CN109714466B - Dynamic password authentication processing method and device and mobile terminal thereof - Google Patents
Dynamic password authentication processing method and device and mobile terminal thereof Download PDFInfo
- Publication number
- CN109714466B CN109714466B CN201711017152.2A CN201711017152A CN109714466B CN 109714466 B CN109714466 B CN 109714466B CN 201711017152 A CN201711017152 A CN 201711017152A CN 109714466 B CN109714466 B CN 109714466B
- Authority
- CN
- China
- Prior art keywords
- terminal
- mobile terminal
- distance
- sending
- dynamic password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 19
- 238000000034 method Methods 0.000 claims abstract description 18
- 238000012545 processing Methods 0.000 claims abstract description 15
- 238000004891 communication Methods 0.000 claims description 33
- 238000001514 detection method Methods 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 7
- 230000002159 abnormal effect Effects 0.000 abstract description 3
- 230000035945 sensitivity Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 11
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention provides a dynamic password authentication processing method, a dynamic password authentication processing device and a mobile terminal thereof, wherein the method comprises the following steps: acquiring the distance between the mobile terminal and a reference object; judging whether the distance exceeds a preset safety distance threshold value; if yes, a terminal loss instruction is sent to the network side so that the network side stops sending the short message related to the dynamic password authentication to the mobile terminal. According to the dynamic password authentication processing method, the device and the mobile terminal, the trigger mode for sending the terminal loss instruction can be authorized terminal trigger and mobile terminal automatic trigger, the forbidden dynamic password authentication mode can be started after the mobile terminal is lost or stolen, the sending of the short message is forbidden, the risk avoidance can be performed on the account number of the user, the abnormal use of the mobile terminal APP and the like, and the use sensitivity of the user is improved.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a dynamic password authentication processing method and apparatus, and a mobile terminal thereof.
Background
With the development of socio-economy, terminals have become an indispensable component of people's lives. The terminal often stores a large amount of private information of the user, such as information of a bound bank card. Currently, the authentication method for the mobile terminal APP includes: fixed password authentication, dynamic password authentication, fingerprint authentication, gesture authentication, and the like. Besides logging in the APP, the dynamic password is also an important way for finding the password or resetting the password and logging in the PC side application. When the mobile terminal is lost, other authentication modes such as fingerprint authentication, gesture authentication and the like have certain safety protection, and the dynamic password authentication mode has great potential safety hazard. If the mobile phone of the user is lost, other people can acquire the passwords of the mobile terminal APP and the like in a dynamic password authentication mode, and safety risks can be brought to the user.
Disclosure of Invention
In view of the above, one or more embodiments of the present invention provide a dynamic password authentication processing method and apparatus, and a mobile terminal thereof.
According to an aspect of the present disclosure, there is provided a dynamic password authentication processing method, including: acquiring the distance between the mobile terminal and a reference object; judging whether the distance exceeds a preset safety distance threshold value; if yes, a terminal loss instruction is sent to the network side, so that the network side stops sending the short message related to the dynamic password authentication to the mobile terminal.
Optionally, the reference comprises: the intelligent wearable equipment; the acquiring the distance between the mobile terminal and the reference object comprises: and controlling the mobile terminal and the intelligent wearable equipment to establish wireless communication connection, and calculating the distance between the mobile terminal and the intelligent wearable equipment.
Optionally, if the wireless communication connection is successfully established, calculating a distance between the mobile terminal and the intelligent wearable device based on a wireless signal corresponding to the wireless communication connection; wherein the wireless communication connection comprises: bluetooth, WIFI, NFC connection.
Optionally, if it is determined that the distance does not exceed the safe distance threshold, acquiring an identification code of the intelligent wearable device, and matching the identification code with a preset effective identification code of the intelligent wearable device; if the matching is unsuccessful, determining that the distance exceeds a preset safe distance threshold; wherein the identification code comprises: intelligent wearing equipment name, serial number, firm serial number.
Optionally, if the wireless communication connection is established unsuccessfully, determining that the distance exceeds a preset safe distance threshold.
Optionally, the smart wearable device includes: intelligence wrist-watch, intelligent bracelet, bluetooth headset.
