[go: up one dir, main page]

CN103729903A - Authentication system and method using handset as validation terminal - Google Patents

Authentication system and method using handset as validation terminal Download PDF

Info

Publication number
CN103729903A
CN103729903A CN201310739325.7A CN201310739325A CN103729903A CN 103729903 A CN103729903 A CN 103729903A CN 201310739325 A CN201310739325 A CN 201310739325A CN 103729903 A CN103729903 A CN 103729903A
Authority
CN
China
Prior art keywords
identification code
mobile phone
terminal
verification
unique identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310739325.7A
Other languages
Chinese (zh)
Inventor
聂林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leshi Zhixin Electronic Technology Tianjin Co Ltd
Original Assignee
Leshi Zhixin Electronic Technology Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leshi Zhixin Electronic Technology Tianjin Co Ltd filed Critical Leshi Zhixin Electronic Technology Tianjin Co Ltd
Priority to CN201310739325.7A priority Critical patent/CN103729903A/en
Publication of CN103729903A publication Critical patent/CN103729903A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种以手机作为验证终端的认证系统及方法,首先在手机终端中存储一个标识该手机终端使用者身份的唯一识别码;由所述认证装置向周围广播认证服务信号;由所述手机终端扫描周围是否存在预设的认证服务信号,并在扫描到后发送配对请求;所述认证装置在检测到手机终端的配对请求后,与该终端进行配对;所述手机终端在配对成功后,发送存储于所述识别码存储模块中的唯一识别码;所述认证装置在收到手机终端发送的唯一识别码后进行验证,验证通过后执行预设动作。应用本发明的实施例,将手机终端作为验证终端与认证装置相结合,充分利用手机终端的随身便利性即可取代传统的IC卡等验证终端,节省了成本,同时提高了使用的便利性。

The invention discloses an authentication system and method using a mobile phone as a verification terminal. First, a unique identification code identifying the identity of the user of the mobile terminal is stored in the mobile terminal; the authentication device broadcasts an authentication service signal to the surroundings; The mobile terminal scans whether there is a preset authentication service signal around, and sends a pairing request after scanning; the authentication device performs pairing with the terminal after detecting the pairing request of the mobile terminal; the mobile terminal is successfully paired After that, send the unique identification code stored in the identification code storage module; the authentication device performs verification after receiving the unique identification code sent by the mobile phone terminal, and executes a preset action after the verification is passed. By applying the embodiment of the present invention, the mobile phone terminal is combined with the authentication device as the verification terminal, and the traditional IC card and other verification terminals can be replaced by making full use of the portable convenience of the mobile phone terminal, which saves costs and improves the convenience of use.

Description

Verification System using mobile phone as verification terminal and method
Technical field
The present invention relates to wireless communication technology field, relate in particular to a kind of Verification System and method using mobile phone as verification terminal.
Background technology
In routine work and life, authenticating device is being brought into play more and more important effect.For example, working work attendance need to be checked card, and this punched-card machine is exactly a kind of authenticating device; Again for example, entrance guard device is also a kind of authenticating device, and authentication is opened by rear control Electrically operated gate.
Although there is at present the authenticating device of a lot of employing biological identification technologies, such as fingerprint machine, recognition of face etc., but also there are a lot of defects in biological identification technology, for example, finger is just no longer applicable to the authentication of fingerprint machine when scratching, even air humidity also can produce serious influence to the accuracy of identification of fingerprint machine, therefore, mainly still adopts the authentication recognition device of IC-card formula many at present.
But, although the reliability of the authentication recognition device of IC-card formula is higher, but carry cumbersomely, sometimes often leave behind at one's side, or easily lose, and, for the authenticating device of work attendance class, need to all to allot an IC-card for every user, this just needs to make separately, cost is very high, also easily causes waste.
But then, mobile phone has become one of necessary object of carrying now, and has equally the function of wireless telecommunications, but but can not combine with authenticating device as a kind of verification terminal at present, therefore, wherein has very large room for improvement.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of Verification System and method using mobile phone as verification terminal, to overcome the needed verification terminal of existing authenticating device, needs to make separately, causes high, the awkward problem of integrated cost.
For solving the problems of the technologies described above, the invention provides a kind of Verification System using mobile phone as verification terminal, comprising: mobile phone terminal and authenticate device, wherein:
Described mobile phone terminal, comprising:
Identification code memory module, for storing the unique identifier of this mobile phone terminal of sign user identity;
Wireless scan module for scanning around whether have default authentication service signal, and sends pairing request after scanning;
Identification code sending module, for after successful matching, sends the unique identifier being stored in described identification code memory module;
Described authenticate device, comprising:
Radio broadcasting module, for broadcast authentication service signal towards periphery;
Connect matching module, for detecting after the pairing request of mobile phone terminal, match with this terminal;
Authentication module, for verifying after the unique identifier receiving mobile phone terminal transmission, is verified rear execution deliberate action.
The present invention and then a kind of authentication method using mobile phone as verification terminal is also provided, is applied in the system that comprises mobile phone terminal and authenticate device, comprises the steps:
In mobile phone terminal, store the unique identifier of this mobile phone terminal of sign user identity;
By described authenticate device broadcast authentication service signal towards periphery;
By described mobile phone terminal scanning, whether there is default authentication service signal around, and after scanning, send pairing request;
Described authenticate device is detecting after the pairing request of mobile phone terminal, is matching with this terminal;
Described mobile phone terminal, after successful matching, sends the unique identifier being stored in described identification code memory module;
Described authenticate device is verified, is verified rear execution deliberate action after the unique identifier of receiving mobile phone terminal transmission.
Application embodiments of the invention, on the one hand by the unique identifier of this mobile phone terminal of storaging mark user identity in mobile phone, utilize on the other hand authenticate device real time scan mobile phone terminal around, after scanning, by mobile phone terminal, send to authenticate device can authenticate identification unique identifier, so, can combine with authenticate device mobile phone terminal as verification terminal, the carry-on convenience that makes full use of mobile phone terminal can replace the verification terminals such as traditional IC-card, no longer need again to make separately, provide cost savings greatly, improved the convenience using simultaneously.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is according to the Verification System schematic diagram using mobile phone as verification terminal described in the embodiment of the present invention.
Fig. 2 is according to the authentication method process flow diagram using mobile phone as verification terminal described in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Along with scientific and technological development, mobile phone relies on powerful function and ease for use, has become people's indispensable essential object of going out, and people are very high to the degree of dependence of mobile phone.Therefore, core concept of the present invention by using mobile phone as a kind of verification terminal and authenticating device in connection with, form complete Verification System, no longer need to make separately the verification terminal of other IC-card classes.
Please refer to Fig. 1, for according to the Verification System schematic diagram using mobile phone as verification terminal described in the embodiment of the present invention, comprising: mobile phone terminal 10 and authenticate device 20, wherein:
