Identity verification method and apparatus
An identity verification method and an identity verification technology, which are applied in the field of identity verification methods and devices, can solve problems such as low security, and achieve the effects of improving security and solving low security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] The network architecture of the embodiment of the present application includes: a vehicle-mounted terminal, a handheld terminal, and a server, wherein the vehicle-mounted terminal, the handheld terminal, and the server are connected to each other for information exchange.
[0036] In this embodiment, an identity verification method running on the above-mentioned network architecture is provided, figure 1 is a flowchart of an identity verification method according to an embodiment of the present invention, such as figure 1 As shown, the process includes the following steps:
[0037] Step S102, using short-range communication technology to establish a binding relationship with the vehicle-mounted terminal;
[0038] Step S104, requesting the vehicle-mounted terminal to use a symmetric key to authenticate the handheld terminal; wherein, the binding relationship is a one-to-one correspondence between the vehicle-mounted terminal and the handheld terminal.
[0039] Through ...
Embodiment 2
[0078] An identity verification device is also provided in this embodiment, and the device is used to implement the above embodiments and preferred implementation modes, and what has been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0079] Figure 5 is a structural block diagram of an identity verification device according to an embodiment of the present invention, such as Figure 5 As shown, the device includes:
[0080] Establishing a module 50, configured to establish a binding relationship with the vehicle-mounted terminal using short-distance communication technology;
[0081] The request module 52 is used to request the vehicle-mounted terminal to use a sy...
Embodiment 3
[0095] This embodiment is an optional embodiment of the present invention, and is used for detailed and supplementary description of the scheme of the present application:
[0096] The technical problem to be solved in this embodiment is: to overcome the limitation of relying on wireless network and low security existing in related technologies, to provide a virtual key solution based on dynamic password, to realize the uniqueness of identity verification, and to improve the verification efficiency. confidentiality.
[0097] Uniqueness refers to the one-to-one correspondence between the vehicle-mounted terminal and the APP (application program) of the handheld terminal through the public key infrastructure (Public Key Infrastructure, PKI) architecture, that is, the APP of a certain handheld terminal can only control a certain vehicle-mounted terminal. It is impossible to control multiple vehicle-mounted terminals, thereby avoiding the scenario that once a certain handheld term...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com