CN113038446A - Registration and authentication method and device - Google Patents
Registration and authentication method and device Download PDFInfo
- Publication number
- CN113038446A CN113038446A CN202110351818.8A CN202110351818A CN113038446A CN 113038446 A CN113038446 A CN 113038446A CN 202110351818 A CN202110351818 A CN 202110351818A CN 113038446 A CN113038446 A CN 113038446A
- Authority
- CN
- China
- Prior art keywords
- authentication
- information
- identification information
- server
- wearable device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000012790 confirmation Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 2
- 230000004044 response Effects 0.000 claims 2
- 238000012216 screening Methods 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 24
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the application provides a registration and authentication method and device. And when the authentication is carried out, the terminal receives the non-encryption identification information of the wearable device sent by the server and carries out authentication based on the non-encryption identification information. In the method, the terminal is based on the non-encrypted identification information of the wearable device in the registration and authentication processes, namely, the identification information of the wearable device interacting with the server in the registration and authentication processes is not encrypted, so that the user can normally perform secret-free registration and authentication even if the user subsequently replaces the terminal, and the convenience of the user in secret-free authentication is improved.
Description
The present application is a method and apparatus for registration and authentication (application date: 2015, 11/24, Shen)Please:
201510825252.2) was filed in a separate application.
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for registration and authentication.
Background
With the rapid development of scientific technology, people rely on advanced scientific technology to improve a plurality of previous devices (such as watches) so that the watches have more functions, and meanwhile, people also develop a plurality of advanced devices on the basis, and the innovation and the research and the development of the devices greatly enrich the requirements of people in daily life and bring great convenience to people.
Among these new devices, wearable devices (portable smart devices that can be worn directly on the user's body or integrated onto the user's clothing or accessories, such as smart watches, smart bracelets, etc.) have been receiving close attention from people after their appearance due to novel, rich functions and portability. The wearable device has a plurality of functions, such as dialing or connecting a telephone, receiving and sending messages, displaying time, detecting heart rate, authenticating identity and the like, wherein the authentication function can enable a user to carry out secret-free authentication in the authentication processes of login, payment and the like, namely, the user does not need to input authentication information, and only needs to confirm according to confirmation information displayed on the wearable device, so that the corresponding authentication operation can be completed, and the function is greatly popular among people. The specific registration and authentication process is shown in fig. 1 and 2.
Fig. 1 is a schematic flowchart of a user registration secret-free authentication service in the prior art according to an embodiment of the present application.
S101: the terminal sends a registration request of the secret-free authentication service to the server.
When a user wants to register a service of the privacy-exempt authentication, the terminal can be used for sending a registration request for opening the service to the server, and the registration request can carry a user identifier (such as a user account number).
S102: and the server returns an instruction for binding the wearable device to the terminal.
After receiving the registration request, the server may return an instruction for binding the wearable device to the terminal, so as to bind the user identifier with a certain wearable device specified by the user.
S103: and the terminal establishes connection with the wearable equipment according to the instruction and acquires the identification information of the wearable equipment based on the connection.
After receiving the instruction, the terminal can establish connection with the wearable device designated by the user, and acquire the identification information of the wearable device through the connection. The terminal can establish Bluetooth connection with the wearable device, and the acquired identification information of the wearable device is a Bluetooth address.
S104: and the terminal sends the acquired identification information to a server for storage.
After the terminal sends the acquired identification information of the wearable device to the server, the server can store the identification information as the identification information of the wearable device bound with the user identification carried in the registration request.
S105: and the server returns an acquisition request of the authentication information to the terminal.
And after the server stores the identification information of the wearable device, the server returns an acquisition request of the authentication information to the terminal so as to inform the terminal to acquire the authentication information input by the user.
S106: the terminal obtains the authentication information and sends the authentication information to the wearable device and the server for storage respectively.
And after the terminal acquires the authentication information input by the user, the authentication information is respectively sent to the wearable device and the server for storage.
S107: the server stores the authentication information as authentication standard information corresponding to the identification information.
That is, what the server stores at this time is the correspondence of the user identifier, the identification information of the wearable device, and the authentication information.
Fig. 2 is a schematic flow chart of secret-less authentication performed by a user in the prior art according to an embodiment of the present application.
S201: and the server sends the stored identification information of the wearable device to the terminal.
When the server receives an authentication request such as login and payment sent by a terminal used by a user, the server may send, to the terminal, identification information of a wearable device pre-saved corresponding to a user identification according to the user identification (e.g., a user account) carried in the authentication request.
S202: and the terminal establishes connection of the wearable equipment corresponding to the identification information.
After receiving the identification information of the wearable device sent by the server, the terminal searches the wearable device matched with the identification information according to the identification information and establishes connection with the wearable device. The identification information can be a Bluetooth address of the wearable device pre-stored by the server, and the terminal can establish Bluetooth connection with the wearable device corresponding to the Bluetooth address after receiving the Bluetooth address.
S203: the wearable device sends the authentication information stored by the wearable device to the terminal.
