Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode

A two-dimensional barcode, identity authentication technology, applied in the direction of user identity/authority verification, computer parts, character and pattern recognition, etc., can solve the problems of authentication information interception, easy imitation and stealing of authentication features, etc., to achieve high security , the effect of reducing the ambiguity of the connection object and reducing the possibility

Inactive Publication Date: 2006-05-24
DALIAN UNIV OF TECH
View PDF0 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The purpose of the present invention is to provide a convenient, practical, highly versatile, efficient and safe identity authentication method to solve the existing identity system that requires users to carry additional certificates or equipment, authentication features are easy to be imitated, and authentication information may be intercepted , theft and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode
  • Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode
  • Real-time identity authentication method based on mobile phone, bluetooth and two-dimensional barcode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] Such as Figure 11 , which provides an embodiment of the present invention used in the access control system.

[0068] The hardware device on the server side of the access control system consists of a PC that can run WindowsXP SP2 or above, a Bluetooth communication module compatible with WindowsXP SP2 Bluetooth driver, and a camera. The server software of the identity authentication system is installed on the PC.

[0069] The client of this access control system is any mobile phone that supports Bluetooth and has a screen resolution greater than 50×50, including smart phones running Symbian, Windows, and Linux systems, CDMA mobile phones that support Brew platform, and other phones that support JSR82 API, that is, Java APIs A mobile phone for Bluetooth Wireless Technology (JABWT). The client program corresponding to the corresponding platform needs to be installed on the mobile phone. This example takes a mobile phone using the Symbian system as an example.

[0070...

Embodiment 2

[0077] Such as Figure 12 , provides an embodiment of the present invention using a shopping mall consumption system connected with a bank. Its process is similar to the above-mentioned embodiment 1, the difference is:

[0078] The user registers with the bank and obtains the service ID number from the bank. The service ID number of the consumer system is only used to distinguish different banks. The same bank has the same service ID number in the consumer systems of all shopping malls. Users can choose the bank service they want to use on the mobile phone.

[0079] When the mall verifies user information, it obtains the MD5-encrypted static key from the bank server through the bank network, that is, the above-mentioned string B. The mall does not keep relevant information about users. If the information verification is successful, the consumption activity is completed through the bank network.

[0080] Cancellation can be canceled through various methods such as online ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method for authenticating ID is related to handset, blue teeth communication technique and 2D bar code technique synthetically. Characters are that using blue teeth function of handset builds connection with server; using cipher key agreed on user in advance encrypts dynamic cipher generated by server, and transfers the encrypted dynamic cipher to handset; handset converts the decrypted dynamic cipher to information of 2D bar code, and displays the bar code on screen of the handset; server end uses camera header to take image of handset screen so as to recognize information of 2D bar code, and interpret the dynamic cipher contained; matching dynamic cipher from screen with dynamic cipher created before to authenticate userí»s ID. Advantages are: without need of carrying certificate, not easy of imitating features of authentication, solving issue of capturing and stealing information of authentication.

Description

technical field [0001] The invention belongs to the technical field of information security identity authentication, and relates to an identity authentication method using a mobile phone and comprehensively utilizing bluetooth communication technology and two-dimensional barcode technology. Background technique [0002] Two-dimensional barcode is a new type of barcode technology. In addition to the traditional advantages of one-dimensional barcode, such as simple production, low cost, and fast information collection speed, it also has high density, error correction capability, large amount of information, and strong security. Multiple advantages. At present, from the perspective of image composition, there are three types of two-dimensional barcodes: stacked, checkerboard, and matrix. Two-dimensional barcodes have been widely used internationally, and national standards for PDF417 and QR codes have also been formulated in China. [0003] At present, as a common personal po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K9/00H04B5/00H04L9/00H04Q7/32
Inventor 冯林袁彬孙焘吴炎飞
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products