Optionally, setting an authorized terminal number; when sending the terminal loss instruction to the network side, sending the terminal loss notification information to the authorized terminal.
Optionally, if a terminal loss notification sent by the authorized terminal is received, the terminal loss instruction is sent to the network side.
Optionally, the sending the terminal loss instruction to the network side includes: sending the terminal loss instruction to an operator short message business hall; and the operator short message business hall adds the number of the mobile terminal into a dynamic password forbidden list according to the terminal loss instruction.
Optionally, the causing the network side to stop sending the short message related to the dynamic password authentication to the mobile terminal includes: the short message gateway receives a short message related to the dynamic password authentication; judging whether the receiving number of the short message related to the dynamic password authentication is in the dynamic password forbidden list or not; and if so, prohibiting the sending of the short message related to the dynamic password authentication.
According to another aspect of the present disclosure, there is provided a dynamic password authentication processing apparatus including: the distance detection module is used for acquiring the distance between the mobile terminal and a reference object; the safety distance determining module is used for judging whether the distance exceeds a preset safety distance threshold value; and the instruction sending module is used for sending a terminal loss instruction to the network side if the distance exceeds the safe distance so as to enable the network side to stop sending the short message related to the dynamic password authentication to the mobile terminal.
Optionally, the reference comprises: the intelligent wearable equipment; the distance detection module is used for controlling the mobile terminal and the intelligent wearable device to establish wireless communication connection, and calculating the distance between the mobile terminal and the intelligent wearable device.
Optionally, the distance detection module is configured to calculate, if the wireless communication connection is successfully established, a distance between the mobile terminal and the smart wearable device based on a wireless signal corresponding to the wireless communication connection; wherein the wireless communication connection comprises: bluetooth, WIFI, NFC connection.
Optionally, the safe distance determining module is configured to, if it is determined that the distance does not exceed the safe distance threshold, obtain an identification code of the intelligent wearable device, and match the identification code with a preset identification code valid for the intelligent wearable device; if the matching is unsuccessful, determining that the distance exceeds a preset safe distance threshold; wherein the identification code comprises: intelligent wearing equipment name, serial number, firm serial number.
Optionally, the safe distance determining module is configured to determine that the distance exceeds a preset safe distance threshold if the wireless communication connection is failed to be established.
Optionally, the smart wearable device includes: intelligence wrist-watch, intelligent bracelet, bluetooth headset.
Optionally, the lost state management module is configured to set an authorized terminal number; the instruction sending module is used for sending terminal loss notification information to the authorized terminal when sending a terminal loss instruction to the network side.
Optionally, the loss state management module is configured to receive a terminal loss notification sent by the authorized terminal; the instruction sending module is used for sending the terminal loss instruction to a network side if receiving the terminal loss notification.
According to still another aspect of the present disclosure, there is provided a mobile terminal including the dynamic password authentication processing apparatus as described above.
According to still another aspect of the present disclosure, there is provided a dynamic password authentication processing apparatus including: a memory; and a processor coupled to the memory, the processor configured to perform the dynamic password authentication processing method as described above based on instructions stored in the memory.
According to yet another aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by one or more processors, implement the steps of the method as described above.
The disclosed dynamic password authentication processing method, device and mobile terminal thereof obtain the distance between the mobile terminal and a reference object, and when judging that the distance exceeds a preset safety distance threshold, send a terminal loss instruction to a network side so that the network side stops sending short messages related to dynamic password authentication to the mobile terminal; the triggering mode of sending the terminal loss instruction can be authorized terminal triggering and mobile terminal automatic triggering, the forbidden dynamic password authentication mode can be started after the mobile terminal is lost or stolen, the sending of the short messages is forbidden, risks such as abnormal use of the account number of the user and the APP of the mobile terminal can be avoided, and the use experience of the user is improved.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without inventive exercise.
FIG. 1 is a schematic flow chart diagram illustrating one embodiment of a dynamic password authentication processing method according to the present disclosure;
FIG. 2 is a schematic flow chart diagram illustrating another embodiment of a dynamic password authentication processing method according to the present disclosure;
FIG. 3 is a block diagram illustrating one embodiment of a dynamic password authentication processing apparatus according to the present disclosure;
fig. 4 is a block diagram of another embodiment of a dynamic password authentication processing apparatus according to the present disclosure.