After the wearable device establishes connection with the terminal, authentication information pre-stored in the wearable device can be sent to the terminal.
S204: and the terminal sends the acquired authentication information to the server.
S205: and the server authenticates according to the received authentication information and the stored authentication standard information corresponding to the identification information of the wearable device.
After receiving the authentication information sent by the terminal, the server can compare the authentication information with authentication standard information which is stored in advance by the server and corresponds to the identification information of the wearable device, and if the comparison result is consistent, the authentication is passed; and when the comparison result is inconsistent, the authentication is not passed.
However, in the prior art, the identification information of the wearable device based on the registration and authentication processes is encrypted identification information (the bluetooth address is one of the encrypted identification information), that is, in the registration process shown in fig. 1, after the terminal acquires the identification information of the wearable device through step S103, the identification information is encrypted, and then the encrypted identification information is sent to the server for storage through step S104. When the terminal encrypts the acquired identification information of the wearable device, most of the acquired identification information is encrypted based on some specific information of the terminal itself, for example, the terminal combines the first bits of the acquired bluetooth address of the wearable device and the second bits of the MAC address of the terminal itself based on a Media Access Control (MAC) address of the terminal itself to obtain the encrypted identification information of the wearable device. That is, even if different terminals of the same model are manufactured by the same manufacturer, the encryption result of the identification information of the same wearable device is different.
Therefore, in the authentication, after receiving the identification information of the wearable device sent by the server in step S201 shown in fig. 2, the terminal needs to encrypt the identification information of all the wearable devices searched according to its own specific information (e.g., MAC address, etc.), determine the wearable device with the same encryption result as the received identification information sent by the server, and establish a connection with the wearable device.
In this way, if the terminal used by the user at the time of registration is different from the terminal used at the time of authentication, the terminal may not correctly decrypt the identification information of the wearable device transmitted by the server at the time of authentication, and thus the authentication may not be performed normally.
Disclosure of Invention
The embodiment of the application provides a method and a device for registration and authentication, which are used for solving the problem that the user cannot normally authenticate when using a terminal different from that used for registration in the prior art for authentication.
The registration method provided by the embodiment of the application comprises the following steps:
the method comprises the steps that a terminal obtains identification information of wearable equipment, wherein the identification information is non-encrypted identification information;
sending the identification information to a server;
obtaining authentication information;
and sending the authentication information to the wearable device and the server, enabling the wearable device to store the authentication information, and enabling the server to store the authentication information as authentication standard information corresponding to the identification information.
The registration method provided by the embodiment of the application comprises the following steps:
the wearable device sends identification information to a terminal, so that the terminal sends the identification information to a server, wherein the identification information is non-encrypted identification information;
and receiving and storing authentication information returned by the terminal, wherein the authentication information is sent to the wearable device and the server by the terminal, and the authentication information sent to the server is stored as authentication standard information corresponding to the identification information by the server.
An authentication method provided by an embodiment of the present application includes:
the method comprises the steps that a terminal receives identification information of wearable equipment sent by a server, wherein the identification information is non-encrypted identification information;
according to the identification information, establishing the connection of the wearable equipment corresponding to the identification information;
receiving authentication information which is sent by the wearable device and is pre-stored by the wearable device through the connection;
and returning the authentication information to the server, so that the server performs authentication according to the received authentication information and the stored authentication standard information corresponding to the identification information.
An authentication method provided by an embodiment of the present application includes:
the wearable device adds identification information of the wearable device to access information, wherein the identification information is non-encrypted identification information;
broadcasting the access information, so that the terminal establishes connection with the wearable device when determining that the identification information carried in the received access information is the same as the identification information sent to the terminal by the server;
and sending pre-stored authentication information to the terminal through the connection, so that the terminal sends the authentication information to the server, and the server performs authentication according to the received authentication information and authentication standard information corresponding to the identification information and stored by the server.
The device that this application embodiment provided registers includes:
the identification acquisition module is used for acquiring identification information of the wearable device, wherein the identification information is non-encrypted identification information;
the identification sending module is used for sending the identification information to a server;
the authentication information acquisition module is used for acquiring authentication information;
and the authentication information sending module is used for sending the authentication information to the wearable device and the server, so that the wearable device stores the authentication information, and the server stores the authentication information as authentication standard information corresponding to the identification information.
The device that this application embodiment provided registers includes:
the system comprises a sending module, a receiving module and a sending module, wherein the sending module is used for sending identification information to a terminal so that the terminal sends the identification information to a server, and the identification information is non-encrypted identification information;
and the receiving module is used for receiving and storing the authentication information returned by the terminal, wherein the authentication information is sent to the device and the server by the terminal, and the authentication information sent to the server is stored as the authentication standard information corresponding to the identification information by the server.
