Safe check-in method and system facing mobile terminal
A mobile terminal and security technology, applied in security devices, location-based services, electrical components, etc., can solve the problems of deceiving service providers, destroying the check-in business model, harming the interests of service providers and merchants, etc. Guaranteed authenticity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0042] (1) The initialization phase of the system: establish a password-based trust relationship among the various components in the system.
[0043] The present invention adopts a combined public key (CPK, Combined Public Key) cryptographic system as the basis of security. First, the trust center of the sign-in service generates the system's master key and public parameters through a combination of public key algorithms.
[0044] The sign-in system assumes that each registered user in the system has a globally unique ID, which can be the user's mobile phone number, email address, or user account name within the system. According to the user's ID, the trust center of the sign-in service generates a user key corresponding to the ID for the user through a combined public key algorithm, and distributes it to the user's mobile terminal through a secure channel. For example, the user can log in to the trust center server of the sign-in system through the user name and password, an...
Embodiment 1
[0066] One of the typical applications of this sign-in system: the sign-in service in the sign-in system is a membership card system located on the Internet, and the mobile terminal is a smart phone, which can communicate with the sign-in service through the mobile operator network or WiFi. After the user arrives at a specific sign-in device with a mobile terminal and obtains a sign-in voucher, he can present the sign-in voucher to the sign-in service through the network. After the sign-in service verifies, corresponding points and preferential rewards are added to the user's membership card account. If malicious users try to copy or forge the sign-in voucher, they cannot pass the verification of the sign-in service, and thus cannot obtain points and preferential rewards.
Embodiment 2
[0068] The second typical application of this sign-in system: the sign-in service in the sign-in system is deployed in the POS (Point of Sale) system of a specific merchant in the shopping center. communication. After the user arrives at a specific sign-in device with a mobile terminal and obtains a sign-in voucher, he can present the sign-in voucher when communicating with the POS system. As a sign-in service, the POS system can verify the authenticity of the sign-in voucher without accessing third-party services. The validity of the certificate is verified, and if the certificate is true, the user can be provided with a discount or preferential reward based on the certificate.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 