Detailed Description
The present disclosure now will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the disclosure are shown. The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
Fig. 1 is a schematic flowchart of an embodiment of a dynamic password authentication processing method according to the present disclosure, as shown in fig. 1:
And 102, judging whether the distance exceeds a preset safe distance threshold value.
The owner can preset a plurality of safe distance threshold values according to own requirements and store the safe distance threshold values in the mobile terminal, wherein the safe distance threshold values are 1 meter, 2 meters and the like.
And 103, if yes, sending a terminal loss instruction to the network side so that the network side stops sending the short message related to the dynamic password authentication to the mobile terminal. The terminal loss instruction can be sent in the form of short message and the like.
The reference object can be various, such as an intelligent wearable device. Intelligence wearing equipment includes: intelligent wrist-watch, intelligent bracelet, bluetooth headset etc.. And controlling the mobile terminal and the intelligent wearable device to establish wireless communication connection, and calculating the distance between the mobile terminal and the intelligent wearable device. Regularly checking whether a safety distance threshold value is exceeded between the mobile terminal and the intelligent wearable device, if so, setting a terminal loss state to be 1, and sending a terminal loss instruction.
There may be various methods for calculating the distance between the current mobile terminal and the reference object. For example, wireless communication connection is established between the mobile terminal and the intelligent wearable device, and the distance between the mobile terminal and the intelligent wearable device is calculated. If the wireless communication connection is successfully established, calculating the distance between the mobile terminal and the intelligent wearable device through a preset algorithm and based on a wireless signal corresponding to the wireless communication connection, wherein the wireless communication connection comprises the following steps: bluetooth, WIFI, NFC connection. The wireless signals comprise Bluetooth signals, WIFI signals and the like.
If the distance does not exceed the safety distance threshold value, the identification code of the intelligent wearable device is obtained, and the identification code is matched with the preset effective identification code of the intelligent wearable device. The effective identification code of the preset intelligent wearable device is the identification code of the intelligent wearable device preset by the owner, for example, the identification code of the bluetooth headset of the owner.
The identification code of intelligence wearing equipment includes: the name, the serial number, the manufacturer number and the like of the intelligent wearable device can also be a combination of the name, the serial number, the manufacturer number and the like. If the obtained identification code of the intelligent wearable device is successfully matched with the preset effective identification code of the intelligent wearable device, the intelligent wearable device is determined to be the intelligent wearable device of the owner or the intelligent wearable device allowed by the owner, and the distance is determined not to exceed the preset safety distance threshold value. If the obtained identification code of the intelligent wearable device is unsuccessfully matched with the preset effective identification code of the intelligent wearable device, the intelligent wearable device is determined not to be the intelligent wearable device of the owner or the intelligent wearable device allowed by the owner, and the distance is determined to exceed the preset safety distance threshold value. And if the wireless communication connection between the mobile terminal and the intelligent wearable device fails, determining that the distance exceeds a preset safe distance threshold.
In one embodiment, the triggering mode for sending the terminal loss instruction may be triggered by an authorized terminal, and is suitable for a user to find that a mobile phone terminal is lost and not determine the specific position of the mobile phone terminal. The authorized terminal can be a PC, a smart phone and the like. The triggering mode of sending the terminal loss instruction can also be automatic triggering, and when the distance between the associated intelligent wearable device and the mobile terminal is determined to be larger than a preset safe distance threshold value, the terminal loss instruction is triggered and sent, so that the method and the device are suitable for the situation that a user does not find that the mobile phone terminal is lost, but the mobile phone terminal is far away from the user. When one of the two conditions is met, the loss protection is started, and the dynamic password authentication mode is forbidden through the interception of the short message gateway of the operator.
The mobile terminal is responsible for managing, modifying the lost state, managing the number of the authorized terminal, receiving the loss request of the authorized terminal, managing the safe distance threshold value and the like. And setting an authorized terminal number, and sending terminal loss notification information to the authorized terminal when sending a terminal loss instruction to the network side. The terminal loss notification message can be sent in various ways, such as a short message.
