Control method and device for providing authentication through wireless key, and wireless key component

A control method and key technology, applied in wireless communication, wireless communication services, electrical components, etc., can solve problems such as weak security, inconvenience, and insecurity, and achieve the effect of simple management

Inactive Publication Date: 2017-01-04
李曙胜 +1
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, software, mobile terminals, smart terminals that require authentication and identity authentication, payment, ticketing, security checks, etc. Different terminals require different authentication keys and authentication methods, and the key forms are diverse, some are cards, some are key pendants, some are passwords, and some are fingerprint recognition, especially when logging in to different websites or systems through smartphones or tablets. Different passwords need to be entered; for example, bank ATM withdrawals, different banks may have different passwords, and too many passwords will easily cause memory confusion, resulting in multiple authentication failures, causing unnecessary trouble
Other authentication methods may be inconvenient, unsafe and many other factors. In particular, the process of entering the password is a manual operation, which takes time to move your fingers, and it will be very inconvenient to enter the password every time.
In addition, online micropayments are becoming more and more frequent, and the existing payment authentication methods are either not secure, or the authentication operation is cumbersome and time-consuming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method and device for providing authentication through wireless key, and wireless key component
  • Control method and device for providing authentication through wireless key, and wireless key component
  • Control method and device for providing authentication through wireless key, and wireless key component

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] The main solution of the embodiment of the present invention is: after obtaining the authentication request on the smart terminal, the smart terminal establishes a communication connection with the wireless key component, sends the authentication request to the wireless key component, and the wireless key component The authorization request obtains the corresponding key information stored locally in advance and returns it to the smart terminal. The smart terminal obtains the password corresponding to the account information from the key information and submits it to the object requiring authentication for the object to perform authentication. Reasonable Utilize the wireless communication component function of the smart terminal and the software extension function of the open system platform of the smart terminal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a control method and device for providing authentication through a wireless key, and a wireless key component. The method comprises the steps of obtaining an authentication request on a smart terminal, wherein the authentication request carries account information needing to be authenticated; sending the authentication request to the wireless key component after the smart terminal establishes communication connection with the wireless key component, and obtaining corresponding key information by the wireless key component according to the authentication request, wherein the corresponding key information which is pre-stored locally; obtaining a cipher corresponding to the account information from the key information and submitting the cipher to an object needing to be authenticated, thereby enabling the object to carry out authentication. According to the method, the device and the component, secure communication with the wireless key component is carried out by utilizing a built-in wireless communication assembly function of the mobile smart terminal and a software expansion function of an open system platform of the smart terminal reasonably, thereby realizing automatic authentication; authentication operation processes of related applications on the terminal are simplified; and the security of a private account of a user is improved.

Description

technical field [0001] The invention relates to the technical field of mobile terminals, in particular to a control method, device and wireless key component for providing authentication with a wireless key. Background technique [0002] At present, software, mobile terminals, smart terminals that require authentication and identity authentication, payment, ticketing, security checks, etc. Different terminals require different authentication keys and authentication methods, and the key forms are diverse, some are cards, some are key pendants, some are passwords, and some are fingerprint recognition, especially when logging in to different websites or systems through smartphones or tablets. Different passwords need to be entered; for example, bank ATM withdrawals, different banks may have different passwords, and too many passwords can easily cause memory confusion, resulting in multiple authentication failures and unnecessary troubles. Other authentication methods may be in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W4/00
Inventor 李曙胜方超
Owner 李曙胜
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products