Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method based on Bluetooth and sound waves

A security authentication and sound wave technology, applied in the field of security authentication based on bluetooth and sound waves, can solve the problems of inconvenient authentication operation, communication failure, user authentication, etc., to protect user privacy and property security, ensure legality, Easy-to-use effects

Active Publication Date: 2018-11-27
咪付(广西)网络技术有限公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the NFC communication distance is less than 0.1m, the terminal with NFC payment function needs to be placed close to or close to the NFC card reader or payment acceptance terminal, and there is no verification of the user's identity, and the user cannot view the payment status at close range. Some criminals can use hidden payment receiving terminals to steal users' funds when users make payments, seriously threatening the security of users' funds
In addition, the NFC antenna is usually located on the back of the identity authentication mobile terminal. When the security product communicates with the identity authentication mobile terminal, it must be close to the back of the identity authentication mobile terminal, otherwise the communication will fail. It is obvious that the operation of the above identity authentication is not convenient.
Although NFC payment has its own security chip built in, if the mobile phone is lost, criminals can crack the user account information according to the security chip key, which will inevitably lead to the leakage or theft of consumer bank card information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method based on Bluetooth and sound waves

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] It should be noted that, in this embodiment, the mobile smart terminal used by the user is a terminal with a Bluetooth module such as a mobile phone and a PAD on the market today, and the payment acceptance terminal generally refers to an integrated Bluetooth module and a microphone module. The Bluetooth module of the payment acceptance terminal is used to broadcast Bluetooth data packets, and the microphone module is used to receive and respond to the sound ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security authentication method based on Bluetooth and sound waves. The method comprises steps: a user App sends a request to a server, the server generates a Token1 by computing a user ID and a key Key, and the Token1 is returned to the App; a payment acceptance terminal obtains a Token2 generated by computing of an incremental factor, a payment acceptance terminal serialnumber and the key from the server, and the Token2 and a data packet after site information is encrypted are broadcasted through the Bluetooth; the user App acquires the broadcasted data packet through scanning by the Bluetooth, the key Key is calculated according to the Token1, and the key Key is used to decrypt and verify the broadcasted data packet; after passing the verification, the user Appuses the above key Key to encrypt ticket information and the site information into a ciphertext, the ciphertext is then modulated into sound waves of a corresponding frequency, and the sound waves aresent to the payment acceptance terminal; and the payment acceptance terminal receives the sound waves to acquire the ciphertext, and a key Key is calculated through the Token2 for decryption and verification. Hidden security authentication dangers for an NFC technology can be solved, the Bluetooth payment security is improved, and the privacy and the property security of the user are protected.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to a safety authentication method based on bluetooth and sound waves. Background technique [0002] With the development and popularization of smart phones, people use mobile phones more and more frequently, and most people basically never leave their phones. The existing payment methods for identity authentication mobile terminals include pure software methods such as Alipay and WeChat payment, as well as audio, Bluetooth, and Apple mobile phone-type smart password keys, but the security is relatively low, and there are disadvantages such as cumbersome transaction operations and poor user experience. . At present, there are more and more devices based on the NFC protocol, which has gradually become a standard function of mobile terminals. NFC (Near Field Communication) is a short-range high-frequency wireless communication technology. However, since th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08G06Q20/32G06Q20/38
CPCG06Q20/327G06Q20/3821G06Q20/3825G06Q20/3827H04L9/0861H04L9/3236H04L9/3247H04L9/3297H04L63/0815
Inventor 代豪梁景策朱磊黄紫丞
Owner 咪付(广西)网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products