Described mobile phone terminal 10, comprising:
Identification code memory module 11, for storing the unique identifier of this mobile phone terminal of sign user identity;
Wireless scan module 12 for scanning around whether have default authentication service signal, and sends pairing request after scanning;
Identification code sending module 13, for after successful matching, sends the unique identifier being stored in described identification code memory module;
Described authenticate device 20, comprising:
Radio broadcasting module 21, for broadcast authentication service signal towards periphery;
Connect matching module 22, for detecting after the pairing request of mobile phone terminal, match with this terminal;
Authentication module 23, for verifying after the unique identifier receiving mobile phone terminal transmission, is verified rear execution deliberate action.
According to embodiments of the invention, authenticate device (for example punched-card machine) itself can be supported multiple wireless protocols, comprise bluetooth, NFC(near-field communication, Near Field Communication), WiFi direct is infrared etc., and for mobile phone, only need to support the wireless protocols of one of them.Because each mobile phone producer is when producing mobile phone, for the consideration of various commercial factors, can't be very comprehensive to the support of invalidation protocol, one to two kind of invalidation protocol is often only provided, therefore, for authenticate device, can all provide support according to the various invalidation protocol that comprise in market, so just can carry out communication with whole mobile phone terminals.
In mobile phone terminal, can be in identification code memory module 11, a for example pre-stored unique identifier in storer, by this unique identifier, user's identity of this mobile phone terminal of sign that can be unique, is equivalent to No. ID or string number in IC-card.
This unique identifier can be pre-stored in mobile phone terminal in several ways, for example, can unique identifier be write to mobile phone terminal by special write device, one login module also can be installed in mobile phone terminal, be used for logining an access to netwoks address, this reference address backstage arranges a database, can be according to the username and password of precognition, obtain the unique identifier of corresponding this mobile phone terminal of sign user identity, and be downloaded in mobile phone terminal.
In this way, take gate control system as example, employee can inform by authentication employee's username and password in company, and in background data base, generates unique identifier that should employee's identity, and this employee can access voluntarily this database by mobile phone terminal and obtain unique identifier.
For example, as the authenticate device (punched-card machine) 20 of receiving end, can be regularly the time interval of 1 second (for example with) with own all wireless modes of being supported to around scan, broadcast the existence of the authentication service of oneself.
And on the other hand, mobile phone, as verification terminal, after open-authentication function, can use its wireless mode of supporting all the time, by wireless scan module 12, whether scanning there is default authentication service signal around, and after scanning, sends pairing request.
At this moment, mobile phone terminal can be imagined as to an IC-card, in the time of near user's carrying mobile phone is gone to entrance guard device, just be equivalent to that IC-card is pressed close to gate inhibition the same, the near field home control network communication protocol of all supporting by authenticate device and mobile phone terminal, makes both mutual communications.
According to embodiments of the invention, the connection matching module 22 of authenticate device is detecting after the pairing request of mobile phone terminal, attempts immediately matching with this terminal, and between has been set up wireless communication connection immediately.
Smooth and easy for guaranteeing communication, described connection matching module 22 can be designed as at synchronization and only allows a mobile phone terminal to connect pairing.After current phone terminal has been matched, then the mobile phone terminal that carries out detecting with the next one matches.This is just equivalent to the IC-card checking of using at present, only has after previous IC-card leaves, and could brush next IC-card.
After successful matching, the identification code sending module 13 in mobile phone terminal, the unique identifier that is about to be stored in described identification code memory module sends to authenticate device 20.
Authentication module 23 in authenticate device 20 is verified after the unique identifier of receiving mobile phone terminal transmission, is verified rear execution deliberate action.
The verification mode of authentication module 23 can adopt many algorithms, for example, a database can be set, for the unique identifier of storaging mark mobile phone terminal user identity; And described authentication module 23 is being received after the unique identifier that mobile phone terminal sends, compare with the identification code of storing in described database, as exist consistent identification code to be verified, and carry out deliberate action.
Still take gate control system as example, can its storage inside there is legal identification code data storehouse, for the unique identifier of storaging mark mobile phone terminal user identity, receiving after the unique identifier of mobile phone terminal transmission, can be immediately with legal identification code storehouse in identification code compare, if existed, be verified, otherwise checking is not passed through.After being verified, can carry out the action of opening the door.
According to another embodiment of the present invention, described authentication module 23 verification algorithm that can also prestore, for receiving after the unique identifier that mobile phone terminal sends, carries out computing according to preset rules, and determine according to operation result whether checking is passed through, be verified rear execution deliberate action.
Please refer to Fig. 2, for according to the authentication method process flow diagram using mobile phone as verification terminal described in the embodiment of the present invention, it is applied in the system that comprises mobile phone terminal and authenticate device, comprises the steps:
Step 201: the unique identifier of storing this mobile phone terminal of sign user identity in mobile phone terminal;
Step 202: by described authenticate device broadcast authentication service signal towards periphery;
Step 203: whether have default authentication service signal around by described mobile phone terminal scanning, and send pairing request after scanning;
Step 204: described authenticate device is detecting after the pairing request of mobile phone terminal, matching with this terminal;
Step 205: described mobile phone terminal, after successful matching, sends the unique identifier being stored in described identification code memory module;
Step 206: described authenticate device is verified, is verified rear execution deliberate action after the unique identifier of receiving mobile phone terminal transmission.
Wherein, concrete verification mode, can take multiple means, for example, can in authenticate device, configure a database, carrys out the unique identifier of storaging mark mobile phone terminal user identity; And described authenticate device is being received after the unique identifier that mobile phone terminal sends, can compare with the identification code of storing in described database, as exist consistent identification code to be verified, and carry out deliberate action.
Or, can, receiving after the unique identifier that mobile phone terminal sends, according to preset rules, carry out computing, and determine according to operation result whether checking is passed through, be verified rear execution deliberate action.
Equally, for mobile phone terminal, obtain the mode of identification code, can login an access to netwoks address by mobile phone terminal, according to the username and password of precognition, obtain the unique identifier of corresponding this mobile phone terminal of sign user identity.
Take employee, check card attendance recorder as example, after employee is employed, can distribute to an one username and password, and in backstage correspondence, generate the unique identifier of this employee's identity of sign, be stored in database.This employee just can pass through mobile phone terminal sign-on access one network address, the application program of downloading-running this method embodiment, and input username and password, background server is inquired about and is returned to corresponding unique identifier in database according to this username and password, and is stored in the storer of mobile phone terminal.
When this employee goes to work, portability mobile phone terminal is walked close to attendance recorder, during due to attendance recorder, be engraved in the authentication service signal with multiple wireless mode broadcast oneself, as long as this employee's mobile phone terminal has been opened corresponding authentication service program, will scan authentication service signal around the moment, as long as scan the broadcast singal that attendance recorder is corresponding, will attempt the pairing between attendance recorder and mobile phone terminal, some successful matchings, mobile phone terminal can send to attendance recorder by the unique identifier being stored in storer, and attendance recorder is according to verification algorithm, can verify this unique identifier, after being verified, can record this employee's the work attendance time, if attendance recorder has connected gate control system, also can open gate inhibition, allow employee to enter.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and each embodiment stresses is and the difference of other embodiment, between each embodiment identical similar part mutually referring to.
The application can describe in the general context of the computer executable instructions of being carried out by computing machine, for example program module.Usually, program module comprises and carries out particular task or realize routine, program, object, assembly, data structure of particular abstract data type etc.Also can in distributed computing environment, put into practice the application, in these distributed computing environment, by the teleprocessing equipment being connected by communication network, be executed the task.In distributed computing environment, program module can be arranged in the local and remote computer-readable storage medium including memory device.
Finally, also it should be noted that, in this article, relational terms such as the first and second grades is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply and between these entities or operation, have the relation of any this reality or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby the process, method, commodity or the equipment that make to comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or be also included as the intrinsic key element of this process, method, commodity or equipment.The in the situation that of more restrictions not, the key element being limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment that comprises described key element and also have other identical element.
Above the application's embodiment is described in detail, has applied principle and the embodiment of specific case to the application herein and set forth, the explanation of above embodiment is just for helping to understand the application's method and core concept thereof; , for one of ordinary skill in the art, according to the application's thought, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application meanwhile.

Claims (10)

1.一种以手机作为验证终端的认证系统,其特征在于,包括:手机终端及认证装置,其中:1. An authentication system using a mobile phone as a verification terminal, comprising: a mobile phone terminal and an authentication device, wherein: 所述手机终端,包括:The mobile terminal includes: 识别码存储模块,用于存储一个标识该手机终端使用者身份的唯一识别码;The identification code storage module is used to store a unique identification code identifying the identity of the mobile terminal user; 无线扫描模块,用于扫描周围是否存在预设的认证服务信号,并在扫描到后发送配对请求;The wireless scanning module is used to scan whether there is a preset authentication service signal around, and send a pairing request after scanning; 识别码发送模块,用于在配对成功后,发送存储于所述识别码存储模块中的唯一识别码;An identification code sending module, configured to send the unique identification code stored in the identification code storage module after the pairing is successful; 所述认证装置,包括:The authentication device includes: 无线广播模块,用于向周围广播认证服务信号;The wireless broadcasting module is used to broadcast authentication service signals to the surroundings; 连接配对模块,用于在检测到手机终端的配对请求后,与该终端进行配对;Connecting the pairing module, used for pairing with the terminal after detecting the pairing request of the mobile terminal; 验证模块,用于在收到手机终端发送的唯一识别码后进行验证,验证通过后执行预设动作。The verification module is used to perform verification after receiving the unique identification code sent by the mobile terminal, and execute a preset action after the verification is passed. 2.如权利要求1所述的系统,其特征在于,进一步包括一数据库,用于存储标识手机终端使用者身份的唯一识别码;2. system as claimed in claim 1, is characterized in that, further comprises a database, is used for storing the unique identification code of identification mobile phone terminal user's identity; 所述验证模块,用于在收到手机终端发送的唯一识别码后,与所述数据库中存储的识别码进行比对,如存在一致的识别码则验证通过,并执行预设动作。The verification module is configured to compare the unique identification code sent by the mobile phone terminal with the identification code stored in the database, and if there is a consistent identification code, the verification is passed and a preset action is executed. 3.如权利要求1所述的系统,其特征在于,所述验证模块,用于在收到手机终端发送的唯一识别码后,根据预设规则进行运算,并根据运算结果确定验证是否通过,验证通过后执行预设动作。3. The system according to claim 1, wherein the verification module is configured to perform calculations according to preset rules after receiving the unique identification code sent by the mobile phone terminal, and determine whether the verification is passed according to the calculation results, Execute preset actions after verification is passed. 4.如权利要求1所述的系统,其特征在于,所述手机终端进一步包括一登录模块,用于登录一网络访问地址,根据预知的用户名和密码,获得相应的标识该手机终端使用者身份的唯一识别码。4. The system according to claim 1, wherein the mobile phone terminal further includes a login module, which is used to log in a network access address, and obtain a corresponding identification of the mobile phone terminal user identity according to the user name and password predicted. unique identifier for . 5.如权利要求1所述的系统,其特征在于,所述连接配对模块,在同一时刻仅允许一个手机终端进行连接配对。5. The system according to claim 1, wherein the connection and pairing module only allows one mobile phone terminal to perform connection and pairing at the same time. 6.一种以手机作为验证终端的认证方法,应用于包括手机终端及认证装置的系统中,包括如下步骤:6. An authentication method using a mobile phone as a verification terminal, applied to a system including a mobile phone terminal and an authentication device, comprising the following steps: 在手机终端中存储一个标识该手机终端使用者身份的唯一识别码;Store a unique identification code identifying the identity of the user of the mobile terminal in the mobile terminal; 由所述认证装置向周围广播认证服务信号;The authentication device broadcasts an authentication service signal to the surroundings; 由所述手机终端扫描周围是否存在预设的认证服务信号,并在扫描到后发送配对请求;The mobile phone terminal scans whether there is a preset authentication service signal around, and sends a pairing request after scanning; 所述认证装置在检测到手机终端的配对请求后,与该终端进行配对;The authentication device performs pairing with the terminal after detecting the pairing request of the mobile terminal; 所述手机终端在配对成功后,发送存储于所述识别码存储模块中的唯一识别码;After the mobile phone terminal is paired successfully, it sends the unique identification code stored in the identification code storage module; 所述认证装置在收到手机终端发送的唯一识别码后进行验证,验证通过后执行预设动作。The authentication device performs verification after receiving the unique identification code sent by the mobile phone terminal, and executes preset actions after the verification is passed. 7.如权利要求6所述的方法,其特征在于,进一步包括:在认证装置中配置一数据库,用于存储标识手机终端使用者身份的唯一识别码;7. The method according to claim 6, further comprising: disposing a database in the authentication device for storing a unique identification code identifying the identity of the mobile terminal user; 所述认证装置在收到手机终端发送的唯一识别码后进行验证的步骤,包括:在收到手机终端发送的唯一识别码后,与所述数据库中存储的识别码进行比对,如存在一致的识别码则验证通过,并执行预设动作。The step of verifying after the authentication device receives the unique identification code sent by the mobile terminal includes: after receiving the unique identification code sent by the mobile terminal, comparing it with the identification code stored in the database, if there is a consistent The identification code passed the verification, and executes the preset action. 8.如权利要求6所述的方法,其特征在于,所述认证装置在收到手机终端发送的唯一识别码后进行验证的步骤,包括:在收到手机终端发送的唯一识别码后,根据预设规则进行运算,并根据运算结果确定验证是否通过,验证通过后执行预设动作。8. The method according to claim 6, wherein the step of verifying the authentication device after receiving the unique identification code sent by the mobile terminal comprises: after receiving the unique identification code sent by the mobile terminal, according to The preset rules perform calculations, and determine whether the verification is passed according to the calculation results, and execute the preset actions after the verification is passed. 9.如权利要求6所述的方法,其特征在于,进一步包括:所述手机终端登录一网络访问地址,根据预知的用户名和密码,获得相应的标识该手机终端使用者身份的唯一识别码。9. The method according to claim 6, further comprising: the mobile terminal logs into a network access address, and obtains a corresponding unique identification code identifying the identity of the mobile terminal user according to the user name and password. 10.如权利要求6所述的方法,其特征在于,所述认证装置在检测到手机终端的配对请求后,与该终端进行配对的步骤,包括:在同一时刻仅允许一个手机终端进行连接配对。10. The method according to claim 6, wherein, after the authentication device detects the pairing request of the mobile terminal, the step of pairing with the terminal comprises: allowing only one mobile terminal to perform connection pairing at the same time .
CN201310739325.7A 2013-12-26 2013-12-26 Authentication system and method using handset as validation terminal Pending CN103729903A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310739325.7A CN103729903A (en) 2013-12-26 2013-12-26 Authentication system and method using handset as validation terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310739325.7A CN103729903A (en) 2013-12-26 2013-12-26 Authentication system and method using handset as validation terminal

Publications (1)

Publication Number Publication Date
CN103729903A true CN103729903A (en) 2014-04-16

Family

ID=50453964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310739325.7A Pending CN103729903A (en) 2013-12-26 2013-12-26 Authentication system and method using handset as validation terminal

Country Status (1)

Country Link
CN (1) CN103729903A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506570A (en) * 2014-11-24 2015-04-08 张忠义 Right and wrong operation method based on hotspot searching
CN104657642A (en) * 2015-03-04 2015-05-27 北京清软时代科技有限公司 Method, device and system for identifying identity
CN105184880A (en) * 2015-08-17 2015-12-23 武汉理工大学 Sign-in system and method based on WiFi
CN105894634A (en) * 2016-04-20 2016-08-24 杭州攻壳科技有限公司 Identification system and method
CN106257957A (en) * 2015-06-16 2016-12-28 赵依军 Follow the tracks of and record the object device in specific region mobile status
CN106934620A (en) * 2017-03-21 2017-07-07 中国工商银行股份有限公司 Safety certifying method, device and security certification system
CN108288309A (en) * 2017-01-10 2018-07-17 厦门雅迅网络股份有限公司 A kind of movable attendance checking positioning system and method
CN109707204A (en) * 2019-01-10 2019-05-03 佛山市诺行科技有限公司 Mobile phone remote surmounts the method for the parking apparatus of closed interval operation
CN110969717A (en) * 2019-12-20 2020-04-07 杭州云莓科技有限公司 Accurate positioning attendance card punching method for intelligent door lock
CN111914637A (en) * 2020-06-28 2020-11-10 普瑞达建设有限公司 Intelligent face recognition integrated management method and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1158467A2 (en) * 2000-05-26 2001-11-28 Biocentric Solutions, Inc. Integrating biometric devices in time and attendance applications
CN1507203A (en) * 2002-12-05 2004-06-23 Method and system for conducting user verification to sub position of network position
US20040203408A1 (en) * 2002-07-11 2004-10-14 Say-Yee Wen System and method for logging in an interactive instructional system
CN1556449A (en) * 2004-01-08 2004-12-22 中国工商银行 Device and method for proceeding encryption and identification of network bank data
CN101422058A (en) * 2006-04-19 2009-04-29 法国电信公司 Method of securing access to a proximity communication module in a mobile terminal
CN101593372A (en) * 2009-06-19 2009-12-02 中兴通讯股份有限公司 Work attendance method, device and system based on Bluetooth technology
CN101714266A (en) * 2009-12-08 2010-05-26 中兴通讯股份有限公司 System, device and method for realizing attendance
CN101763670A (en) * 2009-12-07 2010-06-30 中兴通讯股份有限公司 Method and system for unlocking mobile phone key
CN102819876A (en) * 2012-08-24 2012-12-12 李凯 Mobile phone attendance checking system and its realizing method
CN103369635A (en) * 2013-07-29 2013-10-23 广州市沃希信息科技有限公司 Sign-in method, mobile terminal and sign-in server

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1158467A2 (en) * 2000-05-26 2001-11-28 Biocentric Solutions, Inc. Integrating biometric devices in time and attendance applications
US20040203408A1 (en) * 2002-07-11 2004-10-14 Say-Yee Wen System and method for logging in an interactive instructional system
CN1507203A (en) * 2002-12-05 2004-06-23 Method and system for conducting user verification to sub position of network position
CN1556449A (en) * 2004-01-08 2004-12-22 中国工商银行 Device and method for proceeding encryption and identification of network bank data
CN101422058A (en) * 2006-04-19 2009-04-29 法国电信公司 Method of securing access to a proximity communication module in a mobile terminal
CN101593372A (en) * 2009-06-19 2009-12-02 中兴通讯股份有限公司 Work attendance method, device and system based on Bluetooth technology
CN101763670A (en) * 2009-12-07 2010-06-30 中兴通讯股份有限公司 Method and system for unlocking mobile phone key
CN101714266A (en) * 2009-12-08 2010-05-26 中兴通讯股份有限公司 System, device and method for realizing attendance
CN102819876A (en) * 2012-08-24 2012-12-12 李凯 Mobile phone attendance checking system and its realizing method
CN103369635A (en) * 2013-07-29 2013-10-23 广州市沃希信息科技有限公司 Sign-in method, mobile terminal and sign-in server

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506570B (en) * 2014-11-24 2017-12-29 张忠义 A kind of based on hotspot lookup is non-operating method
CN104506570A (en) * 2014-11-24 2015-04-08 张忠义 Right and wrong operation method based on hotspot searching
CN104657642B (en) * 2015-03-04 2019-06-28 北京清软时代科技有限公司 Personal identification method, apparatus and system
CN104657642A (en) * 2015-03-04 2015-05-27 北京清软时代科技有限公司 Method, device and system for identifying identity
CN106257957A (en) * 2015-06-16 2016-12-28 赵依军 Follow the tracks of and record the object device in specific region mobile status
CN106257957B (en) * 2015-06-16 2021-12-17 赵依军 Device for tracking and recording moving state of object in specific area
CN105184880A (en) * 2015-08-17 2015-12-23 武汉理工大学 Sign-in system and method based on WiFi
CN105894634A (en) * 2016-04-20 2016-08-24 杭州攻壳科技有限公司 Identification system and method
CN108288309A (en) * 2017-01-10 2018-07-17 厦门雅迅网络股份有限公司 A kind of movable attendance checking positioning system and method
CN108288309B (en) * 2017-01-10 2022-04-08 厦门雅迅网络股份有限公司 Mobile attendance positioning system and method
CN106934620A (en) * 2017-03-21 2017-07-07 中国工商银行股份有限公司 Safety certifying method, device and security certification system
CN109707204A (en) * 2019-01-10 2019-05-03 佛山市诺行科技有限公司 Mobile phone remote surmounts the method for the parking apparatus of closed interval operation
CN110969717A (en) * 2019-12-20 2020-04-07 杭州云莓科技有限公司 Accurate positioning attendance card punching method for intelligent door lock
CN111914637A (en) * 2020-06-28 2020-11-10 普瑞达建设有限公司 Intelligent face recognition integrated management method and system
CN111914637B (en) * 2020-06-28 2021-05-04 普瑞达建设有限公司 Intelligent face recognition integrated management method and system

Similar Documents

Publication Publication Date Title
CN103729903A (en) Authentication system and method using handset as validation terminal
US11170592B2 (en) Electronic access control system
US10659457B2 (en) Information processing device, information processing system, and information processing method
CN104202306B (en) Access authentication method, Apparatus and system
CN106170793B (en) System, method and apparatus for secure log
CN104008325B (en) Mobile phone wireless Wi-Fi on-Internet true name identity authentication platform based on Quick Response Code and method
CN103229184A (en) Method and system for accessing secure resources
CN105450614B (en) A kind of server account logon method, device and system
TWI679553B (en) Method, system and intelligent equipment for checking tickets based on user interface
CN104091376A (en) Intelligent lock control method and apparatus thereof
CN206522020U (en) A kind of intelligent door lock and system
CN105187412B (en) A kind of login authentication method based on gesture identification, apparatus and system
CN105656627A (en) Identity verification method, device and system
CN104247484B (en) terminal device, communication method, computer-readable storage medium, and communication system
CN109643473A (en) A kind of method, apparatus and system of identity legitimacy verifying
CN106127900A (en) A kind of user identity comprehensive verification method for unlocking and device
CN105915714A (en) Method and device for prompting terminal loss
KR20220035880A (en) Method and system for reporting and monitoring location-related activity of a mobile device
CN105631254A (en) Unlocking method and unlocking device
WO2018082232A1 (en) Method and device for identifying signature, mobile terminal and cloud server
CN107548059A (en) A kind of authentication method and system
CN105207987A (en) Fingerprint identification system based on Bluetooth mobile phone terminal
KR102308859B1 (en) Surrogate authentication service system and method based on biometric information
US20150016698A1 (en) Electronic device providing biometric authentication based upon multiple biometric template types and related methods
WO2022208598A1 (en) Authentication system and authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140416

RJ01 Rejection of invention patent application after publication