The device of authentication that this application embodiment provided includes:
the identification receiving module is used for receiving identification information of the wearable device sent by the server, wherein the identification information is non-encrypted identification information;
the connection module is used for establishing the connection of the wearable equipment corresponding to the identification information according to the identification information;
the authentication information receiving module is used for receiving authentication information which is sent by the wearable equipment and is pre-stored by the wearable equipment through the connection;
and the sending module is used for returning the authentication information to the server so that the server performs authentication according to the received authentication information and the stored authentication standard information corresponding to the identification information.
The device of authentication that this application embodiment provided includes:
the device comprises an adding module, a receiving module and a sending module, wherein the adding module is used for adding identification information of the device to access information, and the identification information is non-encrypted identification information;
the broadcast module is used for broadcasting the access information, so that the terminal establishes connection with the wearable device when the fact that the identification information carried in the received access information is the same as the identification information sent to the terminal by the server is determined;
and the sending module is used for sending pre-stored authentication information to the terminal through the connection so that the terminal sends the authentication information to the server, and the server can conveniently perform authentication according to the received authentication information and the authentication standard information which is stored by the server and corresponds to the identification information.
The embodiment of the application provides a registration and authentication method and device. And when the authentication is carried out, the terminal receives the non-encryption identification information of the wearable device sent by the server and carries out authentication based on the non-encryption identification information. In the method, the terminal is based on the non-encrypted identification information of the wearable device in the registration and authentication processes, namely, the identification information of the wearable device interacting with the server in the registration and authentication processes is not encrypted, so that the user can normally perform secret-free registration and authentication even if the user subsequently replaces the terminal, and the convenience of the user in secret-free authentication is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of a user registration secret-free authentication service in the prior art according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating a process of performing secret-less authentication by a user in the prior art according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a user registration secret-free authentication service according to an embodiment of the present application;
FIG. 4 illustrates an authentication process provided by an embodiment of the present application;
fig. 5 is a schematic structural diagram of a registration apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another registration apparatus provided in the embodiment of the present application;
fig. 7 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of another authentication apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 3 is a schematic flowchart of a user registration secret-free authentication service provided in an embodiment of the present application, which specifically includes the following steps:
s301: the method comprises the steps that a terminal obtains identification information of wearable equipment, wherein the identification information is non-encrypted identification information.
In the embodiment of the application, in order to improve the efficiency of the user in performing authentication operations such as login and payment, the user can perform the secret-free authentication by using the wearable device, and the user needs to register the secret-free authentication service with the server first to perform the secret-free authentication through the wearable device. During registration, a user may first use a terminal to send a registration request for opening the privacy-exempt authentication service to a server, where the registration request may carry a user identifier (e.g., a user account number, etc.), after receiving the registration request, the server may return an instruction for binding a wearable device to the terminal, so as to bind the user identifier to a certain wearable device specified by the user, and after receiving the instruction, the terminal may establish a connection with the wearable device specified by the user, and obtain identification information of the wearable device through the connection.
The terminal described in this embodiment of the present application may be an intelligent terminal such as a smart phone and a tablet computer, and the wearable device may be a device such as a smart watch and a smart band.
Because the embodiment of the application aims to solve the problem that the authentication cannot be performed normally if different terminals used by a user authenticate after the terminal encrypts the identification information of the wearable device, the identification information of the wearable device acquired by the terminal in the embodiment of the application is non-encrypted identification information, and the non-encrypted identification information may be, for example, a MAC address of the wearable device.
S302: and sending the acquired identification information to a server.
After the terminal sends the acquired non-encrypted identification information of the wearable device to the server, the server can store the non-encrypted identification information as the identification information of the wearable device bound with the user identifier carried in the registration request.
S303: authentication information is obtained.
After the server stores the non-encrypted identification information of the wearable device, an acquisition request of the authentication information can be returned to the terminal so as to inform the terminal to acquire the authentication information input by the user. After the terminal receives the acquisition request, the terminal can send the acquired identification information to the server, so that the server can store the received identification information and display an interface corresponding to the authentication information to the user, the user can set the corresponding authentication information in the interface displayed by the terminal, and the terminal can obtain the authentication information set by the user.
In addition, the server can also send an acquisition request of the authentication information to the wearable device through the terminal, so that the wearable device displays an interface for setting the authentication information to the user after receiving the acquisition request, and further the user sets the authentication information according to the interface displayed by the wearable device. After the wearable device obtains the authentication information set by the user, the wearable device can send the authentication information to the terminal.
The authentication information set by the user may be biometric authentication information capable of identifying the identity of the user, such as fingerprint information and voiceprint information, or may be graphical authentication information, such as a graphical password, besides the traditional password information.
S304: and sending the authentication information to the wearable device and the server, enabling the wearable device to store the authentication information, and enabling the server to store the authentication information as authentication standard information corresponding to the identification information.
When the terminal obtains the authentication information, the monitored authentication information set by the user can be respectively sent to the wearable device and the server. The wearable device can directly store the authentication information after receiving the authentication information sent by the terminal, and the server can store the authentication information as authentication standard information corresponding to the user identifier and the stored non-encrypted identification information after receiving the authentication information and use the authentication standard information for subsequent secret-free authentication.
