A method for binding and verifying a user ID with an external device
A technology for external devices and users, applied in the field of binding and verification, it can solve the problem that the legal use of external devices cannot be guaranteed, and achieve the effect of improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] The present invention provides two different binding methods for the mode of using the external device connected to the mobile device to perform related business operations, namely the binding of the user ID and the external device and the binding of the user ID and the background system. This embodiment mainly describes the binding between the user ID and the background system.
[0063] see figure 1 , which is a binding method signaling diagram of a method for binding a user ID and an external device according to the present invention, and the method includes the following steps:
[0064] S101: When the external device accesses the mobile device for the first time, the external device obtains the user ID and user password input through the mobile device, the ID of the external device, and generates a random number;
[0065] The external device encrypts the external device ID, the user ID and the random number using the pre-stored master key uniquely corresponding to the...
Embodiment 2
[0086] see figure 2 , which is a verification method flowchart of a method for verifying a user ID and an external device, including steps:
[0087] S201: The external device connected to the mobile device requests to perform a service operation.
[0088] After the binding, every time the external device connected to the mobile device is used to request a business operation, the external device will send the external device ID and user ID to the background system through the connected mobile device.
[0089] S202: The background system receives the external device ID and the user ID sent by the external device.
[0090] S203: The background system compares the received external device ID and user ID with the bound and stored external device ID and user ID.
[0091] S204: Only when the comparison results are consistent, the background system allows the external device to use the mobile device to perform business operations.
[0092] It can be seen from the second embodiment...
Embodiment 3
[0094] This embodiment mainly describes the binding of the user ID and the external device.
[0095] see image 3 , which is another binding method signaling diagram of a method for binding a user ID with an external device, including steps:
[0096] For details of S301 to S304, please refer to S101 to S104 in Embodiment 1.
[0097] The difference is that, after the comparison results in step S304 are consistent, the background system does not perform the binding operation, but directly enters S305.
[0098] S305: The background system sends the specific parameter and the third encrypted value to the external device connected to the mobile device.
[0099] The specific parameter is a random number generated by the background system or a related parameter bound to the corresponding relationship between the external device ID and the user ID.
[0100] The third encrypted value is obtained by the background system by encrypting the external device ID, user ID and specific para...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


