Summary of the invention
The application's main purpose is to provide a kind of verification method, is applied in the mobile terminal with near field communication (NFC) function, need to carry out the various loaded down with trivial details input problems such as account, password, identifying code to solve when application that prior art exists is verified.The method comprises: receive the checking request of at least one application, wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify; Based on described checking request, utilize described near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of described mobile terminal; And verify whether described the second identifying information is described identification information specific, and the result is returned to described application.
According to the application's embodiment, in the method, the coverage of the near-field communication that described certain distance is described mobile terminal.
According to the application's embodiment, in the method, if described the second identifying information is described identification information specific, the result being proved to be successful is returned to described application; If described the second identifying information is not described identification information specific, the result of authentication failed is returned to described application.
According to the application's embodiment, in the method, described in be applied in and carry out described checking before, be set to allow to utilize the identification information specific of mating with described mobile terminal to verify; And the verification mode of described application is set to utilize the identification information specific of mating with described mobile terminal to verify.
According to the application's embodiment, in the method, described identification information specific is the unique identifying information mating with described mobile terminal.
According to the application's embodiment, in the method, based on described checking request, utilize described near field communication (NFC) function to obtain near store in the near-field communication equipment in certain distance described mobile terminal the second identifying information and comprise: detect the near-field communication equipment in the coverage of near-field communication of described mobile terminal; Read the second identifying information of storing in described near-field communication equipment.
According to the application's embodiment, in the method, described application comprises one or more in following application: the account of application program logs in release, the privacy information of checking, described mobile terminal and checks, payment information is verified; And described application is the application in described mobile terminal.
The application on the other hand in a kind of mobile terminal is provided, comprising: request receiving module, for receiving the checking request of at least one application, wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify; Near-field communication module, for based on described checking request, utilizes described near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of described mobile terminal; Information Authentication module, for verifying whether described the second identifying information is described identification information specific; Result is returned to module, for the result of described Information Authentication module is returned to described application.
According to the application's embodiment, in this mobile terminal, the coverage of the near-field communication that described certain distance is described mobile terminal.
According to the application's embodiment, in this mobile terminal, if described the second identifying information is described identification information specific, the result being proved to be successful is returned to described application; If described the second identifying information is not described identification information specific, the result of authentication failed is returned to described application.
According to the application's embodiment, in this mobile terminal, described identification information specific is the unique identifying information mating with described mobile terminal.
According to the application's embodiment, in this mobile terminal, described near-field communication module comprises: detection sub-module, for detection of the near-field communication equipment in the near-field communication coverage of described mobile terminal; Reading submodule, the identifying information of storing for reading described near-field communication equipment.
According to the application's embodiment, in this mobile terminal, also comprise: request module, in the time receiving described checking request, sends call request to described near-field communication module; Acquisition of information module, for obtaining to described near-field communication module the identifying information that described near-field communication equipment is stored; Described near-field communication module further comprises: receive submodule, for receiving the call request from described request module; Return to submodule, for described identifying information being returned to described acquisition of information module.
According to the application's embodiment, in this mobile terminal, described application comprises one or more in following application: the account of application program logs in release, the privacy information of checking, described mobile terminal and checks, payment information is verified; And described application is the application in described mobile terminal.
In addition, the application also provides a kind of mobile terminal system, comprise: the mobile terminal and the near-field communication equipment that is independent of described mobile terminal with near field communication (NFC) function, wherein, described mobile terminal comprises: request receiving module, for receiving the checking request of at least one application, wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify; Near-field communication module, for based on described checking request, utilizes described near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of described mobile terminal; Information Authentication module, for verifying whether described the second identifying information is described identification information specific; Result is returned to module, for the result of described Information Authentication module is returned to described application; And wherein, described near-field communication equipment, is configured to store described the second identifying information.
Compared with prior art, according to the application's technical scheme, can solve the application that prior art exists and need to carry out the various loaded down with trivial details input problems such as account, password, identifying code while verifying.The application can be used for the various application in mobile terminal, comprises that the account login of application program and checking, the release of mobile terminal, privacy information are checked, payment information checking etc., can prevent well the password problem causing that is cracked.And, can also be used for strengthening the fail safe of payment verification.Because the mobile terminal in the application and the near-field communication equipment that is independent of described mobile terminal mate based on hardware view, therefore, can also solve hand-set from stolen time, the application login account associated with phone number abused because of the password that is cracked, and the privacy information problem of being stolen a glance at.And, Authentication Questions also can carry out brush machine, software installation or unloading for mobile terminal time.