When the user finds that the mobile phone is lost, the user can send a terminal loss notification to the mobile terminal of the user through the authorized terminal, and the terminal loss notification can be in the form of short messages and the like. The user can initiate the notice of terminal loss by himself or entrust others through the authorized terminal. And if the mobile terminal of the user receives the terminal loss notification sent by the authorized terminal, sending a terminal loss instruction to the network side.
The mobile terminal sends a terminal loss instruction to the short message service hall of the operator, and the short message service hall of the operator adds the number of the mobile terminal into the forbidden list of the dynamic password according to the terminal loss instruction. And the short message gateway receives the short message related to the dynamic password authentication, judges whether the receiving number of the short message related to the dynamic password authentication is in the forbidden list of the dynamic password, and if so, prohibits the short message related to the dynamic password authentication from being sent. For example, the short message gateway receives a short message sent by a bank short number from the beginning of '106', judges whether the received number is in the dynamic password forbidden list, and if so, intercepts the received number and forbids the sending of the short message. The user can also send a terminal recovery instruction to the operator short message business hall through the mobile terminal, and the operator short message business hall moves the number of the mobile terminal out of the dynamic password forbidden list according to the terminal recovery instruction.
Fig. 2 is a schematic flowchart of another embodiment of a dynamic password authentication processing method according to the present disclosure, as shown in fig. 2:
And 203, calculating the distance between the mobile terminal and the intelligent wearable device.
And step 204, if the distance exceeds the preset safe distance threshold value, sending a terminal loss instruction to the short message service hall of the operator.
And step 206, the operator short message business hall adds the number of the mobile terminal into the dynamic password forbidden list according to the terminal loss instruction.
And step 208, if so, prohibiting the sending of the short message related to the dynamic password authentication.
In one embodiment, as shown in fig. 3, the present disclosure provides a dynamic password authentication processing apparatus 30, including: a distance detection module 31, a safe distance determination module 32, an instruction transmission module 33, and a loss state management module 34.
The distance detection module 31 acquires a distance between the mobile terminal and the reference object. The safe distance determination module 32 determines whether the distance exceeds a preset safe distance threshold. If the distance exceeds the safe distance, the instruction sending module 33 sends a terminal loss instruction to the network side, so that the network side stops sending the short message related to the dynamic password authentication to the mobile terminal.
The reference object comprises intelligent wearable equipment and the like. The distance detection module 31 controls the mobile terminal and the intelligent wearable device to establish wireless communication connection, and calculates the distance between the mobile terminal and the intelligent wearable device. If the wireless communication connection is successfully established, the distance detection module 31 calculates the distance between the mobile terminal and the intelligent wearable device based on the wireless signal corresponding to the wireless communication connection. The wireless communication connection includes bluetooth, WIFI, NFC connection, and the like.
If the safe distance determining module 32 determines that the distance does not exceed the safe distance threshold, the identification code of the intelligent wearable device is obtained, and the identification code is matched with a preset effective identification code of the intelligent wearable device. If the matching is not successful, the safe distance determination module 32 determines that the distance exceeds a preset safe distance threshold, and the identification code includes: intelligent wearing equipment name, serial number, manufacturer serial number etc.. If the wireless communication connection is not established, the safe distance determination module 32 determines that the distance exceeds a preset safe distance threshold.
The loss state management module 34 sets an authorized terminal number. When the instruction sending module 33 sends a terminal loss instruction to the network side, it sends a terminal loss notification message to the authorized terminal. The lost state management module 34 receives a terminal loss notification sent by an authorized terminal. If the receiving terminal is lost, the instruction sending module 33 sends a terminal loss instruction to the network side.
In one embodiment, the present disclosure provides a mobile terminal including the dynamic password authentication processing apparatus as in any of the above embodiments.
Fig. 4 is a block diagram of another embodiment of a dynamic password authentication processing apparatus according to the disclosure. As shown in fig. 4, the apparatus may include a memory 41, a processor 42, a communication interface 43, and a bus 44. The memory 41 is used for storing instructions, the processor 42 is coupled to the memory 41, and the processor 42 is configured to execute the dynamic password authentication processing method based on the instructions stored in the memory 41.
