether the decrypted authentication information is the same as the preset authentication information. And if the decrypted authentication information is the same as the preset authentication information, determining that the authentication result is successful. And if the decrypted authentication information is different from the preset authentication information, determining that the authentication result is authentication failure.
In this embodiment, whether the decrypted authentication information is the same as the preset authentication information or not is compared, and if the decrypted authentication information is the same as the preset authentication information, it is indicated that the second preset key is matched with the first preset key, that is, the second preset key is the same key as the first preset key, and it can be determined that the mobile terminal is a mobile terminal trusted by the wearable device, that is, the identity of the mobile terminal is authentic, and the information of the identity card can be read according to the identity card information sent by the mobile terminal.
S504, when an identity card information reading request sent by the mobile terminal is received, the information of the identity card is read based on the NFC module, and encrypted identity information is obtained.
And S505, sending the encrypted identity information to the mobile terminal so that the mobile terminal decrypts the encrypted identity information to obtain the identity information corresponding to the identity card.
The implementation manners of S504 to S505 in this embodiment are similar to the implementation manners of S401 to S402 in the embodiment of fig. 4, and are not described herein again.
In this embodiment, before communicating with the mobile terminal, validity authentication is performed, that is, whether the mobile terminal is legal or not is determined by using encrypted authentication information, that is, whether the identity of the target wearable device is trusted or not is determined, and after the identity of the mobile terminal is determined to be trusted, the mobile terminal communicates with the mobile terminal so as to read information of an identity card according to an identity card information reading request sent by the mobile terminal, thereby ensuring the security of communication and the security of information reading of the identity card.
Fig. 6 is an interaction flowchart of an identity information obtaining method according to an embodiment of the present invention, and as shown in fig. 6, the method includes:
s601, the mobile terminal identifies the wearable device and establishes Bluetooth connection with the wearable device, wherein the wearable device is provided with an NFC module.
S602, the mobile terminal sends an identity card information reading request to the wearable device.
S603, when the wearable device receives an identity card information reading request sent by the mobile terminal, the wearable device reads the information of the identity card based on the NFC module to obtain encrypted identity information.
S604, the wearable device sends the encrypted identity information to the mobile terminal.
S605, the mobile terminal receives the encrypted identity information sent by the wearable device and decrypts the encrypted identity information to obtain identity information corresponding to the identity card.
In this embodiment, when the mobile terminal needs to read the information of the identity card, the mobile terminal establishes bluetooth connection with the wearable device, and then sends an identity card information reading request to the wearable device, so as to read the information of the identity card by using the NFC module on the wearable device, that is, when the mobile terminal cannot read the information of the identity card, the wearable device is used for reading, and the wearable device can be read without being installed on the mobile terminal, and is easy to carry, and after the information of the identity card is read, the wearable device does not need to be detached from the mobile terminal, thereby reducing the complexity of the identity card reading process.
Fig. 7 is a schematic structural diagram of an identity information acquiring device according to an embodiment of the present invention, which is applied to a mobile terminal, and as shown in fig. 7, the identity information acquiring device 700 may include: a first processing module 701 and a first transceiver module 702.
The first processing module 701 is configured to identify a target wearable device and establish a bluetooth connection with the target wearable device, where the target wearable device has a near field communication NFC module.
The first transceiver module 702 is configured to send an identity card information reading request to the target wearable device, where the identity card information reading request is used to instruct the target wearable device to read information of an identity card based on the NFC module, so as to obtain encrypted identity information.
The first processing module 701 is further configured to receive encrypted identity information sent by the target wearable device, and decrypt the encrypted identity information to obtain identity information corresponding to the identity card.
In a possible design, the first processing module 701 is further configured to encrypt preset authentication information according to a first preset key, so as to obtain encrypted authentication information.
The first processing module 701 is further configured to send the encrypted authentication information to the target wearable device, so that the target wearable device decrypts the encrypted authentication information, and generates an authentication result according to the decrypted authentication information and preset authentication information.
The first processing module 701 is further configured to receive an authentication result sent by the target wearable device, and send an identity card information reading request to the target wearable device when the authentication result is that authentication is successful.
In one possible design, the first processing module 701 is further configured to establish a bluetooth connection with the target wearable device based on a generic attribute configuration protocol when the target wearable device is determined to be a bluetooth low energy device.