In step S301 shown in fig. 3, when the terminal acquires the non-encrypted identification information of the wearable device, the non-encrypted identification information of the wearable device may be obtained through bluetooth communication. Specifically, most wearable devices perform information interaction with other devices through bluetooth, and before the wearable devices establish bluetooth connection with other devices, access information is generally broadcasted through bluetooth, so that the other devices can search the wearable devices through the access information, therefore, the wearable devices can add non-encrypted identification information such as MAC addresses of the wearable devices to the access information, and broadcast the access information through bluetooth, and the terminal can receive the access information broadcasted through bluetooth by the wearable devices and acquire the non-encrypted identification information of the wearable devices from the access information.
Of course, if the terminal and the wearable device have established a bluetooth connection, the wearable device may also send its non-encrypted identification information to the terminal based on the established bluetooth connection.
Based on the registration process shown in fig. 3, the embodiment of the present application further provides a corresponding authentication process, as shown in fig. 4.
Fig. 4 is an authentication process provided in the embodiment of the present application, which specifically includes the following steps:
s401: the terminal receives identification information of the wearable device sent by the server, wherein the identification information is non-encrypted identification information.
When the user performs authentication operations such as login and payment using the terminal, an authentication request related to the authentication operation may be sent to the server through the terminal, so that the server sends the pre-stored non-encrypted identification information of the wearable device received and stored in step S302 to the terminal after receiving the authentication request.
Specifically, when a user uses a terminal to perform authentication operation, the server may send an authentication request carrying identification information of the user to the server, and after receiving the authentication request carrying the user identification, the server may send, according to the user identification in the authentication request, pre-stored non-encrypted identification information of the wearable device corresponding to the user identification to the terminal.
The non-encrypted identification information based in the authentication process may also be a wearable device MAC address.
S402: and according to the identification information, establishing connection with the wearable equipment corresponding to the identification information.
After receiving the non-encrypted identification information of the wearable device sent by the server, the terminal can establish connection with the wearable device corresponding to the non-encrypted identification information according to the non-encrypted identification information.
Specifically, the wearable device may add the non-encryption identification information of the wearable device to the access information, and broadcast the access information, so that after receiving the non-encryption identification information sent by the server, the terminal may match the non-encryption identification information with the received non-encryption identification information included in the broadcasted access information of each wearable device, and when the non-encryption identification information received by the terminal is the same as the non-encryption identification information of a certain wearable device, the terminal may establish a connection with the wearable device. The connection may be specifically a bluetooth connection, or may be other connections, such as a zigbee (zigbee) connection.
S403: and receiving authentication information which is sent by the wearable device and is pre-stored by the wearable device through the connection.
After the terminal establishes connection with the wearable device corresponding to the non-encrypted identification information according to the received non-encrypted identification information sent by the server, the terminal can receive the pre-stored authentication information sent by the wearable device through the connection.
Specifically, after the terminal establishes connection with the wearable device, a confirmation message may be returned to the server, that is, the terminal is notified that the wearable device used for the privacy-exempt authentication of the user has been found and connected according to the non-encrypted identification information sent by the server. After the server receives the confirmation message sent by the terminal, the server can know that the terminal has established connection with the wearable device corresponding to the non-encrypted identification information prestored by the server, and therefore the server can send a message indicating that the user inputs the authentication information to the terminal. After receiving the message sent by the server, the terminal can establish connection with the corresponding wearable device according to the message, when the wearable device determines that the wearable device is connected to the terminal, the terminal can send the pre-stored authentication information to the terminal through the connection, and the terminal can acquire the authentication information stored in the wearable device with the connection established.
When the wearable device is determined to be connected to the terminal, two operation options can be displayed in an operation interface of the wearable device, wherein one operation option is a confirmation option, the other operation option is a cancellation option, and if the fact that the user selects the confirmation option is monitored, pre-stored authentication information can be sent to the terminal; if the user selects the cancel option, no information can be sent to the terminal.
In addition, when the terminal receives the non-encrypted identification information of the wearable device sent by the server in step S401, and the wearable device corresponding to the non-encrypted identification information has already established a connection, it may not need to establish a connection with the wearable device again in step S402, and at this time, the terminal may directly obtain the authentication information stored in the wearable device in step S403.
Specifically, when receiving the non-encryption identification information of the wearable device sent by the server, the terminal may first determine whether the terminal itself has established a connection with a certain wearable device, if so, obtain the non-encryption identification information from the connected wearable device, and when it is determined that the non-encryption identification information obtained from the connected wearable device is the same as the non-encryption identification information received from the server, may directly obtain the authentication information from the connected wearable device, and if not, may establish a connection with the wearable device corresponding to the non-encryption identification information received from the server through step S402, and obtain the authentication information from the wearable device through step S403.
The terminal can compare the non-encryption identification information obtained from each wearable device connected with the terminal with the received non-encryption identification information after receiving the non-encryption identification information sent by the server, and when the non-encryption identification information of a certain wearable device is the same as the received non-encryption identification information, the terminal can filter the other connected wearable devices and only keep the connection state with the wearable device.