The memory 41 may be a high-speed RAM memory, a nonvolatile memory (NoN-volatile memory), or the like, and the memory 41 may be a memory array. The storage 41 may also be partitioned, and the blocks may be combined into virtual volumes according to certain rules. The processor 42 may be a central processing unit CPU, or an application Specific Integrated circuit asic, or one or more Integrated circuits configured to implement the dynamic password authentication processing methods disclosed herein.
In one embodiment, the present disclosure also provides a computer-readable storage medium, where the computer-readable storage medium stores computer instructions, and the instructions, when executed by a processor, implement the dynamic password authentication processing method according to any of the above embodiments. As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, apparatus, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Thus far, the present disclosure has been described in detail. Some details that are well known in the art have not been described in order to avoid obscuring the concepts of the present disclosure. It will be fully apparent to those skilled in the art from the foregoing description how to practice the presently disclosed embodiments.
The dynamic password authentication processing method, the dynamic password authentication processing device and the mobile terminal thereof, provided by the embodiments, obtain a distance between the mobile terminal and a reference object, and send a terminal loss instruction to the network side when the distance is judged to exceed a preset safety distance threshold value, so that the network side stops sending a short message related to dynamic password authentication to the mobile terminal; the triggering mode of sending the terminal loss instruction can be authorized terminal triggering and mobile terminal automatic triggering, the forbidden dynamic password authentication mode can be started after the mobile terminal is lost or stolen, the sending of the short messages is forbidden, risks such as abnormal use of the account number of the user and the APP of the mobile terminal can be avoided, and the use experience of the user is improved.
The method and system of the present disclosure may be implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs including machine-readable instructions for implementing the methods according to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
The description of the present disclosure has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the disclosure in the form disclosed. Many modifications and variations will be apparent to practitioners skilled in this art. The embodiment was chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.
Claims (12)
1. A dynamic password authentication processing method comprises the following steps:
acquiring the distance between the mobile terminal and a reference object; wherein the reference object comprises: the intelligent wearable device is used for controlling the mobile terminal to establish wireless communication connection with the intelligent wearable device and calculating the distance between the mobile terminal and the intelligent wearable device;
judging whether the distance exceeds a preset safety distance threshold value;
if yes, sending a terminal loss instruction to the network side so that the network side stops sending the short message related to the dynamic password authentication to the mobile terminal; wherein, the sending the terminal loss instruction to the network side includes: sending the terminal loss instruction to an operator short message business hall; the operator short message business hall adds the number of the mobile terminal into a dynamic password forbidden list according to the terminal loss instruction;
if the distance is determined not to exceed the safe distance threshold, acquiring an identification code of the intelligent wearable device, and matching the identification code with a preset effective identification code of the intelligent wearable device; if the matching is unsuccessful, determining that the distance exceeds a preset safe distance threshold; wherein the identification code comprises: the intelligent wearable equipment comprises an intelligent wearable equipment name, a serial number and a manufacturer number;
setting an authorized terminal number; the sending the terminal loss instruction to the network side includes: sending terminal loss notification information to an authorized terminal; and if receiving a terminal loss notification sent by the authorized terminal, sending a terminal loss instruction to a network side.
2. The method of claim 1, further comprising:
if the wireless communication connection is successfully established, calculating the distance between the mobile terminal and the intelligent wearable device based on a wireless signal corresponding to the wireless communication connection;
wherein the wireless communication connection comprises: bluetooth, WIFI, NFC connection.
3. The method of claim 2, further comprising:
and if the wireless communication connection is failed to be established, determining that the distance exceeds a preset safe distance threshold.
4. The method of claim 3, wherein,
the intelligence wearing equipment includes: intelligence wrist-watch, intelligent bracelet, bluetooth headset.
5. The method of claim 1, wherein the stopping the network side from sending the short message related to the dynamic password authentication to the mobile terminal comprises:
the short message gateway receives a short message related to the dynamic password authentication;
judging whether the receiving number of the short message related to the dynamic password authentication is in the dynamic password forbidden list or not;
and if so, prohibiting the sending of the short message related to the dynamic password authentication.
