Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for binding and verifying a user ID with an external device

A technology for external devices and users, applied in the field of binding and verification, it can solve the problem that the legal use of external devices cannot be guaranteed, and achieve the effect of improving security.

Active Publication Date: 2017-11-24
BEIJING WATCH DATA SYST
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a method for binding and verifying a user ID with an external device, which solves the technical problem that the external device cannot be guaranteed to be legally used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for binding and verifying a user ID with an external device
  • A method for binding and verifying a user ID with an external device
  • A method for binding and verifying a user ID with an external device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] The present invention provides two different binding methods for the mode of using the external device connected to the mobile device to perform related business operations, namely the binding of the user ID and the external device and the binding of the user ID and the background system. This embodiment mainly describes the binding between the user ID and the background system.

[0063] see figure 1 , which is a binding method signaling diagram of a method for binding a user ID and an external device according to the present invention, and the method includes the following steps:

[0064] S101: When the external device accesses the mobile device for the first time, the external device obtains the user ID and user password input through the mobile device, the ID of the external device, and generates a random number;

[0065] The external device encrypts the external device ID, the user ID and the random number using the pre-stored master key uniquely corresponding to the...

Embodiment 2

[0086] see figure 2 , which is a verification method flowchart of a method for verifying a user ID and an external device, including steps:

[0087] S201: The external device connected to the mobile device requests to perform a service operation.

[0088] After the binding, every time the external device connected to the mobile device is used to request a business operation, the external device will send the external device ID and user ID to the background system through the connected mobile device.

[0089] S202: The background system receives the external device ID and the user ID sent by the external device.

[0090] S203: The background system compares the received external device ID and user ID with the bound and stored external device ID and user ID.

[0091] S204: Only when the comparison results are consistent, the background system allows the external device to use the mobile device to perform business operations.

[0092] It can be seen from the second embodiment...

Embodiment 3

[0094] This embodiment mainly describes the binding of the user ID and the external device.

[0095] see image 3 , which is another binding method signaling diagram of a method for binding a user ID with an external device, including steps:

[0096] For details of S301 to S304, please refer to S101 to S104 in Embodiment 1.

[0097] The difference is that, after the comparison results in step S304 are consistent, the background system does not perform the binding operation, but directly enters S305.

[0098] S305: The background system sends the specific parameter and the third encrypted value to the external device connected to the mobile device.

[0099] The specific parameter is a random number generated by the background system or a related parameter bound to the corresponding relationship between the external device ID and the user ID.

[0100] The third encrypted value is obtained by the background system by encrypting the external device ID, user ID and specific para...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a method for binding and verifying a user ID with an external device, including the steps: when the external device accesses the mobile device for the first time, the external device sends the external device ID, user ID, user password, and random number and the first encrypted value to the background system; the background system encrypts the received data through the master key corresponding to the external device ID to obtain a second encrypted value; compare the first encrypted value and the second encrypted value, if Consistently, the background system binds and stores the corresponding relationship between the external device ID and the user ID. It can be seen that the present invention binds the user ID when the external device is connected to the mobile device for the first time, and then every time the external device is used for business operations, it is necessary to verify the user ID input by the connected mobile device. verification, so that only by entering the bound user ID can the external device be used for business operations, thereby greatly improving the security of the external device.

Description

technical field [0001] The invention relates to the field of binding and verification, in particular to a method for binding and verifying a user ID and an external device. Background technique [0002] With the development of mobile payment, more and more people use external devices for mobile payment, and these external devices include audio mobile payment devices, USB devices and other devices that can be connected with mobile devices. After the user uses an external device on the mobile device for business operations, if the external device is lost and occupied by other people, and the user fails to report the loss in time, others can use the external device to pretend to be the original user through simple technical means Perform business processing on the original user's account, which will cause unnecessary losses to the user's funds. [0003] That is to say, how to ensure the safety of the external device, that is, how to ensure that the external device is used lega...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/32
Inventor 燕宜军庞林娟邱鹍白婧
Owner BEIJING WATCH DATA SYST