Embodiment
The application's main thought is to provide a kind of verification method, need to carry out the various loaded down with trivial details input problems such as account, password, identifying code to solve when application that prior art exists is verified.
For making the application's object, technical scheme and advantage clearer, below in conjunction with drawings and the specific embodiments, the application is described in further detail.
According to the application's embodiment, a kind of verification method is provided, be applied in the mobile terminal with near field communication (NFC) function.With reference to figure 1, Fig. 1 is the flow chart of the verification method that relates to of the embodiment of the present application.
As shown in Figure 1, in step S101, when the operating system of mobile terminal receives the checking request of at least one application, this checking request requires to utilize the identification information specific of mating with described mobile terminal to verify.More particularly, this identification information specific can be a string character, it can be the general unique identifier (uuid) with height uniqueness that utilizes security algorithm to generate, can be stored in a near-field communication equipment that is independent of this mobile terminal, and this near-field communication equipment is the relation of corresponding and coupling one by one by this identification information specific with this mobile terminal with near field communication (NFC) function.
Mobile terminal in the present embodiment can be for having the mobile terminal of near field communication (NFC) function, include but not limited to the equipment such as mobile phone, portable computer, panel computer, related near field communication (NFC) function can include but not limited to wireless near field communication (nfc) function, radio-frequency (RF) identification (rfid) function.This mobile terminal is opening when near field communication (NFC) function, can obtain canned data in the near-field communication equipment in the certain distance of its near-field communication.As previously mentioned, this mobile terminal, a corresponding uniquely near-field communication equipment that matches.Preferably, the certain distance of described near-field communication is the coverage of the near-field communication of described mobile terminal.
Should store the identification information specific of mating with this mobile terminal with the unique near-field communication equipment mating of mobile terminal, this identification information specific is also the unique identifying information mating with this mobile terminal, it can be specifically a string character, for example general unique identifier (uuid), this near-field communication equipment is to utilize the nfc equipment that nfc technology communicates or the rfid equipment that utilizes rfid technology to communicate corresponding to this mobile terminal, it specifically can be a card, and can there be various shapes, for example circle, ellipse, rectangle, square etc.The hardware based aspect of this near-field communication equipment is made, in the time making, once blow and recorded the identifying information unique with the mobile terminal of its pairing, in the time that user carries out the checking of a certain application, verify when a certain near-field communication equipment is the unique near-field communication equipment of certain terminal, be actually the whether unique information corresponding with this mobile terminal of the identifying information that records in this near-field communication equipment of checking.
In step S102, the checking request of the operating system of mobile terminal based on above-mentioned application, utilizes near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of mobile terminal; In the time that the operating system of mobile terminal receives the checking request of application, will open near field communication (NFC) function, with the identifying information near the near-field communication equipment obtaining.
As shown in Figure 2, first in step S201, mobile terminal detects near the near-field communication equipment it, namely detect the near-field communication equipment in the near-field communication coverage of this mobile terminal, detect after the appearance of near-field communication equipment, in step S202, mobile terminal will read the identifying information in this equipment.User may have two or more mobile terminals, so also can be furnished with accordingly two or more near-field communication equipments, because the near-field communication equipment mating with mobile terminal is one to one, that is to say, a corresponding also coupling of mobile terminal has and only has a near-field communication equipment, so, the operating system of mobile terminal also may get the information not being with self unique near-field communication equipment mating.
In step S103, verify whether described the second identifying information is described identification information specific, and the result is returned to described application; This second identifying information is exactly the identifying information of the detected near-field communication equipment storage of mobile terminal, namely mobile terminal is verified the identifying information in certain near-field communication equipment getting, verify that whether this identifying information is and its unique identification information specific of mating, if, illustrating that this near-field communication equipment and mobile terminal are unique mates, and the result being proved to be successful is returned to described application; If not, the result of authentication failed is returned to described application.
Described application can receive after the result, generate the corresponding prompting page according to the result, whether pass through checking with prompting user, if not by checking, application can generate the unsanctioned prompting page of checking, if by checking, this application step that can improve generates the page of prompting user next step operation.
The present embodiment a kind of mobile terminal, the block diagram that Fig. 3 is described mobile terminal be provided on the other hand.As shown in Figure 3:mobile terminal 300 can be for having the mobile terminal of near field communication (NFC) function, include but not limited to the equipment such as mobile phone, portable computer, panel computer, related near field communication (NFC) function can include but not limited to wireless near field communication (nfc) function, radio-frequency (RF) identification (rfid) function etc.In the time opening near field communication (NFC) function, can obtain canned data in the near-field communication equipment in near-field communication coverage.This coverage, for example, be 10cm, 20cm etc., and the coverage difference of different mobile terminal near-field communications, in general, depends on the performance of near-field communication equipment in this mobile terminal.Described mobile terminal can communicate with the near-field communication equipment that adopts Passive Mode, and mobile terminal is as the equipment that starts near-field communication.
This mobile terminal can also be furnished with one with its unique near-field communication equipment that is independent of this mobile terminal mating, and this mobile terminal, only corresponding unique near-field communication equipment that matches, in this near-field communication equipment, stored the unique identifying information of the coupling of mobile terminal, described identifying information can be general unique identifier (uuid).This near-field communication equipment can be the card of various shapes, or the entity of other shapes.Near-field communication equipment is made hardware based aspect, in the time making, once blows and has recorded the identifying information unique with the mobile terminal of its pairing.
Themobile terminal 300 with near field communication (NFC) function can comprise: request receivingmodule 301, near-field communication module 303,Information Authentication module 305, result are returned tomodule 306.
Wherein, request receivingmodule 301 can be for receiving the checking request of at least one application, and wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify.
Near-field communication module 303 can, for based on above-mentioned checking request, utilize near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of mobile terminal.
Information Authentication module 305 can be for verifying whether described the second identifying information is described identification information specific.
Result is returned tomodule 306 can be for returning to described application by the result of described Information Authentication module.
Near-field communication module 303 can comprisedetection sub-module 308 andreading submodule 309.
Wherein,detection sub-module 308 can be for detection of the near-field communication equipment in the near-field communication coverage of described mobile terminal.
Reading submodule 309 can be for reading the identifying information of storing in described near-field communication equipment.
Mobile terminal 300 can also compriserequest module 302 and acquisition ofinformation module 304.
Wherein,request module 302 can, in the time receiving described checking request, send call request to near-field communication module.
Acquisition ofinformation module 304 can be for obtaining the identifying information of storing in described near-field communication equipment to described near-field communication module.
Near-field communication module may further include and receivessubmodule 307 and return tosubmodule 310, wherein,
Receivingsubmodule 307 can be for receiving the call request from described request module.
Returning tosubmodule 310 can be for returning to described identifying information described acquisition of information module.
Mobile terminal in the mobile terminal system of the present embodiment can be the mobile terminal with nfc function, and near-field communication equipment is correspondingly nfc equipment.
Mobile terminal in the mobile terminal system of the present embodiment can be the mobile terminal with rfid function, and near-field communication equipment is correspondingly rfid equipment.
Be described as an example of the mobile terminal with nfc function example below.
When a certain application inmobile terminal 300 requires to the transmission ofmobile terminal 300 request that utilizes the identification information specific of mating with this mobile terminal to verify, when request receivingmodule 301 receives this request,request module 302 sends call request tonfc module 303, to call the checking request ofnfc module 303 based on above-mentioned application, utilize nfc function to obtain the second identifying information of storing in the nfc equipment near the certain distance of mobile terminal.
Nfc module 303 receives after this call request by receivingsubmodule 307,detection sub-module 308 detects near the nfc equipment it, when having after the appearance of nfc equipment in the nfc coverage detecting at this mobile terminal, read the second identifying information of storing in this nfc equipment byreading submodule 309, and by returning to submodule, this identifying information is returned to acquisition ofinformation module 304.
User may have two or more mobile terminals, will be furnished with accordingly two or more nfc equipment, so, the operating system of mobile terminal may get the identifying information not being with self unique nfc equipment mating, acquisition ofinformation module 304 gets tonfc module 303 after the identifying information of nfc equipment,Information Authentication module 305 is verified this identifying information, verify that whether the second identifying information of storing in described nfc equipment is and the unique identification information specific of mating ofmobile terminal 300, that is, the equipment that checking reads is and the unique corresponding nfc equipment of mobile terminal.If so, be proved to be successful, if not, authentication failed, after checking, result is returned tomodule 306 the result is returned to described application.If this identifying information is and the unique identification information specific of mating ofmobile terminal 300, the result being proved to be successful is returned to described application; If this identifying information is not and the unique identification information specific of mating ofmobile terminal 300, the result of authentication failed is returned to described application.
Application meeting is receiving after the result, generate the corresponding prompting page according to the result, whether pass through checking with prompting user, if not by checking, application can generate the unsanctioned prompting page of checking, if by checking, this application step that can improve generates the page of prompting user next step operation.
Nfc equipment can provide API development interface to the various application in mobile terminal, if application is trusted the fail safe of nfc device authentication, can be in the time generating this application, for this application arranges nfc device authentication mode (that is to say the mode of utilizing the identifying information of storing in this nfc equipment to verify).
The application can be used for the various application in mobile terminal, includes but not limited to that account login and checking, the release of mobile terminal, the privacy information of release after mobile phone screen locking, application program checked, payment information checking etc.For example, when using account, user logins a certain application, this is applied in developer has authorized nfc equipment while developing, i.e. this application can utilize the mode of the identifying information on checking nfc equipment to login, and user, in the time opening this application first, inputs oneself account and password and logins, after logining successfully, user just can, according to the hobby of oneself, arrange this application, i.e. personal settings; User can carry out the mode of login authentication or the mode that adopts account number cipher to login by setup and use nfc equipment in corresponding option, and, if this mobile terminal is mobile phone, user the login account of application can be set and the SIM card that uses at present number associated, SIM card also can be configured to associated with this mobile phone and nfc equipment, if user is configured such that and verifies with nfc equipment through the mode of login, in the time that user uses this application next time, just can use with the nfc device logs of the unique pairing of mobile phone and apply so.
Because being configured to use nfc equipment, this application before carries out login authentication, in the time that user opens this application, this application will be sent to system the request of checking nfc equipment, simultaneously, generate the verification tip page or eject accordingly verification tip, use nfc equipment to carry out login authentication with prompting user, or receive above-mentioned checking request when the system of mobile terminal, generate the verification tip page or eject accordingly verification tip by the operating system of mobile terminal.
Now, user only need to be according to prompting by nfc equipment near mobile phone, and in the operating system of mobile terminal, user's nfc equipment is verified, and the result is returned to application.
Application meeting is receiving after the result, generates the corresponding prompting page according to the result, if by checking, this application generates and logins successfully the page, and prompting user logins successfully, and a progressive step generates the page of next step operation of prompting user.If not by checking, application can generate checking not to be passed through, the prompting page of login failure.
The application can also be used for payment scheme, as the checking of the login of payment accounts and payment information, and can be used for strengthening the fail safe of payment verification.
In the time that developer pays the exploitation of application, nfc equipment is authorized, this application is set can utilize the verification mode of the identifying information on checking nfc equipment to login, user is in the time opening this payment application first, inputting oneself account and password logins, after logining successfully, can arrange this payment application, setup and use nfc equipment carries out the mode of login authentication or adopts the mode of account number cipher login, also can or confirm with regard to the checking of payment information that the checking of carrying out while payment arranges, this payment application is confirmed to the mode paying is configured such that the mode of verifying with nfc equipment or the mode that adopts password authentification.
If user is configured such that with nfc equipment and verifies through the mode of login, in the time that user uses this application next time, just can use this payment application of nfc device logs with the unique pairing of mobile phone so.If when the mode that pays application confirmation payment is also configured such that the mode of verifying with nfc equipment by user, when user has logined this payment application, while carrying out payment affirmation, this payment application will be sent to system the request of checking nfc equipment, and generate accordingly the verification tip page or eject accordingly verification tip, use nfc equipment to confirm the checking paying with prompting user, or when the system of mobile terminal receives above-mentioned checking request, generate the verification tip page or eject accordingly verification tip by the system of mobile terminal, now, user only need to be by nfc equipment near mobile terminal.
And in the operating system of mobile terminal, user's nfc equipment is verified, described payment application can receive after the result, generates the corresponding prompting page according to the result, if by checking, generates and pays the successful page; If, by checking, can not generate checking and not pass through, pay the failed prompting page.
Certainly, if user's nfc equipment lost because of carelessness, mode that can also choice for use password login.The step that a user selects can be set, in the time that user opens application, generate one and select the page, user can verify or use account number cipher to verify by choice for use nfc equipment.Or can use after nfc device authentication mode authentication failed user, generate an inquiry page, whether inquiry uses input pin mode again to verify.
User can also be configured such that by the double verification mode that accesses to your password and confirm after using nfc equipment to confirm the checking of identity or first use nfc equipment to verify after account number cipher login paying application, the mode that maybe pays the confirmation payment of application is set to the double verification mode of password authentification and nfc device authentication, in the time that carrying out payment affirmation, user need to first input payment cipher, re-using nfc equipment verifies, or first use nfc equipment to verify, input again password and confirm, can increase like this fail safe of payment.
The application can also be used for secret protection; in the time that developing, developer nfc equipment is authorized; check that privacy information can utilize the mode of the identifying information on checking nfc equipment to carry out release, user will want to protect Word message, voice messaging, picture/photo information or associated person information etc. to add in privacy information.User can be configured such that the mode of checking privacy information release and carry out release with nfc equipment; so in the time that user checks privacy information again; will generate the prompting page; prompting user uses nfc equipment to carry out release; simultaneously secret protection application also can be sent checking request to the system of mobile terminal, requires to utilize the identification information specific of mating with this mobile terminal year to unblank to verify.
Now, user only need to be by nfc equipment near mobile terminal.And in the system of mobile terminal, verify accordingly, and return to the result; secret protection application can receive after the result, generates the corresponding prompting page, if by checking according to the result; generate the release success page, and further open privacy information and check the page.If, by checking, can not generate checking and not pass through, the prompting page of release failure.Or can in the time being proved to be successful, not generate the prompting page yet, directly open privacy information and check the page, and just produce the unsanctioned prompting page of checking in the time of authentication failed.
The application also can be used for mobile terminal release, for example, when user's mobile phone mode of unblanking that is set to access to your password, or the start release that need access to your password is set, or use when SIM card and need to input unlock password, and these several modes all need to all be inputted one time password in the time unblanking at every turn, process is more loaded down with trivial details.Use the mobile terminal system in the application, the mode of utilizing near-field communication equipment to verify is verified and is unblanked, in the time that user wants to use this mobile terminal, by producing the button of the page of unblanking in described terminal, enter the application of unblanking when unblanking the page and send the request that uses nfc equipment to unblank checking to the system of mobile terminal, mobile terminal operating system can read and verify with the same nfc device identifying information to user of mode that pays application login as above-mentioned account login.
In addition, the application's mobile terminal and its unique corresponding near-field communication equipment be based on hardware view coupling, as mobile phone carries out that brush machine, software are installed or needs authentication when unloading, just can carry out after must using nfc device authentication.And after brush machine,, because of the matching relationship of cell phone system and hardware, other people do not have and the unique near-field communication equipment mating of mobile phone, still can not carry out certain operations, the problem that therefore can also solve hand-set from stolen time, privacy information is stolen a glance at.
The present embodiment also provides a kind of mobile terminal system, the block diagram that Fig. 4 is described mobile terminal system.Described mobile terminal system comprises: themobile terminal 400 and the near-field communication equipment 500 that is independent of described mobile terminal with near field communication (NFC) function.
This mobile terminal 400 can comprise: request receivingmodule 401, near-field communication module 403,Information Authentication module 405, result are returned tomodule 406.
Wherein, request receivingmodule 401 can be for receiving the checking request of at least one application, and wherein said checking request requires to utilize the identification information specific of mating with described mobile terminal to verify.
Near-field communication module 403 can, for based on above-mentioned checking request, utilize near field communication (NFC) function to obtain the second identifying information of storing in the near-field communication equipment near the certain distance of mobile terminal.
Information Authentication module 405 can be for verifying whether described the second identifying information is described identification information specific.
Result is returned tomodule 406 can be for returning to described application by the result of described Information Authentication module.
Near-field communication module 403 can comprisedetection sub-module 408 and readingsubmodule 409.
Wherein,detection sub-module 408 can be for detection of the near-field communication equipment in the near-field communication coverage of described mobile terminal.Reading submodule 409 can be for reading the identifying information of storing in described near-field communication equipment.
Mobile terminal 400 can also compriserequest module 402 and acquisition ofinformation module 404.
Wherein,request module 402 can, in the time receiving described checking request, send call request to near-field communication module.Acquisition ofinformation module 404 can be for obtaining the identifying information of storing in described near-field communication equipment to described near-field communication module.
Near-field communication module may further include and receives submodule 407 and return tosubmodule 410.
Wherein, receivingsubmodule 407 can be for receiving the call request from described request module.Returning tosubmodule 410 can be for returning to described identifying information described acquisition of information module.
Be independent of the near-field communication equipment near-field communication equipment 500 of this mobile terminal, can be configured to store described the second identifying information.
Although it should be noted that some modules or the submodule of having mentioned equipment in above-detailed, this division is not enforceable.In fact,, according to the application's execution mode, the feature of above-described two or more modules and function can be specialized in a module.Otherwise, the feature of an above-described module and function can Further Division for to be specialized by multiple modules.
In addition, although described in the accompanying drawings the operation of the application's method with particular order,, this not requires or hint must be carried out these operations according to this particular order, or the operation shown in must carrying out all could realize the result of expecting.
The embodiment that the foregoing is only the application, is not limited to the application, and for a person skilled in the art, the application can have various modifications and variations.All within the application's spirit and principle, any amendment of doing, be equal to replacement, improvement etc., within all should being included in the application's claim scope.