Implementation method of a watch token system, watch token system and device
A technology of a token system and an implementation method, which is applied in the field of information security, can solve the problems of easily leaking mobile phone token passwords, insufficient privacy, and restrictions on the convenience of tokens, and achieve the effect of safe dynamic authentication methods and expanded convenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] This embodiment provides a method for implementing a watch token system. Before the method is implemented, the mobile phone and the watch need to be bound. After the mobile phone and the watch are bound, the method includes the process of synchronizing seed data and generating OTP value (one-time password).
[0053] The implementation method of a watch token system provided in this embodiment includes: a process of synchronizing seed information between a mobile phone token application and a watch token application and a process of obtaining a one-time password by the watch token application. Such as Picture 1-1 , the seed information synchronization process between the phone token application and the watch token application includes:
[0054] Step A1, the watch token application generates a request to synchronize the seed information of the mobile phone;
[0055] Step A2, the watch token application sends a request for synchronizing the seed information on the mobile...
Embodiment 2
[0110] This embodiment provides a method for implementing a watch token system. Before the method is implemented, the mobile phone and the watch need to be bound. After the mobile phone and the watch are bound, the method includes the process of synchronizing seed data and generating OTP Value (one-time password) process, specifically, such as figure 2 As shown, the process of seed data synchronization includes:
[0111] Step 201, mobile phone token application (app) is installed;
[0112] Specifically, in this step, the mobile phone token application is selected from the app store, and the mobile phone token application is installed on the mobile phone.
[0113] Step 202, the mobile phone token application is activated, and when the mobile phone token application is activated, the token identification, activation code and activation password are obtained.
[0114] Specifically, the obtained token ID, that is, the tokenID is: 3620431500051, the activation code is: 450171002...
Embodiment 3
[0168] This embodiment provides a method for implementing a watch token system. Before the method is implemented, the mobile phone and the watch need to be bound. After the mobile phone and the watch are bound, the method includes the synchronization process of the seed index data and the watch The token application is the process of obtaining an OTP value (one-time password).
[0169] In this implementation, if Figure 4 As shown, the synchronization process of the seed index data specifically includes the following steps:
[0170] Step 201', the mobile phone token application is installed;
[0171] Specifically, in this step, the user selects the mobile phone token application from the app store, and installs the mobile phone token application on the mobile phone.
[0172] Step 202', the mobile phone token application is activated, and token identification, activation code and activation password are obtained.
[0173] Step 203', the mobile phone token application uses th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