In a possible design, the first processing module 701 is further configured to, after identifying the target wearable device, determine that the target wearable device is a bluetooth low energy device if the target wearable device is obtained by scanning in a preset low energy scanning manner.
In a possible design, the first processing module 701 is further configured to send the encrypted identity information to an identity recognition system, so that the identity recognition system decrypts the encrypted identity information to obtain identity information corresponding to the identity card.
The first processing module 701 is further configured to receive identity information corresponding to an identity card sent by an identity recognition system.
In one possible design, the target wearable device includes at least one of a smart bracelet and a smart watch.
The identity information acquiring device provided in the embodiment of the present invention can implement the identity information acquiring method in the embodiments shown in fig. 2 and fig. 3, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 8 is a schematic structural diagram of an identity information acquiring device according to an embodiment of the present invention, which is applied to a mobile terminal, and as shown in fig. 8, the identity information acquiring device 800 may include: a second processing module 801 and a second transceiver module 802.
The second processing module 801 is configured to establish a bluetooth connection with the mobile terminal, and when receiving an identity card information reading request sent by the mobile terminal, read information of an identity card based on the NFC module to obtain encrypted identity information.
The second transceiver module 802 is configured to send the encrypted identity information to the mobile terminal, so that the mobile terminal decrypts the encrypted identity information to obtain the identity information corresponding to the identity card.
In one possible design, the second processing module 801 is further configured to receive encrypted authentication information sent by the mobile terminal after establishing a bluetooth connection with the mobile terminal, and decrypt the encrypted authentication information according to a second preset key.
The second processing module 801 is further configured to generate an authentication result according to the decrypted authentication information and preset authentication information, and send the authentication result to the mobile terminal.
In a possible design, the second processing module 801 is further configured to determine whether the decrypted authentication information is the same as the preset authentication information.
The second processing module 801 is further configured to determine that the authentication result is successful when the decrypted authentication information is the same as the preset authentication information.
The second processing module 801 is further configured to determine that the authentication result is authentication failure when the decrypted authentication information is different from the preset authentication information.
The identity information acquiring device provided in the embodiment of the present invention can implement the identity information acquiring method in the embodiments shown in fig. 4 and fig. 5, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 9 is a schematic diagram of a hardware structure of a mobile terminal according to an embodiment of the present invention. As shown in fig. 9, the mobile terminal 900 provided in this embodiment includes: at least one processor 901 and memory 902. The processor 901 and the memory 902 are connected via a bus 903.
In a specific implementation process, the at least one processor 901 executes the computer executable instructions stored in the memory 902, so that the at least one processor 901 performs the identity information obtaining method in the embodiments of fig. 2 and fig. 3.
For a specific implementation process of the processor 901, reference may be made to the above embodiments in fig. 2 and fig. 3, which implement principles and technical effects are similar, and details of this embodiment are not described herein again.
In the embodiment shown in fig. 9, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The memory may comprise high speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
Fig. 10 is a schematic hardware structure diagram of a wearable device according to an embodiment of the present invention. As shown in fig. 10, the mobile terminal 1000 according to the present embodiment includes: at least one processor 1001 and memory 1002. The processor 1001 and the memory 1002 are connected to each other via a bus 1003.
In a specific implementation process, the at least one processor 1001 executes the computer executable instructions stored in the memory 1002, so that the at least one processor 1001 executes the identity information acquiring method in the embodiments of fig. 4 and 5.
For a specific implementation process of the processor 1001, reference may be made to the embodiments in fig. 4 and fig. 5, which have similar implementation principles and technical effects, and details of this embodiment are not described herein again.
In the embodiment shown in fig. 10, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The memory may comprise high speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
The embodiment of the invention also provides a computer-readable storage medium, wherein a computer execution instruction is stored in the computer-readable storage medium, and when a processor executes the computer execution instruction, the identity information acquisition method of the embodiment of the method is realized.
The computer-readable storage medium may be implemented by any type of volatile or non-volatile memory device or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk. Readable storage media can be any available media that can be accessed by a general purpose or special purpose computer.
An exemplary readable storage medium is coupled to the processor such the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Of course, the processor and the readable storage medium may also reside as discrete components in the apparatus.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (12)

