Movatterモバイル変換


[0]ホーム

URL:


CN103905191A - Verification method applied to mobile terminal, mobile terminal and system - Google Patents

Verification method applied to mobile terminal, mobile terminal and system
Download PDF

Info

Publication number
CN103905191A
CN103905191ACN201210574312.4ACN201210574312ACN103905191ACN 103905191 ACN103905191 ACN 103905191ACN 201210574312 ACN201210574312 ACN 201210574312ACN 103905191 ACN103905191 ACN 103905191A
Authority
CN
China
Prior art keywords
mobile terminal
field communication
application
module
identifying information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210574312.4A
Other languages
Chinese (zh)
Inventor
顾大宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding LtdfiledCriticalAlibaba Group Holding Ltd
Priority to CN201210574312.4ApriorityCriticalpatent/CN103905191A/en
Publication of CN103905191ApublicationCriticalpatent/CN103905191A/en
Priority to HK14112994.5Aprioritypatent/HK1199569A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

The application provides a verification method applied to a mobile terminal, the mobile terminal and a system. The method comprises that a verification request of at least one application is received, and the verification request requires to utilize specific identification information matching the mobile terminal to perform verification; based on the verification request, a near-field communication function is utilized to acquire second identification information stored in a near-field communication device within a certain distance near the mobile terminal; and whether the second identification information is the specific identification information is verified, and a verification result is returned to the application. With adoption of the application, various complex input problems in the prior art that account numbers, passwords and verification codes are needed in application verification can be solved.

