Identity recognition method, terminal and wearable device

A technology of identity recognition and wearable devices, applied in the security field, can solve problems such as inability to log in, forget passwords, etc., and achieve the effect of improving convenience and ensuring security

Active Publication Date: 2019-02-22
FUJIAN LANDI COMML EQUIP CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: the present invention provides an identification method, a terminal and a wearable device, which can solve the problem that the account password has not been used for a long time, and the problem of being unable to log in due to forgetting the password when logging in again

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method, terminal and wearable device
  • Identity recognition method, terminal and wearable device
  • Identity recognition method, terminal and wearable device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0147] Please refer to figure 1 , Embodiment 1 of the present invention is:

[0148] The present invention provides a kind of identification method, comprises the following steps:

[0149] S1: Establish a binding relationship with a preset device;

[0150] Wherein, the S1 is specifically:

[0151] S11: Establish a communication connection with the device;

[0152] S12: Send a first request corresponding to obtaining device identity information to the device, so that the device randomly generates a first ID number and a second ID number respectively;

[0153] S13: Receive the identity information sent by the device, where the identity information includes a first ID number, a second ID number, and a device ID number;

[0154] S14: Send the identity information and the second request corresponding to establishing a binding relationship with the device to the server, so that the server can judge whether the device has completed the binding operation according to the device ID...

Embodiment 2

[0166] Please refer to figure 2 , the second embodiment of the present invention is:

[0167] The present invention provides a kind of identification method, comprises the following steps:

[0168] S1: Establish a binding relationship with a preset terminal;

[0169] Wherein, the S1 is specifically:

[0170] S11: Establish a communication connection with the terminal;

[0171] S12: After receiving the first request corresponding to the acquisition of device identity information sent by the terminal, randomly generate a first ID number and a second ID number respectively;

[0172] S13: Obtain a local IP as a preset ID number; generate identity information according to the first ID number, the second ID number, and the preset ID number;

[0173] S14: Send the identity information to the terminal, so that the terminal sends the identity information and the second request corresponding to the binding operation to the server, so that the server can judge the preset ID number a...

Embodiment 3

[0193] Please refer to image 3 , Embodiment three of the present invention is:

[0194] The present invention provides an identification terminal, comprising a first memory 1, a first processor 2 and a computer program stored on the first memory 1 and operable on the first processor 2, the first processor 2 The following steps are implemented when the computer program is executed:

[0195] S1: Establish a binding relationship with a preset device;

[0196] Wherein, the S1 is specifically:

[0197] S11: Establish a communication connection with the device;

[0198]S12: Send a first request corresponding to obtaining device identity information to the device, so that the device randomly generates a first ID number and a second ID number respectively;

[0199] S13: Receive the identity information sent by the device, where the identity information includes a first ID number, a second ID number, and a device ID number;

[0200] S14: Send the identity information and the seco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity recognition method, a terminal and a wearable device. The identity recognition method comprises the following steps: establishing a binding relationship with presetequipment; and when identity verification is carried out, acquiring an equipment ID number sent by the equipment, and sending the equipment ID number to a server, so that the server sends identity verification request information corresponding to the equipment ID number to the equipment, and performing identity verification by the equipment through the identity verification request information. According to the identity recognition method provided by the invention, when the identity verification is carried out, only the equipment ID number needs to be obtained from the preset equipment, and the equipment ID number is sent to the server, so that the server generates the identity verification request information corresponding to the equipment ID number and sends the identity verification request information to the equipment, so that the equipment performs the identity verification according to the identity verification request information, thus the problem that an account password is notused for a long time and login cannot be carried out due to the fact that the password is forgotten, and the login safety is effectively guaranteed.

Description

technical field [0001] The invention relates to the field of security technology, in particular to an identification method, a terminal and a wearable device. Background technique [0002] At present, many mobile applications, especially those involving payment, need to register user accounts and set passwords for identification, such as various bank APPs, Alipay APPs, JD APPs, and railway 12306. For security reasons, many users set different passwords for different app accounts, but they often find that an app has forgotten their personal login information when it has not been used for a long time, so it is difficult to manage multiple account passwords. development, the problem is getting worse. [0003] The easiest solution to this problem is to record the personal login information in clear text in a notebook or store it on an electronic device, which is obviously unsafe and inconvenient to manage. Contents of the invention [0004] The technical problem to be solved...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W76/10
CPCH04L63/0876H04W76/10
Inventor 苏金塔曾德炎
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products