1. An identity information acquisition method is applied to a mobile terminal, and the method comprises the following steps:
identifying a target wearable device and establishing a Bluetooth connection with the target wearable device, wherein the target wearable device is provided with a Near Field Communication (NFC) module;
sending an identity card information reading request to the target wearable device, wherein the identity card information reading request is used for indicating the target wearable device to read the information of the identity card based on the NFC module to obtain encrypted identity information;
and receiving the encrypted identity information sent by the target wearable device, and decrypting the encrypted identity information to obtain the identity information corresponding to the identity card.
2. The method of claim 1, wherein sending an identification card information read request to the target wearable device comprises:
encrypting the preset authentication information according to the first preset key to obtain encrypted authentication information;
sending the encrypted authentication information to the target wearable device so that the target wearable device decrypts the encrypted authentication information and generates an authentication result according to the decrypted authentication information and the preset authentication information;
and receiving an authentication result sent by the target wearable device, and sending an identity card information reading request to the target wearable device when the authentication result is that authentication is successful.
3. The method of claim 1, wherein establishing the Bluetooth connection with the target wearable device comprises:
and when the target wearable device is determined to be the low-power-consumption Bluetooth device, establishing Bluetooth connection with the target wearable device based on a general attribute configuration protocol.
4. The method of any of claims 1 to 3, further comprising, after the identifying the target wearable device:
and if the target wearable device is obtained by scanning in a preset low-power-consumption scanning mode, determining that the target wearable device is a low-power-consumption Bluetooth device.
5. The method according to claim 1, wherein the decrypting the encrypted identification information to obtain the identification information corresponding to the identification card comprises:
sending the encrypted identity information to an identity recognition system so that the identity recognition system decrypts the encrypted identity information to obtain identity information corresponding to the identity card;
and receiving the identity information corresponding to the identity card sent by the identity recognition system.
6. The method of claim 1, 2, 3, or 5, wherein the target wearable device comprises at least one of a smart bracelet and a smart watch.
7. An identity information acquisition method is applied to a wearable device, wherein the wearable device is provided with an NFC module, and the method comprises the following steps:
establishing Bluetooth connection with a mobile terminal, and reading the information of an identity card based on the NFC module to obtain encrypted identity information when receiving an identity card information reading request sent by the mobile terminal;
and sending the encrypted identity information to the mobile terminal so that the mobile terminal decrypts the encrypted identity information to obtain the identity information corresponding to the identity card.
8. The method according to claim 7, further comprising, after the establishing the bluetooth connection with the mobile terminal:
receiving encrypted authentication information sent by the mobile terminal, and decrypting the encrypted authentication information according to a second preset key;
and generating an authentication result according to the decrypted authentication information and preset authentication information, and sending the authentication result to the mobile terminal.
9. The method according to claim 8, wherein generating the authentication result according to the decrypted authentication information and the preset authentication information comprises:
judging whether the decrypted authentication information is the same as the preset authentication information or not;
if the decrypted authentication information is the same as the preset authentication information, determining that the authentication result is successful;
and if the decrypted authentication information is different from the preset authentication information, determining that the authentication result is authentication failure.
10. A mobile terminal, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the identity information acquisition method of any of claims 1 to 6.
11. A wearable device, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the identity information acquisition method of any of claims 7 to 9.
12. A computer-readable storage medium having stored thereon computer-executable instructions which, when executed by a processor, implement the identity information acquisition method of any one of claims 1 to 6 or 7 to 9.
CN202010361557.3A 2020-04-30 2020-04-30 Identity information acquisition method, mobile terminal and wearable device Pending CN113596788A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010361557.3A CN113596788A (en) 2020-04-30 2020-04-30 Identity information acquisition method, mobile terminal and wearable device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010361557.3A CN113596788A (en) 2020-04-30 2020-04-30 Identity information acquisition method, mobile terminal and wearable device

Publications (1)

Publication Number Publication Date
CN113596788A true CN113596788A (en) 2021-11-02

Family

ID=78237078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010361557.3A Pending CN113596788A (en) 2020-04-30 2020-04-30 Identity information acquisition method, mobile terminal and wearable device

Country Status (1)

Country Link
CN (1) CN113596788A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105162592A (en) * 2015-07-28 2015-12-16 北京锐安科技有限公司 Method and system for authenticating wearable device
CN105554043A (en) * 2016-03-07 2016-05-04 炫彩互动网络科技有限公司 Wearable equipment identity authentication method based on cross bit operation
CN206698436U (en) * 2017-02-20 2017-12-01 国民技术股份有限公司 A kind of data acquisition facility and wearable device
CN207718384U (en) * 2017-11-28 2018-08-10 福建瑞恒信息科技股份有限公司 A kind of multifunction system of the acquisition second-generation identification card information based on bluetooth
CN108462674A (en) * 2017-02-20 2018-08-28 国民技术股份有限公司 A kind of data capture method, device, terminal and wearable device
CN110247881A (en) * 2018-03-09 2019-09-17 山东量子科学技术研究院有限公司 Identity identifying method and system based on wearable device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105162592A (en) * 2015-07-28 2015-12-16 北京锐安科技有限公司 Method and system for authenticating wearable device
CN105554043A (en) * 2016-03-07 2016-05-04 炫彩互动网络科技有限公司 Wearable equipment identity authentication method based on cross bit operation
CN206698436U (en) * 2017-02-20 2017-12-01 国民技术股份有限公司 A kind of data acquisition facility and wearable device
CN108462674A (en) * 2017-02-20 2018-08-28 国民技术股份有限公司 A kind of data capture method, device, terminal and wearable device
CN207718384U (en) * 2017-11-28 2018-08-10 福建瑞恒信息科技股份有限公司 A kind of multifunction system of the acquisition second-generation identification card information based on bluetooth
CN110247881A (en) * 2018-03-09 2019-09-17 山东量子科学技术研究院有限公司 Identity identifying method and system based on wearable device

Similar Documents

Publication Publication Date Title
CN104765999B (en) Method, terminal and server for processing user resource information
JP5601729B2 (en) How to log into a mobile radio network
GB2488766A (en) Securely transferring data to a mobile device
US8751404B2 (en) Method and mobile terminal for realizing network payment
AU2017417132B2 (en) Mobile device authentication using different channels
CN107872321B (en) Electronic identity authentication method and electronic identity terminal equipment
CN113596788A (en) Identity information acquisition method, mobile terminal and wearable device
CN105405010B (en) Transaction device, transaction system using the same and transaction method
KR20110005615A (en) System and method for managing wireless otp using user's media, wireless terminal and recording medium
KR101669245B1 (en) Method for Providing Service by using Installed Program at Handheld Phone
KR101662243B1 (en) Method for Providing OTP by Multiple Authentication Mode
KR20100136047A (en) System and method for managing otp by seed combination mode and recording medium
CN116415946A (en) Payment method, device and system based on hardware wallet
KR20100136077A (en) System and method for managing seed combination otp by index exchange and recording medium
KR20100136090A (en) System and method for displaying otp by multiple authentication with index exchange and recording medium
KR20100136278A (en) System and method for managing otp by seed combination mode with biometrics and recording medium
KR20100136085A (en) System and method for displaying otp by seed combination mode with index exchange and recording medium
KR20180026424A (en) Method for Operating One Time Code
KR20160101718A (en) Method for Operating One Time Code by Using Network Seed
KR20100136056A (en) System and method for displaying otp by multiple code creation, mobile phone and recording medium
KR20100136046A (en) System and method for providing otp, mobile phone and recording medium
KR20100136055A (en) System and method for displaying otp by multiple code creation and recording medium
KR20100136051A (en) System and method for managing otp by multiple authentication mode, mobile phone and recording medium
KR20100136063A (en) System and method for creating code combination mode otp by index exchange, mobile phone and recording medium
KR20100136070A (en) System and method for providing code combination otp by index exchange, mobile phone and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination