Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe check-in method and system facing mobile terminal

A mobile terminal and security technology, applied in security devices, location-based services, electrical components, etc., can solve the problems of deceiving service providers, destroying the check-in business model, harming the interests of service providers and merchants, etc. Guaranteed authenticity

Inactive Publication Date: 2014-03-26
邬国锐
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will lead to malicious or dishonest users defrauding the service provider to obtain rewards by performing false check-ins, thus harming the interests of service providers and merchants, reducing the participation interest of honest users, and destroying the business model of sign-in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe check-in method and system facing mobile terminal
  • Safe check-in method and system facing mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0042] (1) The initialization phase of the system: establish a password-based trust relationship among the various components in the system.

[0043] The present invention adopts a combined public key (CPK, Combined Public Key) cryptographic system as the basis of security. First, the trust center of the sign-in service generates the system's master key and public parameters through a combination of public key algorithms.

[0044] The sign-in system assumes that each registered user in the system has a globally unique ID, which can be the user's mobile phone number, email address, or user account name within the system. According to the user's ID, the trust center of the sign-in service generates a user key corresponding to the ID for the user through a combined public key algorithm, and distributes it to the user's mobile terminal through a secure channel. For example, the user can log in to the trust center server of the sign-in system through the user name and password, an...

Embodiment 1

[0066] One of the typical applications of this sign-in system: the sign-in service in the sign-in system is a membership card system located on the Internet, and the mobile terminal is a smart phone, which can communicate with the sign-in service through the mobile operator network or WiFi. After the user arrives at a specific sign-in device with a mobile terminal and obtains a sign-in voucher, he can present the sign-in voucher to the sign-in service through the network. After the sign-in service verifies, corresponding points and preferential rewards are added to the user's membership card account. If malicious users try to copy or forge the sign-in voucher, they cannot pass the verification of the sign-in service, and thus cannot obtain points and preferential rewards.

Embodiment 2

[0068] The second typical application of this sign-in system: the sign-in service in the sign-in system is deployed in the POS (Point of Sale) system of a specific merchant in the shopping center. communication. After the user arrives at a specific sign-in device with a mobile terminal and obtains a sign-in voucher, he can present the sign-in voucher when communicating with the POS system. As a sign-in service, the POS system can verify the authenticity of the sign-in voucher without accessing third-party services. The validity of the certificate is verified, and if the certificate is true, the user can be provided with a discount or preferential reward based on the certificate.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe check-in system facing a mobile terminal. The safe check-in system comprises a trusted center, check-in equipment, the mobile terminal and check-in authentication server, wherein the mobile terminal and the check-in equipment are in two-way communication through an audio signal, therefore, under the condition of no network, the mobile terminal and the check-in equipment can also be in two-way data communication. The requirement of two-way data communication between the mobile terminal and the check-in equipment on an analog audio channel is met through a modulation-demodulation method. According to the invention, a combined public key is used as a core cryptographic technique, the check-in reality verifiability in the check-in system is ensured through the safety protocol among the check-in equipment, the mobile terminal and the check-in authentication server as well as the key data of check-in certification, that is, the faked or forged check-in cannot be allowed. Through the technical scheme, the check-in geographic location of a mobile terminal user is more accurate than that of the mobile terminal user obtained through a conventional GPS manner, and the check-in data reality is ensured.

Description

technical field [0001] The invention belongs to the application field of Internet mobile terminals, and in particular relates to a method and system for secure sign-in of Internet mobile terminals. Background technique [0002] Location-based service (Location Based Service, LBS) is to obtain the location information of mobile terminal users through wireless communication networks, such as the network of telecom mobile operators and Wi-Fi, or external positioning methods such as GPS, and based on the user's location information, a value-added service that provides users with corresponding services. Check-in service is one of the modes of location-based services. Many social relationship networks, such as Foursquare, Google+, Facebook, Gowalla, etc., allow users to "check in" at a specific geographic location or physical location, and provide their physical location to the social relationship network service provider and their friends. The service provider can also Provide ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/02H04W12/06
Inventor 邬国锐
Owner 邬国锐