Method and system for identity authentication by Bluetooth

An identity authentication and Bluetooth technology, applied in the field of network security, can solve problems such as inability to authenticate mobile devices, achieve the effect of improving user experience and avoiding potential safety hazards

Active Publication Date: 2013-06-12
CHINA FINANCIAL CERTIFICATION AUTHORITY
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides a method and system for identity authentication using Bluetoo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identity authentication by Bluetooth
  • Method and system for identity authentication by Bluetooth

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] When the existing bluetooth device is in use, the two devices to communicate must both turn on the bluetooth and keep the bluetooth module in a standby state at any time, otherwise there will be a problem that the other party's device cannot be found when connecting. Since the status of the Bluetooth module is broadcast wirelessly, all devices within the effective receiving range can search for the device and try to connect to it, which makes the Bluetooth shield in danger of being sto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security, and provides a method and a system for identity authentication by Bluetooth. The method comprises the following steps of: setting the status of a Bluetooth shield as an invisible status when the Bluetooth shield leaves a factory; issuing the Bluetooth shield, binding user information and the Bluetooth address, and recording at a server side; inputting the user information through user equipment by the user and accessing a server, and extracting the Bluetooth address into the user equipment; enabling the Bluetooth address to be initiatively requested to be connected with the Bluetooth shield by the user equipment; and after the Bluetooth shield receives the request, building a Bluetooth link of the user equipment to supply the identity authentication for user data. According to the invention, the normal potential safety hazard of the existing Bluetooth equipment can be avoided, the credible identity authentication of each operation system can be enhanced, the authority and the confidentiality of each operation system data can be improved, the power consumption of the Bluetooth shield can be saved, and the usage experience of the user can be improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for identity authentication using bluetooth. Background technique [0002] As the computer network penetrates into all aspects of people's market life, more and more network applications involve user's private information. It is difficult to effectively guarantee the user's information security due to the low safety factor of simple user passwords. Therefore, on the Internet, it is often necessary to authenticate users whose identity is much stronger than that of the username and password. A typical scenario is that when users log in to online banking for transfer operations, they need to strictly authenticate the identity of the operating user. Currently, USBKeys (commonly known as U-shield) device is used as a means of identity authentication. This type of device communicates with the PC through the USB data port. When the user needs to perform iden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 李闯张行马洪龙
Owner CHINA FINANCIAL CERTIFICATION AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products