S404: and returning the authentication information to the server, so that the server performs authentication according to the received authentication information and the stored authentication standard information corresponding to the identification information.
When the terminal obtains the authentication information, the authentication information can be sent to the server, so that the server can compare the authentication information with the pre-stored authentication standard information after receiving the authentication information, and when the comparison result is consistent, the authentication is passed; and when the comparison result is inconsistent, the authentication is not passed.
As can be seen from the above-mentioned registration and authentication processes shown in fig. 3 and 4, since the registration and authentication processes are performed based on the non-encrypted identifier of the wearable device, even if the terminal used by the user during the secret-less authentication operation is not the terminal used by the user during the registration of the secret-less authentication service, the user can still perform the secret-less registration and authentication normally, thereby improving the convenience of the user during the secret-less authentication.
It should be noted that the registration and authentication process provided in the present application may be used in a terminal installed with an apple mobile device operating system (iOS), and when the registration and authentication process is applied to the iOS operating system, the non-encryption identification information may be a MAC address of the wearable device.
Of course, the foregoing is only described by taking the non-encrypted identification information as an example of the MAC address, and the non-encrypted identification information in the present application may also be other identification information that is used for identifying the wearable device and is not encrypted by the terminal, for example, if the terminal installed with the iOS operating system does not encrypt the factory serial number of the wearable device, the factory serial number may also be the non-encrypted identification information, and the registration and authentication process provided in the present application may also be performed based on the factory serial number of the wearable device.
Based on the same idea, the embodiments of the present application further provide two types of registration devices and two types of authentication devices, as shown in fig. 5, 6, 7, and 8.
Fig. 5 is a schematic structural diagram of a registration apparatus provided in an embodiment of the present application, which specifically includes:
an identifier obtaining module 501, configured to obtain identifier information of a wearable device, where the identifier information is non-encrypted identifier information;
an identifier sending module 502, configured to send the identifier information to a server;
an authentication information obtaining module 503, configured to obtain authentication information;
an authentication information sending module 504, configured to send the authentication information to the wearable device and the server, so that the wearable device stores the authentication information, and the server stores the authentication information as authentication standard information corresponding to the identification information.
The identification information includes media access control, MAC, address information.
The identifier obtaining module 501 is specifically configured to receive access information broadcasted by the wearable device through bluetooth, and obtain identifier information of the wearable device from the access information; or acquiring the identification information of the wearable device based on the established Bluetooth connection with the wearable device.
Fig. 6 is a schematic structural diagram of another registration apparatus provided in the embodiment of the present application, which specifically includes:
a sending module 601, configured to send identification information to a terminal, so that the terminal sends the identification information to a server, where the identification information is non-encrypted identification information;
a receiving module 602, configured to receive and store authentication information returned by the terminal, where the authentication information is sent by the terminal to the device and the server, and the authentication information sent to the server is stored by the server as authentication standard information corresponding to the identification information.
The identification information includes media access control, MAC, address information.
The sending module 601 is specifically configured to add the identification information to access information, and broadcast the access information through bluetooth; or sending the identification information to the terminal based on the established Bluetooth connection with the terminal.
Fig. 7 is a schematic structural diagram of an authentication apparatus provided in an embodiment of the present application, which specifically includes:
the identification receiving module 701 is configured to receive identification information of the wearable device sent by the server, where the identification information is non-encrypted identification information;
a connection module 702, configured to establish, according to the identification information, a connection with a wearable device corresponding to the identification information;
an authentication information receiving module 703, configured to receive, through the connection, authentication information that is sent by the wearable device and is pre-stored in the wearable device;
a sending module 704, configured to return the authentication information to the server, so that the server performs authentication according to the received authentication information and the stored authentication standard information corresponding to the identification information.
The identification information includes media access control, MAC, address information.
The connection module 702 is specifically configured to receive access information broadcasted by bluetooth of each wearable device, and establish bluetooth connection with the wearable device carrying the identification information in the broadcasted access information.
Fig. 8 is a schematic structural diagram of another authentication apparatus provided in an embodiment of the present application, which specifically includes:
an adding module 801, configured to add identification information of the apparatus to access information, where the identification information is non-encrypted identification information;
a broadcasting module 802, configured to broadcast the access information, so that the terminal establishes a connection with the wearable device when it is determined that the identification information carried in the received access information is the same as the identification information sent to the terminal by the server;
a sending module 803, configured to send, through the connection, pre-stored authentication information to the terminal, so that the terminal sends the authentication information to the server, so that the server performs authentication according to the received authentication information and the authentication standard information corresponding to the identification information and stored by the server.
The identification information includes media access control, MAC, address information.
The broadcasting module 802 is specifically configured to broadcast the access information through bluetooth.
The embodiment of the application provides a registration and authentication method and device. And when the authentication is carried out, the terminal receives the non-encryption identification information of the wearable device sent by the server and carries out authentication based on the non-encryption identification information. In the method, the terminal is based on the non-encrypted identification information of the wearable device in the registration and authentication processes, namely, the identification information of the wearable device interacting with the server in the registration and authentication processes is not encrypted, so that the user can normally perform secret-free registration and authentication even if the user subsequently replaces the terminal, and the convenience of the user in secret-free authentication is improved.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (15)
1. A method of authentication, comprising:
the method comprises the steps that a terminal receives identification information sent by a server, wherein the identification information is identification information of wearable equipment stored in the server in advance;
the terminal judges whether the received identification information from the server is the same as the identification information from each wearable device;
if the authentication information is the same as the authentication information, the terminal acquires authentication information preset by the user and stored in advance by the wearable device;
and the terminal returns the authentication information to the server, so that the server performs authentication according to the received authentication information and the stored authentication standard information corresponding to the identification information.
2. The method of claim 1, wherein the terminal determining whether the received identification information from the server is the same as the identification information from each wearable device comprises:
and the terminal judges whether the received identification information from the server is the same as the identification information carried in the access information sent by each wearable device through Bluetooth broadcasting.
3. The method of claim 1, further comprising:
if the terminal is the same as the wearable device, the terminal establishes connection with the wearable device;
the terminal acquires authentication information set by a user and pre-stored in the wearable device, and the authentication information includes:
after the terminal establishes connection, returning a confirmation message to the server, wherein the confirmation message is used for ensuring the server to confirm that the connection is established;
the terminal receiving authentication information input information from the server in response to the confirmation message, the authentication information input information including a message indicating that a user inputs authentication information;
and the terminal acquires the authentication information preset by the user and stored in the wearable device in advance through the connection according to the authentication information input information.
4. The method of claim 3, wherein the terminal obtaining the authentication information of the user setting saved in advance by the wearable device through the connection according to the authentication information input information comprises:
and the terminal receives the operation of the wearable equipment, which is executed based on the user, of confirming transmission according to the authentication information input information, and the authentication information which is preset by the wearable equipment and is transmitted through the connection is transmitted.
5. The method of claim 1, the terminal determining whether the received identification information from the server is the same as the identification information from each wearable device; if the authentication information is the same as the authentication information, the terminal acquires authentication information preset by the user and stored in advance by the wearable device, and the authentication information comprises:
the terminal acquires identification information from each wearable device with the established connection;
the terminal screens out wearable devices with the same identification information from all the connected wearable devices according to the received identification information from the server;
and the terminal acquires the authentication information set by the user and stored in advance from the screened wearable equipment.
6. The method of claim 1, the identification information comprising Media Access Control (MAC) address information.
7. The method of claim 1, wherein before the terminal receives the identification information sent by the server, the method further comprises:
the terminal sends an authentication request containing user identification information to the server, and the server responds to the authentication request and sends pre-stored identification information of the wearable device corresponding to the user identification information in the authentication request to the terminal.
8. An apparatus for authentication, comprising:
the identification receiving module is used for receiving identification information sent by a server, wherein the identification information is identification information of wearable equipment pre-stored by the server;
the authentication information receiving module is used for judging whether the received identification information from the server is the same as the identification information from each wearable device;
if the authentication information is the same as the authentication information, the authentication information is acquired, and the authentication information is set by the user and is pre-stored in the wearable device;
and the sending module returns the authentication information to the server, so that the server performs authentication according to the received authentication information and the stored authentication standard information corresponding to the identification information.
9. The apparatus of claim 8, determining whether the identification information received from the server is the same as the identification information from each wearable device comprises:
and judging whether the received identification information from the server is the same as identification information carried in access information sent by each wearable device through Bluetooth broadcasting.
10. The apparatus of claim 8, further comprising:
if the same, establishing connection with the wearable equipment;
the method for acquiring the authentication information preset by the user and saved in advance by the wearable device comprises the following steps:
after the connection is established, returning a confirmation message to the server, wherein the confirmation message is used for ensuring the server to confirm that the connection is established;
receiving authentication information input information from the server in response to the confirmation message, the authentication information input information including a message indicating that a user inputs authentication information;
and acquiring authentication information preset by the user and stored in the wearable device in advance through the connection according to the authentication information input information.
11. The apparatus of claim 10, wherein obtaining authentication information of the user setting saved in advance by the wearable device through the connection according to the authentication information input information comprises:
and receiving the operation of the wearable equipment, which is executed based on the user, of confirming the sending according to the authentication information input information, and sending the authentication information which is preset by the wearable equipment and is saved by the wearable equipment through the connection.
12. The apparatus of claim 8, determining whether the received identification information from the server is the same as the identification information from each wearable device; if the authentication information is the same as the authentication information, the authentication information is acquired by the wearable device, wherein the authentication information is preset by the user and includes:
acquiring identification information from each wearable device with the established connection;
screening out wearable devices with the same identification information from all the wearable devices with the established connection according to the received identification information from the server;
and acquiring the authentication information set by the user and stored in advance from the screened wearable device.
13. The apparatus of claim 8, the identification information comprising Media Access Control (MAC) address information.
14. The apparatus of claim 8, wherein before receiving the sex identification information sent by the server, the apparatus further comprises:
sending an authentication request containing user identification information to the server, and enabling the server to respond to the authentication request and send pre-stored identification information of the wearable device corresponding to the user identification information in the authentication request to the device.
15. An electronic device for authentication, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
receiving identification information sent by a server, wherein the identification information is identification information of wearable equipment prestored by the server;
judging whether the received identification information from the server is the same as the identification information from each wearable device;
if the authentication information is the same as the authentication information, the authentication information is acquired, and the authentication information is set by the user and is pre-stored in the wearable device;
and returning the authentication information to the server, so that the server performs authentication according to the received authentication information and the stored authentication standard information corresponding to the identification information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110351818.8A CN113038446B (en) | 2015-11-24 | 2015-11-24 | Registration and authentication method and device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110351818.8A CN113038446B (en) | 2015-11-24 | 2015-11-24 | Registration and authentication method and device |
CN201510825252.2A CN106789852B (en) | 2015-11-24 | 2015-11-24 | Registration and authentication method and device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510825252.2A Division CN106789852B (en) | 2015-11-24 | 2015-11-24 | Registration and authentication method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113038446A true CN113038446A (en) | 2021-06-25 |
CN113038446B CN113038446B (en) | 2024-01-23 |
Family
ID=58963741
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510825252.2A Active CN106789852B (en) | 2015-11-24 | 2015-11-24 | Registration and authentication method and device |
CN202110351818.8A Active CN113038446B (en) | 2015-11-24 | 2015-11-24 | Registration and authentication method and device |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510825252.2A Active CN106789852B (en) | 2015-11-24 | 2015-11-24 | Registration and authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN106789852B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117544379A (en) * | 2023-11-22 | 2024-02-09 | 北京京东方技术开发有限公司 | User data transmission methods, devices, electronic equipment and storage media |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030025603A1 (en) * | 2001-08-01 | 2003-02-06 | Smith Edwin Derek | Master authenticator |
JP2009251649A (en) * | 2008-04-01 | 2009-10-29 | Olympus Corp | Server system, electronic equipment, communication terminal, and authentication method |
US8371501B1 (en) * | 2008-10-27 | 2013-02-12 | United Services Automobile Association (Usaa) | Systems and methods for a wearable user authentication factor |
CN103310142A (en) * | 2013-05-22 | 2013-09-18 | 复旦大学 | Man-machine fusion security authentication method based on wearable equipment |
US20140089672A1 (en) * | 2012-09-25 | 2014-03-27 | Aliphcom | Wearable device and method to generate biometric identifier for authentication using near-field communications |
US20140289837A1 (en) * | 2013-03-25 | 2014-09-25 | Konica Minolta, Inc. | Authenticating system, information processing device, authenticating method and non-transitory computer readable recording medium |
KR20140128139A (en) * | 2013-04-26 | 2014-11-05 | 주식회사 텔스카 | User authentication system and method using smart media |
CN104219058A (en) * | 2014-09-28 | 2014-12-17 | 小米科技有限责任公司 | Identity authentication and authorization method and device |
CN104243484A (en) * | 2014-09-25 | 2014-12-24 | 小米科技有限责任公司 | Information interaction method and device and electronic equipment |
CN104283876A (en) * | 2014-09-29 | 2015-01-14 | 小米科技有限责任公司 | Operation authorization method and device |
US20150043561A1 (en) * | 2012-04-24 | 2015-02-12 | Huawei Technologies Co., Ltd. | Wireless network access technology |
CN104601327A (en) * | 2013-12-30 | 2015-05-06 | 腾讯科技(深圳)有限公司 | Safe verification method, relative apparatus and system |
CN104683296A (en) * | 2013-11-28 | 2015-06-03 | 中国电信股份有限公司 | Safe authentication method and safe authentication system |
CN104901801A (en) * | 2014-03-06 | 2015-09-09 | 腾讯科技(深圳)有限公司 | Method and device for verifying identity |
US20150304851A1 (en) * | 2014-04-22 | 2015-10-22 | Broadcom Corporation | Portable authorization device |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571702B (en) * | 2010-12-22 | 2014-11-05 | 中兴通讯股份有限公司 | Key generation method, system and equipment in Internet of things |
KR102127927B1 (en) * | 2013-07-30 | 2020-07-09 | 엘지전자 주식회사 | Mobile terminal, smart watch and security authorizing method therbetween |
CN104065653B (en) * | 2014-06-09 | 2015-08-19 | 北京石盾科技有限公司 | A kind of interactive auth method, device, system and relevant device |
CN104144216B (en) * | 2014-07-31 | 2017-04-26 | 中国联合网络通信集团有限公司 | Data processing method and device for wearable terminal |
CN104463036B (en) * | 2014-11-22 | 2018-11-16 | 广东欧珀移动通信有限公司 | Method, mobile terminal and the system of Password Input |
CN104753679B (en) * | 2015-03-05 | 2019-01-29 | 北京畅游天下网络技术有限公司 | User authen method and system and intelligent wearable device |
-
2015
- 2015-11-24 CN CN201510825252.2A patent/CN106789852B/en active Active
- 2015-11-24 CN CN202110351818.8A patent/CN113038446B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030025603A1 (en) * | 2001-08-01 | 2003-02-06 | Smith Edwin Derek | Master authenticator |
JP2009251649A (en) * | 2008-04-01 | 2009-10-29 | Olympus Corp | Server system, electronic equipment, communication terminal, and authentication method |
US8371501B1 (en) * | 2008-10-27 | 2013-02-12 | United Services Automobile Association (Usaa) | Systems and methods for a wearable user authentication factor |
US20150043561A1 (en) * | 2012-04-24 | 2015-02-12 | Huawei Technologies Co., Ltd. | Wireless network access technology |
US20140089672A1 (en) * | 2012-09-25 | 2014-03-27 | Aliphcom | Wearable device and method to generate biometric identifier for authentication using near-field communications |
US20140289837A1 (en) * | 2013-03-25 | 2014-09-25 | Konica Minolta, Inc. | Authenticating system, information processing device, authenticating method and non-transitory computer readable recording medium |
KR20140128139A (en) * | 2013-04-26 | 2014-11-05 | 주식회사 텔스카 | User authentication system and method using smart media |
CN103310142A (en) * | 2013-05-22 | 2013-09-18 | 复旦大学 | Man-machine fusion security authentication method based on wearable equipment |
CN104683296A (en) * | 2013-11-28 | 2015-06-03 | 中国电信股份有限公司 | Safe authentication method and safe authentication system |
CN104601327A (en) * | 2013-12-30 | 2015-05-06 | 腾讯科技(深圳)有限公司 | Safe verification method, relative apparatus and system |
CN104901801A (en) * | 2014-03-06 | 2015-09-09 | 腾讯科技(深圳)有限公司 | Method and device for verifying identity |
US20150304851A1 (en) * | 2014-04-22 | 2015-10-22 | Broadcom Corporation | Portable authorization device |
CN104243484A (en) * | 2014-09-25 | 2014-12-24 | 小米科技有限责任公司 | Information interaction method and device and electronic equipment |
CN104219058A (en) * | 2014-09-28 | 2014-12-17 | 小米科技有限责任公司 | Identity authentication and authorization method and device |
CN104283876A (en) * | 2014-09-29 | 2015-01-14 | 小米科技有限责任公司 | Operation authorization method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117544379A (en) * | 2023-11-22 | 2024-02-09 | 北京京东方技术开发有限公司 | User data transmission methods, devices, electronic equipment and storage media |
CN117544379B (en) * | 2023-11-22 | 2024-06-07 | 北京京东方技术开发有限公司 | User data transmission method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106789852B (en) | 2021-03-30 |
CN113038446B (en) | 2024-01-23 |
CN106789852A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11197137B2 (en) | Electronic device and method for remotely providing profile to electronic device | |
KR102242218B1 (en) | User authentication method and apparatus, and wearable device registration method and apparatus | |
CN110502887B (en) | Electronic payment method and device | |
KR102331695B1 (en) | Method for changing a profile in accordance with an identification module and an electronic device implementing the same | |
EP3422751A1 (en) | Electronic device and control method for electronic device | |
CN112217831A (en) | Information interaction method, device and equipment about Internet of things equipment | |
US11122404B2 (en) | Electronic device, external electronic device, and method of managing embedded subscriber identity modules of external electronic device | |
CN108702607B (en) | Multi-device wireless connection method and device | |
HK1213380A1 (en) | Authorization method and method and device for requesting authorization | |
US11570611B2 (en) | Electronic device, external electronic device, and method for managing eSIM of external electronic device | |
US10382607B2 (en) | Switching TV channels using a mobile device and a set-top box | |
KR101615686B1 (en) | Method for Providing Mobile OTP based on Location | |
CN106789852B (en) | Registration and authentication method and device | |
US11297488B2 (en) | Electronic device in which profile is installed and operating method for electronic device | |
CN108834127B (en) | Terminal loss reporting method, device, terminal and system | |
CN114637627A (en) | Method and system for data recovery | |
CN110062373A (en) | A kind of card writing method and device | |
HK40044733A (en) | Information interaction method, device and equipment related to internet of things equipment | |
KR20150095231A (en) | Method for Providing Mobile OTP based on Location | |
KR101561686B1 (en) | Method for Providing OTP based on Location | |
HK40044733B (en) | Information interaction method, device and equipment related to internet of things equipment | |
CN105574375A (en) | Secure operation method and apparatus | |
HK1249296A1 (en) | Information interaction method, device and equipment for equipment of internet of things (iot) | |
HK1249605A1 (en) | Intelligent device binding method, apparatus and system, and communication system | |
HK1230361B (en) | Method and device for authenticating user, and method and device for registering wearable device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |