Device authentication method and system

A technology for device authentication and authentication information, applied in the field of authentication, can solve problems affecting data security, password leakage, and inconvenient operation

Inactive Publication Date: 2017-03-15
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In addition, when performing authentication between a wearable device and a terminal, for example, when the wearable device is smart glasses, the existing authentication method usually requires the user to take off the smart glasses and enter a password or Other authentication information, such an operation is very inconvenient and the password input method is likely to cause password leakage, thus affecting data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device authentication method and system
  • Device authentication method and system
  • Device authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them.

[0023] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] refer to figure 1 As shown, it is a schematic diagram of an application environment for implementing the device authentication method and system of the present invention.

[0025] The application environment of the device authentication method and system of the present invention includes: a terminal 1 and a plurality of smart glasses 2 communicating with the terminal 1 through wireless communication technology.

[0026] In this e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device authentication method applied to a terminal. The device authentication method comprises the steps of establishing communication connection with smart glasses through NFC (Near Field Communication); generating authentication information and coding the authentication information into an NFC digital signal; sending the NFC digital signal to the smart glasses, wherein the smart glasses decodes the received NFC digital signal and senses the blink times of a user in a preset time period through a sensor; and receiving the blink times sent by the smart glasses, judging whether the blink times is the same to a preset value or not, and determining that the authentication is successful when the blink times is the same to the preset value. The invention also provides a device authentication system. According to the method and the system, the security authentication between the terminal and the smart glasses can be realized.

Description

technical field [0001] The invention relates to the technical field of authentication, in particular to a method and system for realizing device authentication. Background technique [0002] Wearable devices (for example, smart glasses) have gradually entered people's daily lives, and they have also begun to affect people's lifestyles and habits. Due to the limited hardware conditions of the wearable device, it needs to work together with other terminals (such as mobile devices such as smartphones and tablets) to process the private data recorded in the wearable device. Therefore, realizing security authentication of wearable devices and mobile devices is a key issue to ensure the development of wearable devices and guarantee user privacy. [0003] In addition, when performing authentication between a wearable device and a terminal, for example, when the wearable device is smart glasses, the existing authentication method usually requires the user to take off the smart glas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/00H04W12/06H04W12/47
CPCH04W4/80H04W12/06
Inventor 张大伟王世强
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products