Detailed Description
In order to make the objects, technical features and implementation effects of the present invention clearer, the technical solutions of the present invention will be described in detail with reference to the accompanying drawings and specific embodiments. In the embodiment provided by the invention, the interaction of the authentication information is realized between the mobile terminal and the server for authentication, and the existing wireless non-contact technology is replaced. Namely, firstly, the service logic is integrated in the mobile terminal, and then the data file containing the key information is placed in the mobile terminal or is acquired by the mobile terminal through the network. The mobile terminal service logic converts the key information into static or dynamic authentication information through a certain service logic algorithm, and the Server (Server) end acquires the authentication information through different methods and extracts the key information from the authentication information to perform authentication processing.
At the mobile terminal, business logic needs to be set firstly, and for the mobile terminal which is already on the market, programmed business logic can be provided for optimization, and patches are installed to save cost; for the mobile terminal which is not on the market, the service logic can be realized in an integrated chip and integrated into the mobile terminal.
On one side of the mobile terminal, the embodiment of the invention provides:
a method for realizing authentication of a mobile terminal comprises the following steps: receiving key information; synthesizing the key information into authentication information according to a predetermined algorithm; and outputting the authentication information to a server.
The mobile terminal which can be used for authentication and has richer functions is provided for the user, the user does not need to carry too many non-contact cards, and the trouble caused by carrying various non-contact cards is avoided.
As shown in fig. 1, taking the authentication information as image information as an example, the method includes the following steps:
andstep 201, the mobile terminal reads the data file stored with the key information, or the mobile terminal is connected with a network to obtain the data file stored with the key information.
If the mobile terminal opens the data service, the mobile terminal can select to connect with the network and then download the data file of the key information from the appointed website; meanwhile, certain safety measures are adopted in the pointed website, for example, a data file of key information can be downloaded only once, and the data file is connected by a Secure Socket Layer (SSL) and downloaded after logging in the designated website through an account password.
Step 202, when the user starts the authentication function of the mobile terminal, the key information in the data file is found or converted into matched image information; such as bar codes, two-dimensional codes, holographic pictures, etc.
The security and the sensitivity of key information are considered, and the key information can be converted into more complex image information; in order to avoid the image being printed, a dynamic image can be used for displaying, in the process that the key information is converted into the image information by the algorithm of the business logic, the difficulty of cracking the business logic or copying the image information is increased by combining parameters such as International Mobile Equipment Identity (IMEI) and time, and verification information is added.
If the dynamic image information is adopted, before the mobile terminal displays the image information corresponding to the key information, the appointed image is used as the starting information, and before the mobile terminal does not quit the current authentication process, the starting information and the dynamic image information are played circularly.
Andstep 203, receiving the response information of the server end, completing the current authentication process, or returning tostep 202 again.
Through the technical scheme provided by the embodiment of the invention, the mobile terminal forms the key information into the image information and provides the image information to the server, and the image information serving as the authentication information is not provided by using a non-contact card; the user does not need to carry too many non-contact cards, and the trouble caused by carrying various non-contact cards is avoided.
Those skilled in the art will appreciate that all or part of the steps in the method for implementing the above embodiments may be implemented by using a program to instruct related hardware, where the program may be stored in a storage medium readable by a mobile terminal, and when executed, the program includes the steps in the above method embodiments, and the storage medium includes, for example: SD card, memory chip, etc.
Corresponding to the above method, as shown in fig. 2, the present invention also provides an apparatus of a mobile terminal, including:
a keyinformation loading unit 101, configured to receive a data file containing the key information from a network through a port of a mobile terminal or the mobile terminal that has opened a data service.
And aninformation synthesizing unit 102, configured to synthesize the key information into the authentication information according to a predetermined algorithm.
An authenticationinformation output unit 103, configured to output authentication information. The authentication information at least comprises image information and audio information.
Wherein, theinformation synthesizing unit 102 may be:
an image information synthesizing unit 1021 for synthesizing the key information into final image information according to a predetermined image synthesis algorithm; the synthesized image information is sent as authentication information to the authenticationinformation output unit 103. For example, the atomic images stored in advance may be combined into a complete picture by an image combining algorithm to be used as a concrete representation of the image information.
It should be further explained that the above embodiments provide a method for performing authentication by loading key information with image information; the same is also true if the key information is loaded into the audio information, in which case theinformation synthesis unit 102 may also be:
an audio information synthesizing unit 1022 for synthesizing the key information into final audio information according to a predetermined audio synthesis algorithm; the synthesized audio information is sent to the speaker 1032 as authentication information.
A moving image editing unit 1023 for synthesizing the key information into a moving image as authentication information according to an existing predetermined moving image synthesis algorithm. The specific algorithm for synthesizing the moving picture can generally adopt the existing technology, such as the technology for making the moving picture in the GIF format.
