Summary of the invention
Technical matters to be solved by this invention is to provide a kind of Verification System and method using mobile phone as verification terminal, to overcome the needed verification terminal of existing authenticating device, needs to make separately, causes high, the awkward problem of integrated cost.
For solving the problems of the technologies described above, the invention provides a kind of Verification System using mobile phone as verification terminal, comprising: mobile phone terminal and authenticate device, wherein:
Described mobile phone terminal, comprising:
Identification code memory module, for storing the unique identifier of this mobile phone terminal of sign user identity;
Wireless scan module for scanning around whether have default authentication service signal, and sends pairing request after scanning;
Identification code sending module, for after successful matching, sends the unique identifier being stored in described identification code memory module;
Described authenticate device, comprising:
Radio broadcasting module, for broadcast authentication service signal towards periphery;
Connect matching module, for detecting after the pairing request of mobile phone terminal, match with this terminal;
Authentication module, for verifying after the unique identifier receiving mobile phone terminal transmission, is verified rear execution deliberate action.
The present invention and then a kind of authentication method using mobile phone as verification terminal is also provided, is applied in the system that comprises mobile phone terminal and authenticate device, comprises the steps:
In mobile phone terminal, store the unique identifier of this mobile phone terminal of sign user identity;
By described authenticate device broadcast authentication service signal towards periphery;
By described mobile phone terminal scanning, whether there is default authentication service signal around, and after scanning, send pairing request;
Described authenticate device is detecting after the pairing request of mobile phone terminal, is matching with this terminal;
Described mobile phone terminal, after successful matching, sends the unique identifier being stored in described identification code memory module;
Described authenticate device is verified, is verified rear execution deliberate action after the unique identifier of receiving mobile phone terminal transmission.
Application embodiments of the invention, on the one hand by the unique identifier of this mobile phone terminal of storaging mark user identity in mobile phone, utilize on the other hand authenticate device real time scan mobile phone terminal around, after scanning, by mobile phone terminal, send to authenticate device can authenticate identification unique identifier, so, can combine with authenticate device mobile phone terminal as verification terminal, the carry-on convenience that makes full use of mobile phone terminal can replace the verification terminals such as traditional IC-card, no longer need again to make separately, provide cost savings greatly, improved the convenience using simultaneously.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Along with scientific and technological development, mobile phone relies on powerful function and ease for use, has become people's indispensable essential object of going out, and people are very high to the degree of dependence of mobile phone.Therefore, core concept of the present invention by using mobile phone as a kind of verification terminal and authenticating device in connection with, form complete Verification System, no longer need to make separately the verification terminal of other IC-card classes.
Please refer to Fig. 1, for according to the Verification System schematic diagram using mobile phone as verification terminal described in the embodiment of the present invention, comprising: mobile phone terminal 10 and authenticate device 20, wherein:
Described mobile phone terminal 10, comprising:
Identification code memory module 11, for storing the unique identifier of this mobile phone terminal of sign user identity;
Wireless scan module 12 for scanning around whether have default authentication service signal, and sends pairing request after scanning;
Identification code sending module 13, for after successful matching, sends the unique identifier being stored in described identification code memory module;
Described authenticate device 20, comprising:
Radio broadcasting module 21, for broadcast authentication service signal towards periphery;
Connect matching module 22, for detecting after the pairing request of mobile phone terminal, match with this terminal;
Authentication module 23, for verifying after the unique identifier receiving mobile phone terminal transmission, is verified rear execution deliberate action.
According to embodiments of the invention, authenticate device (for example punched-card machine) itself can be supported multiple wireless protocols, comprise bluetooth, NFC(near-field communication, Near Field Communication), WiFi direct is infrared etc., and for mobile phone, only need to support the wireless protocols of one of them.Because each mobile phone producer is when producing mobile phone, for the consideration of various commercial factors, can't be very comprehensive to the support of invalidation protocol, one to two kind of invalidation protocol is often only provided, therefore, for authenticate device, can all provide support according to the various invalidation protocol that comprise in market, so just can carry out communication with whole mobile phone terminals.
In mobile phone terminal, can be in identification code memory module 11, a for example pre-stored unique identifier in storer, by this unique identifier, user's identity of this mobile phone terminal of sign that can be unique, is equivalent to No. ID or string number in IC-card.
This unique identifier can be pre-stored in mobile phone terminal in several ways, for example, can unique identifier be write to mobile phone terminal by special write device, one login module also can be installed in mobile phone terminal, be used for logining an access to netwoks address, this reference address backstage arranges a database, can be according to the username and password of precognition, obtain the unique identifier of corresponding this mobile phone terminal of sign user identity, and be downloaded in mobile phone terminal.
In this way, take gate control system as example, employee can inform by authentication employee's username and password in company, and in background data base, generates unique identifier that should employee's identity, and this employee can access voluntarily this database by mobile phone terminal and obtain unique identifier.
For example, as the authenticate device (punched-card machine) 20 of receiving end, can be regularly the time interval of 1 second (for example with) with own all wireless modes of being supported to around scan, broadcast the existence of the authentication service of oneself.
And on the other hand, mobile phone, as verification terminal, after open-authentication function, can use its wireless mode of supporting all the time, by wireless scan module 12, whether scanning there is default authentication service signal around, and after scanning, sends pairing request.
At this moment, mobile phone terminal can be imagined as to an IC-card, in the time of near user's carrying mobile phone is gone to entrance guard device, just be equivalent to that IC-card is pressed close to gate inhibition the same, the near field home control network communication protocol of all supporting by authenticate device and mobile phone terminal, makes both mutual communications.
According to embodiments of the invention, the connection matching module 22 of authenticate device is detecting after the pairing request of mobile phone terminal, attempts immediately matching with this terminal, and between has been set up wireless communication connection immediately.
Smooth and easy for guaranteeing communication, described connection matching module 22 can be designed as at synchronization and only allows a mobile phone terminal to connect pairing.After current phone terminal has been matched, then the mobile phone terminal that carries out detecting with the next one matches.This is just equivalent to the IC-card checking of using at present, only has after previous IC-card leaves, and could brush next IC-card.
After successful matching, the identification code sending module 13 in mobile phone terminal, the unique identifier that is about to be stored in described identification code memory module sends to authenticate device 20.
Authentication module 23 in authenticate device 20 is verified after the unique identifier of receiving mobile phone terminal transmission, is verified rear execution deliberate action.
The verification mode of authentication module 23 can adopt many algorithms, for example, a database can be set, for the unique identifier of storaging mark mobile phone terminal user identity; And described authentication module 23 is being received after the unique identifier that mobile phone terminal sends, compare with the identification code of storing in described database, as exist consistent identification code to be verified, and carry out deliberate action.
Still take gate control system as example, can its storage inside there is legal identification code data storehouse, for the unique identifier of storaging mark mobile phone terminal user identity, receiving after the unique identifier of mobile phone terminal transmission, can be immediately with legal identification code storehouse in identification code compare, if existed, be verified, otherwise checking is not passed through.After being verified, can carry out the action of opening the door.
According to another embodiment of the present invention, described authentication module 23 verification algorithm that can also prestore, for receiving after the unique identifier that mobile phone terminal sends, carries out computing according to preset rules, and determine according to operation result whether checking is passed through, be verified rear execution deliberate action.
Please refer to Fig. 2, for according to the authentication method process flow diagram using mobile phone as verification terminal described in the embodiment of the present invention, it is applied in the system that comprises mobile phone terminal and authenticate device, comprises the steps:
Step 201: the unique identifier of storing this mobile phone terminal of sign user identity in mobile phone terminal;
Step 202: by described authenticate device broadcast authentication service signal towards periphery;
Step 203: whether have default authentication service signal around by described mobile phone terminal scanning, and send pairing request after scanning;
Step 204: described authenticate device is detecting after the pairing request of mobile phone terminal, matching with this terminal;
Step 205: described mobile phone terminal, after successful matching, sends the unique identifier being stored in described identification code memory module;
Step 206: described authenticate device is verified, is verified rear execution deliberate action after the unique identifier of receiving mobile phone terminal transmission.
Wherein, concrete verification mode, can take multiple means, for example, can in authenticate device, configure a database, carrys out the unique identifier of storaging mark mobile phone terminal user identity; And described authenticate device is being received after the unique identifier that mobile phone terminal sends, can compare with the identification code of storing in described database, as exist consistent identification code to be verified, and carry out deliberate action.
Or, can, receiving after the unique identifier that mobile phone terminal sends, according to preset rules, carry out computing, and determine according to operation result whether checking is passed through, be verified rear execution deliberate action.
Equally, for mobile phone terminal, obtain the mode of identification code, can login an access to netwoks address by mobile phone terminal, according to the username and password of precognition, obtain the unique identifier of corresponding this mobile phone terminal of sign user identity.
Take employee, check card attendance recorder as example, after employee is employed, can distribute to an one username and password, and in backstage correspondence, generate the unique identifier of this employee's identity of sign, be stored in database.This employee just can pass through mobile phone terminal sign-on access one network address, the application program of downloading-running this method embodiment, and input username and password, background server is inquired about and is returned to corresponding unique identifier in database according to this username and password, and is stored in the storer of mobile phone terminal.
When this employee goes to work, portability mobile phone terminal is walked close to attendance recorder, during due to attendance recorder, be engraved in the authentication service signal with multiple wireless mode broadcast oneself, as long as this employee's mobile phone terminal has been opened corresponding authentication service program, will scan authentication service signal around the moment, as long as scan the broadcast singal that attendance recorder is corresponding, will attempt the pairing between attendance recorder and mobile phone terminal, some successful matchings, mobile phone terminal can send to attendance recorder by the unique identifier being stored in storer, and attendance recorder is according to verification algorithm, can verify this unique identifier, after being verified, can record this employee's the work attendance time, if attendance recorder has connected gate control system, also can open gate inhibition, allow employee to enter.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and each embodiment stresses is and the difference of other embodiment, between each embodiment identical similar part mutually referring to.
The application can describe in the general context of the computer executable instructions of being carried out by computing machine, for example program module.Usually, program module comprises and carries out particular task or realize routine, program, object, assembly, data structure of particular abstract data type etc.Also can in distributed computing environment, put into practice the application, in these distributed computing environment, by the teleprocessing equipment being connected by communication network, be executed the task.In distributed computing environment, program module can be arranged in the local and remote computer-readable storage medium including memory device.
Finally, also it should be noted that, in this article, relational terms such as the first and second grades is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply and between these entities or operation, have the relation of any this reality or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby the process, method, commodity or the equipment that make to comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or be also included as the intrinsic key element of this process, method, commodity or equipment.The in the situation that of more restrictions not, the key element being limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment that comprises described key element and also have other identical element.
Above the application's embodiment is described in detail, has applied principle and the embodiment of specific case to the application herein and set forth, the explanation of above embodiment is just for helping to understand the application's method and core concept thereof; , for one of ordinary skill in the art, according to the application's thought, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application meanwhile.