Description

Be applied to verification method, mobile terminal and system in mobile terminal
Technical field
The application relates to communication field, relates in particular to a kind of verification method, mobile terminal and system being applied in the mobile terminal with near field communication (NFC) function.
Background technology
Along with the development of the communication technology, the function of various mobile terminals is more and more, and also from strength to strength, especially mobile phone, has developed into the smart mobile phone stage that can compare favourably with computer at present.The various application of developing for various mobile phones also emerge in an endless stream, and have the many application that can only pass through in the past computer log and use, in the mobile terminals such as mobile phone, also can use.In the time that user uses the application on mobile phone, often need to carry out various verification operations, login account, input payment cipher etc. when inputting account, shopping online need to input the login of unlock password, account during as mobile phone screen locking time and paying, operate more loaded down with trivial details, and need user to remember password, add when mobile phone itself is sometimes unblanked or checks oneself privacy information and also need to input password, the password that user need to remember is also more and more.And when user's mobile phone is lost accidentally, the password that is also likely cracked, causes the loss of personal property.
Summary of the invention
The application's main purpose is to provide a kind of verification method, is applied in the mobile terminal with near field communication (NFC) function, need to carry out the various loaded down with trivial details input problems such as account, password, identifying code to solve when application that prior art exists is verified.The method comprises: receive the checking request of at least one application, wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify; Based on described checking request, utilize described near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of described mobile terminal; And verify whether described the second identifying information is described identification information specific, and the result is returned to described application.
According to the application's embodiment, in the method, the coverage of the near-field communication that described certain distance is described mobile terminal.
According to the application's embodiment, in the method, if described the second identifying information is described identification information specific, the result being proved to be successful is returned to described application; If described the second identifying information is not described identification information specific, the result of authentication failed is returned to described application.
According to the application's embodiment, in the method, described in be applied in and carry out described checking before, be set to allow to utilize the identification information specific of mating with described mobile terminal to verify; And the verification mode of described application is set to utilize the identification information specific of mating with described mobile terminal to verify.
According to the application's embodiment, in the method, described identification information specific is the unique identifying information mating with described mobile terminal.
According to the application's embodiment, in the method, based on described checking request, utilize described near field communication (NFC) function to obtain near store in the near-field communication equipment in certain distance described mobile terminal the second identifying information and comprise: detect the near-field communication equipment in the coverage of near-field communication of described mobile terminal; Read the second identifying information of storing in described near-field communication equipment.
According to the application's embodiment, in the method, described application comprises one or more in following application: the account of application program logs in release, the privacy information of checking, described mobile terminal and checks, payment information is verified; And described application is the application in described mobile terminal.
The application on the other hand in a kind of mobile terminal is provided, comprising: request receiving module, for receiving the checking request of at least one application, wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify; Near-field communication module, for based on described checking request, utilizes described near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of described mobile terminal; Information Authentication module, for verifying whether described the second identifying information is described identification information specific; Result is returned to module, for the result of described Information Authentication module is returned to described application.
According to the application's embodiment, in this mobile terminal, the coverage of the near-field communication that described certain distance is described mobile terminal.
According to the application's embodiment, in this mobile terminal, if described the second identifying information is described identification information specific, the result being proved to be successful is returned to described application; If described the second identifying information is not described identification information specific, the result of authentication failed is returned to described application.
According to the application's embodiment, in this mobile terminal, described identification information specific is the unique identifying information mating with described mobile terminal.
According to the application's embodiment, in this mobile terminal, described near-field communication module comprises: detection sub-module, for detection of the near-field communication equipment in the near-field communication coverage of described mobile terminal; Reading submodule, the identifying information of storing for reading described near-field communication equipment.
According to the application's embodiment, in this mobile terminal, also comprise: request module, in the time receiving described checking request, sends call request to described near-field communication module; Acquisition of information module, for obtaining to described near-field communication module the identifying information that described near-field communication equipment is stored; Described near-field communication module further comprises: receive submodule, for receiving the call request from described request module; Return to submodule, for described identifying information being returned to described acquisition of information module.
According to the application's embodiment, in this mobile terminal, described application comprises one or more in following application: the account of application program logs in release, the privacy information of checking, described mobile terminal and checks, payment information is verified; And described application is the application in described mobile terminal.
In addition, the application also provides a kind of mobile terminal system, comprise: the mobile terminal and the near-field communication equipment that is independent of described mobile terminal with near field communication (NFC) function, wherein, described mobile terminal comprises: request receiving module, for receiving the checking request of at least one application, wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify; Near-field communication module, for based on described checking request, utilizes described near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of described mobile terminal; Information Authentication module, for verifying whether described the second identifying information is described identification information specific; Result is returned to module, for the result of described Information Authentication module is returned to described application; And wherein, described near-field communication equipment, is configured to store described the second identifying information.
Compared with prior art, according to the application's technical scheme, can solve the application that prior art exists and need to carry out the various loaded down with trivial details input problems such as account, password, identifying code while verifying.The application can be used for the various application in mobile terminal, comprises that the account login of application program and checking, the release of mobile terminal, privacy information are checked, payment information checking etc., can prevent well the password problem causing that is cracked.And, can also be used for strengthening the fail safe of payment verification.Because the mobile terminal in the application and the near-field communication equipment that is independent of described mobile terminal mate based on hardware view, therefore, can also solve hand-set from stolen time, the application login account associated with phone number abused because of the password that is cracked, and the privacy information problem of being stolen a glance at.And, Authentication Questions also can carry out brush machine, software installation or unloading for mobile terminal time.
Brief description of the drawings
Accompanying drawing described herein is used to provide further understanding of the present application, forms the application's a part, and the application's schematic description and description is used for explaining the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the flow chart of the verification method that relates to of the embodiment of the present application;
Fig. 2 is the particular flow sheet of step S102 in Fig. 1 of the embodiment of the present application;
Fig. 3 is the block diagram of themobile terminal 300 that relates to of the embodiment of the present application;
Fig. 4 is the block diagram of the mobile terminal system that comprisesmobile terminal 400 and near-field communication equipment 500 that relates to of the embodiment of the present application.
Embodiment
The application's main thought is to provide a kind of verification method, need to carry out the various loaded down with trivial details input problems such as account, password, identifying code to solve when application that prior art exists is verified.
For making the application's object, technical scheme and advantage clearer, below in conjunction with drawings and the specific embodiments, the application is described in further detail.
According to the application's embodiment, a kind of verification method is provided, be applied in the mobile terminal with near field communication (NFC) function.With reference to figure 1, Fig. 1 is the flow chart of the verification method that relates to of the embodiment of the present application.
As shown in Figure 1, in step S101, when the operating system of mobile terminal receives the checking request of at least one application, this checking request requires to utilize the identification information specific of mating with described mobile terminal to verify.More particularly, this identification information specific can be a string character, it can be the general unique identifier (uuid) with height uniqueness that utilizes security algorithm to generate, can be stored in a near-field communication equipment that is independent of this mobile terminal, and this near-field communication equipment is the relation of corresponding and coupling one by one by this identification information specific with this mobile terminal with near field communication (NFC) function.
Mobile terminal in the present embodiment can be for having the mobile terminal of near field communication (NFC) function, include but not limited to the equipment such as mobile phone, portable computer, panel computer, related near field communication (NFC) function can include but not limited to wireless near field communication (nfc) function, radio-frequency (RF) identification (rfid) function.This mobile terminal is opening when near field communication (NFC) function, can obtain canned data in the near-field communication equipment in the certain distance of its near-field communication.As previously mentioned, this mobile terminal, a corresponding uniquely near-field communication equipment that matches.Preferably, the certain distance of described near-field communication is the coverage of the near-field communication of described mobile terminal.
Should store the identification information specific of mating with this mobile terminal with the unique near-field communication equipment mating of mobile terminal, this identification information specific is also the unique identifying information mating with this mobile terminal, it can be specifically a string character, for example general unique identifier (uuid), this near-field communication equipment is to utilize the nfc equipment that nfc technology communicates or the rfid equipment that utilizes rfid technology to communicate corresponding to this mobile terminal, it specifically can be a card, and can there be various shapes, for example circle, ellipse, rectangle, square etc.The hardware based aspect of this near-field communication equipment is made, in the time making, once blow and recorded the identifying information unique with the mobile terminal of its pairing, in the time that user carries out the checking of a certain application, verify when a certain near-field communication equipment is the unique near-field communication equipment of certain terminal, be actually the whether unique information corresponding with this mobile terminal of the identifying information that records in this near-field communication equipment of checking.
In step S102, the checking request of the operating system of mobile terminal based on above-mentioned application, utilizes near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of mobile terminal; In the time that the operating system of mobile terminal receives the checking request of application, will open near field communication (NFC) function, with the identifying information near the near-field communication equipment obtaining.
As shown in Figure 2, first in step S201, mobile terminal detects near the near-field communication equipment it, namely detect the near-field communication equipment in the near-field communication coverage of this mobile terminal, detect after the appearance of near-field communication equipment, in step S202, mobile terminal will read the identifying information in this equipment.User may have two or more mobile terminals, so also can be furnished with accordingly two or more near-field communication equipments, because the near-field communication equipment mating with mobile terminal is one to one, that is to say, a corresponding also coupling of mobile terminal has and only has a near-field communication equipment, so, the operating system of mobile terminal also may get the information not being with self unique near-field communication equipment mating.
In step S103, verify whether described the second identifying information is described identification information specific, and the result is returned to described application; This second identifying information is exactly the identifying information of the detected near-field communication equipment storage of mobile terminal, namely mobile terminal is verified the identifying information in certain near-field communication equipment getting, verify that whether this identifying information is and its unique identification information specific of mating, if, illustrating that this near-field communication equipment and mobile terminal are unique mates, and the result being proved to be successful is returned to described application; If not, the result of authentication failed is returned to described application.
Described application can receive after the result, generate the corresponding prompting page according to the result, whether pass through checking with prompting user, if not by checking, application can generate the unsanctioned prompting page of checking, if by checking, this application step that can improve generates the page of prompting user next step operation.
The present embodiment a kind of mobile terminal, the block diagram that Fig. 3 is described mobile terminal be provided on the other hand.As shown in Figure 3:mobile terminal 300 can be for having the mobile terminal of near field communication (NFC) function, include but not limited to the equipment such as mobile phone, portable computer, panel computer, related near field communication (NFC) function can include but not limited to wireless near field communication (nfc) function, radio-frequency (RF) identification (rfid) function etc.In the time opening near field communication (NFC) function, can obtain canned data in the near-field communication equipment in near-field communication coverage.This coverage, for example, be 10cm, 20cm etc., and the coverage difference of different mobile terminal near-field communications, in general, depends on the performance of near-field communication equipment in this mobile terminal.Described mobile terminal can communicate with the near-field communication equipment that adopts Passive Mode, and mobile terminal is as the equipment that starts near-field communication.
This mobile terminal can also be furnished with one with its unique near-field communication equipment that is independent of this mobile terminal mating, and this mobile terminal, only corresponding unique near-field communication equipment that matches, in this near-field communication equipment, stored the unique identifying information of the coupling of mobile terminal, described identifying information can be general unique identifier (uuid).This near-field communication equipment can be the card of various shapes, or the entity of other shapes.Near-field communication equipment is made hardware based aspect, in the time making, once blows and has recorded the identifying information unique with the mobile terminal of its pairing.
Themobile terminal 300 with near field communication (NFC) function can comprise: request receivingmodule 301, near-field communication module 303,Information Authentication module 305, result are returned tomodule 306.
Wherein, request receivingmodule 301 can be for receiving the checking request of at least one application, and wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify.
Near-field communication module 303 can, for based on above-mentioned checking request, utilize near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of mobile terminal.
Information Authentication module 305 can be for verifying whether described the second identifying information is described identification information specific.
Result is returned tomodule 306 can be for returning to described application by the result of described Information Authentication module.
Near-field communication module 303 can comprisedetection sub-module 308 andreading submodule 309.
Wherein,detection sub-module 308 can be for detection of the near-field communication equipment in the near-field communication coverage of described mobile terminal.
Reading submodule 309 can be for reading the identifying information of storing in described near-field communication equipment.
Mobile terminal 300 can also compriserequest module 302 and acquisition ofinformation module 304.
Wherein,request module 302 can, in the time receiving described checking request, send call request to near-field communication module.
Acquisition ofinformation module 304 can be for obtaining the identifying information of storing in described near-field communication equipment to described near-field communication module.
Near-field communication module may further include and receivessubmodule 307 and return tosubmodule 310, wherein,
Receivingsubmodule 307 can be for receiving the call request from described request module.
Returning tosubmodule 310 can be for returning to described identifying information described acquisition of information module.
Mobile terminal in the mobile terminal system of the present embodiment can be the mobile terminal with nfc function, and near-field communication equipment is correspondingly nfc equipment.
Mobile terminal in the mobile terminal system of the present embodiment can be the mobile terminal with rfid function, and near-field communication equipment is correspondingly rfid equipment.
Be described as an example of the mobile terminal with nfc function example below.
When a certain application inmobile terminal 300 requires to the transmission ofmobile terminal 300 request that utilizes the identification information specific of mating with this mobile terminal to verify, when request receivingmodule 301 receives this request,request module 302 sends call request tonfc module 303, to call the checking request ofnfc module 303 based on above-mentioned application, utilize nfc function to obtain the second identifying information of storing in the nfc equipment near the certain distance of mobile terminal.
Nfc module 303 receives after this call request by receivingsubmodule 307,detection sub-module 308 detects near the nfc equipment it, when having after the appearance of nfc equipment in the nfc coverage detecting at this mobile terminal, read the second identifying information of storing in this nfc equipment byreading submodule 309, and by returning to submodule, this identifying information is returned to acquisition ofinformation module 304.
User may have two or more mobile terminals, will be furnished with accordingly two or more nfc equipment, so, the operating system of mobile terminal may get the identifying information not being with self unique nfc equipment mating, acquisition ofinformation module 304 gets tonfc module 303 after the identifying information of nfc equipment,Information Authentication module 305 is verified this identifying information, verify that whether the second identifying information of storing in described nfc equipment is and the unique identification information specific of mating ofmobile terminal 300, that is, the equipment that checking reads is and the unique corresponding nfc equipment of mobile terminal.If so, be proved to be successful, if not, authentication failed, after checking, result is returned tomodule 306 the result is returned to described application.If this identifying information is and the unique identification information specific of mating ofmobile terminal 300, the result being proved to be successful is returned to described application; If this identifying information is not and the unique identification information specific of mating ofmobile terminal 300, the result of authentication failed is returned to described application.
Application meeting is receiving after the result, generate the corresponding prompting page according to the result, whether pass through checking with prompting user, if not by checking, application can generate the unsanctioned prompting page of checking, if by checking, this application step that can improve generates the page of prompting user next step operation.
Nfc equipment can provide API development interface to the various application in mobile terminal, if application is trusted the fail safe of nfc device authentication, can be in the time generating this application, for this application arranges nfc device authentication mode (that is to say the mode of utilizing the identifying information of storing in this nfc equipment to verify).
The application can be used for the various application in mobile terminal, includes but not limited to that account login and checking, the release of mobile terminal, the privacy information of release after mobile phone screen locking, application program checked, payment information checking etc.For example, when using account, user logins a certain application, this is applied in developer has authorized nfc equipment while developing, i.e. this application can utilize the mode of the identifying information on checking nfc equipment to login, and user, in the time opening this application first, inputs oneself account and password and logins, after logining successfully, user just can, according to the hobby of oneself, arrange this application, i.e. personal settings; User can carry out the mode of login authentication or the mode that adopts account number cipher to login by setup and use nfc equipment in corresponding option, and, if this mobile terminal is mobile phone, user the login account of application can be set and the SIM card that uses at present number associated, SIM card also can be configured to associated with this mobile phone and nfc equipment, if user is configured such that and verifies with nfc equipment through the mode of login, in the time that user uses this application next time, just can use with the nfc device logs of the unique pairing of mobile phone and apply so.
Because being configured to use nfc equipment, this application before carries out login authentication, in the time that user opens this application, this application will be sent to system the request of checking nfc equipment, simultaneously, generate the verification tip page or eject accordingly verification tip, use nfc equipment to carry out login authentication with prompting user, or receive above-mentioned checking request when the system of mobile terminal, generate the verification tip page or eject accordingly verification tip by the operating system of mobile terminal.
Now, user only need to be according to prompting by nfc equipment near mobile phone, and in the operating system of mobile terminal, user's nfc equipment is verified, and the result is returned to application.
Application meeting is receiving after the result, generates the corresponding prompting page according to the result, if by checking, this application generates and logins successfully the page, and prompting user logins successfully, and a progressive step generates the page of next step operation of prompting user.If not by checking, application can generate checking not to be passed through, the prompting page of login failure.
The application can also be used for payment scheme, as the checking of the login of payment accounts and payment information, and can be used for strengthening the fail safe of payment verification.
In the time that developer pays the exploitation of application, nfc equipment is authorized, this application is set can utilize the verification mode of the identifying information on checking nfc equipment to login, user is in the time opening this payment application first, inputting oneself account and password logins, after logining successfully, can arrange this payment application, setup and use nfc equipment carries out the mode of login authentication or adopts the mode of account number cipher login, also can or confirm with regard to the checking of payment information that the checking of carrying out while payment arranges, this payment application is confirmed to the mode paying is configured such that the mode of verifying with nfc equipment or the mode that adopts password authentification.
If user is configured such that with nfc equipment and verifies through the mode of login, in the time that user uses this application next time, just can use this payment application of nfc device logs with the unique pairing of mobile phone so.If when the mode that pays application confirmation payment is also configured such that the mode of verifying with nfc equipment by user, when user has logined this payment application, while carrying out payment affirmation, this payment application will be sent to system the request of checking nfc equipment, and generate accordingly the verification tip page or eject accordingly verification tip, use nfc equipment to confirm the checking paying with prompting user, or when the system of mobile terminal receives above-mentioned checking request, generate the verification tip page or eject accordingly verification tip by the system of mobile terminal, now, user only need to be by nfc equipment near mobile terminal.
And in the operating system of mobile terminal, user's nfc equipment is verified, described payment application can receive after the result, generates the corresponding prompting page according to the result, if by checking, generates and pays the successful page; If, by checking, can not generate checking and not pass through, pay the failed prompting page.
Certainly, if user's nfc equipment lost because of carelessness, mode that can also choice for use password login.The step that a user selects can be set, in the time that user opens application, generate one and select the page, user can verify or use account number cipher to verify by choice for use nfc equipment.Or can use after nfc device authentication mode authentication failed user, generate an inquiry page, whether inquiry uses input pin mode again to verify.
User can also be configured such that by the double verification mode that accesses to your password and confirm after using nfc equipment to confirm the checking of identity or first use nfc equipment to verify after account number cipher login paying application, the mode that maybe pays the confirmation payment of application is set to the double verification mode of password authentification and nfc device authentication, in the time that carrying out payment affirmation, user need to first input payment cipher, re-using nfc equipment verifies, or first use nfc equipment to verify, input again password and confirm, can increase like this fail safe of payment.
The application can also be used for secret protection; in the time that developing, developer nfc equipment is authorized; check that privacy information can utilize the mode of the identifying information on checking nfc equipment to carry out release, user will want to protect Word message, voice messaging, picture/photo information or associated person information etc. to add in privacy information.User can be configured such that the mode of checking privacy information release and carry out release with nfc equipment; so in the time that user checks privacy information again; will generate the prompting page; prompting user uses nfc equipment to carry out release; simultaneously secret protection application also can be sent checking request to the system of mobile terminal, requires to utilize the identification information specific of mating with this mobile terminal year to unblank to verify.
Now, user only need to be by nfc equipment near mobile terminal.And in the system of mobile terminal, verify accordingly, and return to the result; secret protection application can receive after the result, generates the corresponding prompting page, if by checking according to the result; generate the release success page, and further open privacy information and check the page.If, by checking, can not generate checking and not pass through, the prompting page of release failure.Or can in the time being proved to be successful, not generate the prompting page yet, directly open privacy information and check the page, and just produce the unsanctioned prompting page of checking in the time of authentication failed.
The application also can be used for mobile terminal release, for example, when user's mobile phone mode of unblanking that is set to access to your password, or the start release that need access to your password is set, or use when SIM card and need to input unlock password, and these several modes all need to all be inputted one time password in the time unblanking at every turn, process is more loaded down with trivial details.Use the mobile terminal system in the application, the mode of utilizing near-field communication equipment to verify is verified and is unblanked, in the time that user wants to use this mobile terminal, by producing the button of the page of unblanking in described terminal, enter the application of unblanking when unblanking the page and send the request that uses nfc equipment to unblank checking to the system of mobile terminal, mobile terminal operating system can read and verify with the same nfc device identifying information to user of mode that pays application login as above-mentioned account login.
In addition, the application's mobile terminal and its unique corresponding near-field communication equipment be based on hardware view coupling, as mobile phone carries out that brush machine, software are installed or needs authentication when unloading, just can carry out after must using nfc device authentication.And after brush machine,, because of the matching relationship of cell phone system and hardware, other people do not have and the unique near-field communication equipment mating of mobile phone, still can not carry out certain operations, the problem that therefore can also solve hand-set from stolen time, privacy information is stolen a glance at.
The present embodiment also provides a kind of mobile terminal system, the block diagram that Fig. 4 is described mobile terminal system.Described mobile terminal system comprises: themobile terminal 400 and the near-field communication equipment 500 that is independent of described mobile terminal with near field communication (NFC) function.
This mobile terminal 400 can comprise: request receivingmodule 401, near-field communication module 403,Information Authentication module 405, result are returned tomodule 406.
Wherein, request receivingmodule 401 can be for receiving the checking request of at least one application, and wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify.
Near-field communication module 403 can, for based on above-mentioned checking request, utilize near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of mobile terminal.
Information Authentication module 405 can be for verifying whether described the second identifying information is described identification information specific.
Result is returned tomodule 406 can be for returning to described application by the result of described Information Authentication module.
Near-field communication module 403 can comprisedetection sub-module 408 and readingsubmodule 409.
Wherein,detection sub-module 408 can be for detection of the near-field communication equipment in the near-field communication coverage of described mobile terminal.Reading submodule 409 can be for reading the identifying information of storing in described near-field communication equipment.
Mobile terminal 400 can also compriserequest module 402 and acquisition ofinformation module 404.
Wherein,request module 402 can, in the time receiving described checking request, send call request to near-field communication module.Acquisition ofinformation module 404 can be for obtaining the identifying information of storing in described near-field communication equipment to described near-field communication module.
Near-field communication module may further include and receives submodule 407 and return tosubmodule 410.
Wherein, receivingsubmodule 407 can be for receiving the call request from described request module.Returning tosubmodule 410 can be for returning to described identifying information described acquisition of information module.
Be independent of the near-field communication equipment near-field communication equipment 500 of this mobile terminal, can be configured to store described the second identifying information.
Although it should be noted that some modules or the submodule of having mentioned equipment in above-detailed, this division is not enforceable.In fact,, according to the application's execution mode, the feature of above-described two or more modules and function can be specialized in a module.Otherwise, the feature of an above-described module and function can Further Division for to be specialized by multiple modules.
In addition, although described in the accompanying drawings the operation of the application's method with particular order,, this not requires or hint must be carried out these operations according to this particular order, or the operation shown in must carrying out all could realize the result of expecting.
The embodiment that the foregoing is only the application, is not limited to the application, and for a person skilled in the art, the application can have various modifications and variations.All within the application's spirit and principle, any amendment of doing, be equal to replacement, improvement etc., within all should being included in the application's claim scope.

Claims (15)

CN201210574312.4A2012-12-262012-12-26Verification method applied to mobile terminal, mobile terminal and systemPendingCN103905191A (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
CN201210574312.4ACN103905191A (en)2012-12-262012-12-26Verification method applied to mobile terminal, mobile terminal and system
HK14112994.5AHK1199569A1 (en)2012-12-262014-12-26Method applied to mobile terminal, mobile terminal and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201210574312.4ACN103905191A (en)2012-12-262012-12-26Verification method applied to mobile terminal, mobile terminal and system

Publications (1)

Publication NumberPublication Date
CN103905191Atrue CN103905191A (en)2014-07-02

Family

ID=50996348

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201210574312.4APendingCN103905191A (en)2012-12-262012-12-26Verification method applied to mobile terminal, mobile terminal and system

Country Status (2)

CountryLink
CN (1)CN103905191A (en)
HK (1)HK1199569A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104301110A (en)*2014-10-102015-01-21刘文清Authentication method, authentication device and system applied to intelligent terminal
CN104468581A (en)*2014-12-102015-03-25小米科技有限责任公司Method and device for logging into application program
CN105025483A (en)*2015-06-032015-11-04广东欧珀移动通信有限公司 A trigger method and device for terminal operation
CN105095705A (en)*2015-05-192015-11-25努比亚技术有限公司Information processing method and apparatus
CN106600842A (en)*2016-12-072017-04-26中国联合网络通信集团有限公司Delivery fetching method based on delivery cabinet, and server
CN106793163A (en)*2016-12-222017-05-31上海摩软通讯技术有限公司Wearable device, communication system and communication means
CN106790794A (en)*2016-12-082017-05-31北京小米移动软件有限公司Mobile terminal and its Kato method of ejecting and device
CN106850518A (en)*2015-12-072017-06-13阿里巴巴集团控股有限公司Safety certifying method and device
CN106992857A (en)*2017-03-302017-07-28努比亚技术有限公司 Method and device for flashing verification
CN110602679A (en)*2019-09-192019-12-20中国银行股份有限公司Display and transmission method, identity authentication and data transmission device and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1981003A2 (en)*2007-04-122008-10-15General Electric CompanyLockbox key with restricted range wireless communication
CN101674367A (en)*2009-09-172010-03-17宇龙计算机通信科技(深圳)有限公司Unlocking method of NFC mobile terminal and system thereof
CN101997678A (en)*2010-11-182011-03-30东莞宇龙通信科技有限公司 A method and terminal for obtaining a password

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1981003A2 (en)*2007-04-122008-10-15General Electric CompanyLockbox key with restricted range wireless communication
CN101674367A (en)*2009-09-172010-03-17宇龙计算机通信科技(深圳)有限公司Unlocking method of NFC mobile terminal and system thereof
CN101997678A (en)*2010-11-182011-03-30东莞宇龙通信科技有限公司 A method and terminal for obtaining a password

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104301110A (en)*2014-10-102015-01-21刘文清Authentication method, authentication device and system applied to intelligent terminal
CN104468581A (en)*2014-12-102015-03-25小米科技有限责任公司Method and device for logging into application program
CN104468581B (en)*2014-12-102018-03-02小米科技有限责任公司The method and device of login application program
CN105095705A (en)*2015-05-192015-11-25努比亚技术有限公司Information processing method and apparatus
CN105095705B (en)*2015-05-192018-04-10努比亚技术有限公司A kind of information processing method and device
CN105025483A (en)*2015-06-032015-11-04广东欧珀移动通信有限公司 A trigger method and device for terminal operation
CN106850518A (en)*2015-12-072017-06-13阿里巴巴集团控股有限公司Safety certifying method and device
CN106850518B (en)*2015-12-072020-05-12阿里巴巴集团控股有限公司Security authentication method and device
CN106600842A (en)*2016-12-072017-04-26中国联合网络通信集团有限公司Delivery fetching method based on delivery cabinet, and server
CN106790794A (en)*2016-12-082017-05-31北京小米移动软件有限公司Mobile terminal and its Kato method of ejecting and device
CN106790794B (en)*2016-12-082019-07-26北京小米移动软件有限公司 Mobile terminal and card tray ejecting method and device thereof
CN106793163A (en)*2016-12-222017-05-31上海摩软通讯技术有限公司Wearable device, communication system and communication means
CN106992857A (en)*2017-03-302017-07-28努比亚技术有限公司 Method and device for flashing verification
CN110602679A (en)*2019-09-192019-12-20中国银行股份有限公司Display and transmission method, identity authentication and data transmission device and terminal

Also Published As

Publication numberPublication date
HK1199569A1 (en)2015-07-03

Similar Documents

PublicationPublication DateTitle
CN103905191A (en)Verification method applied to mobile terminal, mobile terminal and system
US8788349B2 (en)Mobile payment using picture messaging
US9607293B2 (en)Method and system for account management and electronic wallet access on a mobile device
EP3063921B1 (en)Authentication for application
EP2068535A1 (en)Portable telephone and access control method
US20120011007A1 (en)Mobile Payment Using DTMF Signaling
KR20160009698A (en)Two-Factor Authentication Systems and Methods
EP3815413B1 (en)User authentication using a companion device
CN104301110A (en)Authentication method, authentication device and system applied to intelligent terminal
AU2024200153A1 (en)Authentication for third party digital wallet provisioning
CN107464120A (en)Exempt from the safe verification method, trade company's background system and payment system of close payment
CN102713920A (en) Personalized multifunctional access device for authenticating and controlling data exchange in an individualized form
US20230224297A1 (en)Establishing authentication persistence
CN104363589A (en)Identity authentication method, device and terminal
CN104268756A (en)Mobile payment method and system
WO2014180345A1 (en)User identity verification and authorization system
US20190180278A1 (en)Mobile authentication method and system therefor
KR20170133307A (en)Online financial transactions, identity authentication system and method using real cards
US10129266B2 (en)Identity information systems and methods
US20170180360A1 (en)System for securing user identity information and a device thereof
CN107835162A (en)The method that software digital permit server signs and issues software digital permissions
KR20150050280A (en)Authentication method using fingerprint information and certification number, user terminal and financial institution server
KR101294805B1 (en)2-channel authentication method and system based on authentication application
KR20080048834A (en) Method and apparatus for computer security using mobile terminal
KR20130061165A (en)Method for providing network type one time password by using a medium for near field communication

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
REGReference to a national code

Ref country code:HK

Ref legal event code:DE

Ref document number:1199569

Country of ref document:HK

RJ01Rejection of invention patent application after publication

Application publication date:20140702

REGReference to a national code

Ref country code:HK

Ref legal event code:WD

Ref document number:1199569

Country of ref document:HK


[8]ページ先頭

©2009-2025 Movatter.jp