The authenticationinformation output unit 103 may specifically be:
and a display screen 1031 for displaying the image information in the authentication information. Or,
a speaker 1032 is provided for outputting audio information, which is a particular form of authentication information.
An authentication information output port 1033 for outputting the authentication information in the form of a data stream or frame or data file.
The mobile terminal further includes:
and theserver authentication unit 104 is configured to extract the server key information in the server authentication information after acquiring the server authentication information of the server, and complete verification of the server key information.
And a feedback information receiving unit 114, configured to complete a current authentication process according to the feedback information from the server.
Through the technical scheme provided by the embodiment of the invention, the mobile terminal forms the key information into the authentication information and provides the authentication information to the server, and the image information serving as the authentication information is not provided by using a non-contact card; moreover, the output mode to the server is various, and the output mode can be output in a mode which can be sensed by the user, and also can be output in a digital mode, so that the user does not need to carry too many non-contact cards, and the trouble caused by carrying various non-contact cards is avoided.
At a Server (Server), an embodiment of the present invention provides a Server, as shown in fig. 4, including:
an authenticationinformation obtaining unit 701 configured to obtain authentication information from a mobile terminal;
and theserver authentication unit 703 is configured to extract key information in the authentication information, and complete verification of the key information.
The authenticationinformation obtaining unit 701 may specifically be:
and a camera 7011 for capturing image information on the display screen 1031 of the mobile terminal. Or,
a microphone 7012 for receiving audio information from the mobile terminal.
An authentication information input port 7013 is configured to obtain authentication information transmitted in a data stream or frame or data file according to a corresponding protocol.
The mobile terminal may further include:
and aserver authentication unit 703, configured to extract key information in the image information, and verify the correctness of the key information. The method specifically comprises the following steps:
if the mobile terminal supports authentication with audio information, theserver authentication unit 703 in the server should correspondingly be:
a server image authentication unit 7031, configured to, when the authentication information from the mobile terminal is image information, extract key information in the image information, and verify the key information.
Or,
the server audio authentication unit 7032 is configured to, when the authentication information from the mobile terminal is audio information, extract key information in the audio information and verify the key information.
The server may further include:
an image information verification unit 702 for verifying the captured image information.
And the prompting unit 704 is used for notifying the mobile terminal after the authentication is completed or when an error occurs in the authentication process.
As shown in fig. 3, corresponding to the device of the mobile terminal, the embodiment of the present invention provides an authentication method on the server side, still using image information as a specific implementation manner of the authentication information, and the specific flow includes:
and 301, the server acquires image information through the camera.
In different systems, the server can select cameras with different resolutions to acquire the image information of the mobile terminal according to the service scene and the preset conditions.
Step 302, judging whether the image information meets a preset condition, and turning to step 303 if the image information meets the condition;
if the condition is not met, the camera periodically collects the image information and performs the preliminary identification, so the process returns to step 301 to continue to collect the image information in the next period.
And 303, extracting key information contained in the image information through corresponding algorithm logic.
Because the requirements for the confidentiality degree of key information are different in different systems or different service scenes, the algorithm logic is a replaceable part and can be defined in different systems respectively according to needs.
And 304, judging whether the extracted key information is valid, if so, turning to thestep 305, otherwise, turning to thestep 301.
And 305, starting to authenticate the key information.
And step 306, finishing the current authentication, and giving prompt information to the mobile terminal in a mode of sound or a display screen and the like.
Those skilled in the art will appreciate that all or part of the steps in the method according to the above embodiments may be implemented by a program, which is stored in a server-readable storage medium and includes the steps of the above method embodiments when the program is executed, and the storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The technology provided by the invention is not only suitable for scenes with low safety requirements such as opening of door access, various certificates and common payment, but also provides different various embodiments aiming at scenes with high confidentiality requirements or related funds.
In the bidirectional authentication technology provided by the embodiment of the invention, on one hand, the information of the mobile terminal can be counterfeited or cracked; on the other hand, the Server can be counterfeited, and the mobile terminal also needs to verify the legality of the Server, so that the double authentication is used in the occasions with higher safety requirements, after the double authentication is adopted, the flow of processing by the camera at the side of the mobile terminal is increased, the image information of the mobile terminal is not only sent to the Server, but the interaction of data is increased between the mobile terminal and the Server; for example, the key information may be encrypted by a random number and then transmitted, and both sides may determine whether the encrypted key information matches each other by using the same algorithm, thereby determining whether the key information matches each other.
Still regard picture information as the particular implementation of authentication information; a mobile terminal as a mobile terminal, comprising:
firstly, business logic needs to be set, and the mobile terminal which is on the market can provide programmed business logic for optimization so as to save cost; for the mobile terminal which is not on the market, the service logic can be realized in an integrated chip and integrated into the mobile terminal.
And step 401, the mobile terminal reads the data file stored with the key information, or connects to a network to obtain the data file stored with the key information.
If the mobile terminal opens the data service, the mobile terminal can select to connect with the network and then download the data file of the key information from the appointed website; meanwhile, certain safety measures are adopted in the pointed website, for example, a data file of key information can be downloaded only once, the data file is connected by adopting a safety socket layer protocol layer, and the data file is downloaded after logging in the designated website through an account password.
Step 402, finding or converting the key information in the data file into matched first image information; such as bar codes, two-dimensional codes, holographic pictures, etc.
The conversion into more complex first image information is possible in view of the confidentiality and sensitivity of the key information. In order to avoid the image being printed, a dynamic image can be used for displaying, in the process that the key information is converted into the first image information by the algorithm of the business logic, the difficulty of cracking the business logic or copying the first image information is increased by combining parameters such as international mobile equipment identity codes, time and the like, and the verification information is increased.
If the dynamic first image information is adopted, before the mobile terminal displays the first image information corresponding to the key information, the appointed image is used as starting information, and before the mobile terminal does not quit the current authentication process, the starting information and the dynamic first image information are played circularly.
Step 403, if the server verifies the first image information from the mobile terminal, then the second image information should be provided at the server end;
therefore, the mobile terminal side collects the second image information provided by the server and converts the second image information into second data.
And 404, operating on the second data, such as verifying the correctness of the second data.
Step 405, if the authentication result shows that the authentication is successful, step 406 is executed, otherwise step 402 can be executed.
Step 406, prompting that the current authentication process is completed.
The process of processing the camera at the mobile phone side is added, data interaction is mainly increased, and information of the mobile terminal is not simply sent to the Server.
Those skilled in the art will appreciate that all or part of the steps in the method for implementing the above embodiments may be implemented by using a program to instruct related hardware, where the program may be stored in a storage medium readable by a mobile terminal, and when executed, the program includes the steps in the above method embodiments, and the storage medium includes, for example: SD card, memory chip, etc.
Correspondingly, a plurality of unit modules can be added in the mobile terminal to complete the dual authentication function.
And the first camera 106 is configured to capture second image information of the server.
And an image information analyzing unit 107, configured to analyze the second image information and extract second data therein.
In the dual-authentication embodiment, at the Server (Server) side, the embodiment provided by the invention comprises:
and step 501, the server acquires first image information through a camera.
In different systems, the server can select different unit modules to acquire the first image information of the mobile terminal according to the service scene and the preset conditions.
Step 502. if the first image information meets the condition, the step 503 is switched to;
if the condition is not met, the camera periodically acquires the first image information and performs the preliminary identification, so the process returns to step 501 to continue to acquire the first image information in the next period.
And 503, extracting key information contained in the first image information through corresponding algorithm logic.
Because the requirements for the confidentiality degree of key information are different in different systems or different service scenes, the algorithm logic is a replaceable part and can be defined in different systems respectively according to needs.
And step 504, judging whether the extracted key information is valid, if so, turning to step 505, otherwise, turning to step 501.
And 505, processing the key information, if the key information is correct, displaying the second image information at one end of the server, and waiting for the response of the mobile terminal to the second image information.
Step 506, starting and completing subsequent service processing; and prompting the mobile terminal for specific information about authentication.
The development of upper layer commands can be made on the basis of the embodiment.
Correspondingly, a plurality of unit modules can be added in the server to complete the double authentication function.
A server image synthesizing unit 705 for synthesizing the identity authentication information of the server into the second image information.
Between the mobile terminal and the server, authentication information containing key information of the mobile terminal and the server is respectively provided for the other party, and the authentication information is not provided by using a non-contact card; the mobile terminal and the server which can be used for authentication and have richer functions are provided; and the user does not need to carry too many non-contact cards, thus avoiding the trouble caused by carrying various non-contact cards.
Those skilled in the art will appreciate that all or part of the steps in the method according to the above embodiments may be implemented by a program, which is stored in a readable storage medium of a server and includes the steps of the above method embodiments when the program is executed, and the storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The embodiment of the invention has the advantages that the mobile terminal provides image information or even audio information for authentication, and can simultaneously support a plurality of different systems by only installing a program of business logic on the basis of not changing hardware; and only the early development cost is low, the hardware cost is avoided, and the functions of the mobile terminal are richer.
It should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting, and all the values of the parameters can be adjusted according to the actual situation, and are within the scope of the claims. It will be understood by those skilled in the art that various modifications and equivalent arrangements may be made without departing from the spirit and scope of the present invention and shall be covered by the appended claims.