6. A dynamic password authentication processing apparatus comprising:
the distance detection module is used for acquiring the distance between the mobile terminal and a reference object; wherein the reference object comprises: the intelligent wearable equipment; the distance detection module is specifically used for controlling the mobile terminal and the intelligent wearable device to establish wireless communication connection, and calculating the distance between the mobile terminal and the intelligent wearable device;
the safety distance determining module is used for judging whether the distance exceeds a preset safety distance threshold value;
the instruction sending module is used for sending a terminal loss instruction to the network side if the distance exceeds the safe distance so as to enable the network side to stop sending the short message related to the dynamic password authentication to the mobile terminal; the sending the terminal loss instruction to the network side includes: sending the terminal loss instruction to an operator short message business hall; the operator short message business hall adds the number of the mobile terminal into a dynamic password forbidden list according to the terminal loss instruction;
the safety distance determining module is further configured to, if it is determined that the distance does not exceed the safety distance threshold, obtain an identification code of the intelligent wearable device, and match the identification code with a preset identification code valid for the intelligent wearable device; if the matching is unsuccessful, determining that the distance exceeds a preset safe distance threshold; wherein the identification code comprises: the intelligent wearable equipment comprises an intelligent wearable equipment name, a serial number and a manufacturer number;
a lost state management module for setting an authorized terminal number;
the loss state management module is used for receiving a terminal loss notice sent by the authorized terminal; wherein, the sending the terminal loss instruction to the network side includes: sending terminal loss notification information to an authorized terminal; and if the terminal loss notification is received, sending the terminal loss instruction to a network side.
7. The apparatus of claim 6, wherein,
the distance detection module is used for calculating the distance between the mobile terminal and the intelligent wearable device based on a wireless signal corresponding to the wireless communication connection if the wireless communication connection is established successfully;
wherein the wireless communication connection comprises: bluetooth, WIFI, NFC connection.
8. The apparatus of claim 7, wherein,
the safe distance determining module is used for determining that the distance exceeds a preset safe distance threshold value if the wireless communication connection is failed to be established.
9. The apparatus of claim 8, wherein,
the intelligence wearing equipment includes: intelligence wrist-watch, intelligent bracelet, bluetooth headset.
10. A mobile terminal, comprising:
the dynamic password authentication processing apparatus according to any one of claims 6 to 9.
11. A safety shield apparatus, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the dynamic cryptographic authentication processing method of any of claims 1 to 5 based on instructions stored in the memory.
12. A computer readable storage medium having stored thereon computer program instructions which, when executed by one or more processors, implement the steps of the method of any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711017152.2A CN109714466B (en) | 2017-10-26 | 2017-10-26 | Dynamic password authentication processing method and device and mobile terminal thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711017152.2A CN109714466B (en) | 2017-10-26 | 2017-10-26 | Dynamic password authentication processing method and device and mobile terminal thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109714466A CN109714466A (en) | 2019-05-03 |
CN109714466B true CN109714466B (en) | 2021-08-17 |
Family
ID=66253487
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711017152.2A Active CN109714466B (en) | 2017-10-26 | 2017-10-26 | Dynamic password authentication processing method and device and mobile terminal thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109714466B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113489828A (en) * | 2021-07-06 | 2021-10-08 | 中国银行股份有限公司 | Verification code locking method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1684411A (en) * | 2004-04-13 | 2005-10-19 | 华为技术有限公司 | Method for verifying user's legitimate of mobile terminal |
CN1848891A (en) * | 2006-04-05 | 2006-10-18 | 中国移动通信集团公司 | Method for Network Detecting Anti-theft Terminal Status |
CN104348959A (en) * | 2013-08-01 | 2015-02-11 | 展讯通信(上海)有限公司 | Mobile terminal alarm method and device |
CN104462929A (en) * | 2014-11-27 | 2015-03-25 | 广东欧珀移动通信有限公司 | Privacy protection method and device for mobile equipment |
CN105072596A (en) * | 2015-07-02 | 2015-11-18 | 上海与德通讯技术有限公司 | Privacy protection method for mobile terminal |
CN105100130A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Terminal device and terminal device theft prevention method and system |
CN106331169A (en) * | 2016-10-14 | 2017-01-11 | 深圳天珑无线科技有限公司 | Method for reporting loss of mobile terminal and cloud customer terminal, cloud server, mobile terminal |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101350720B (en) * | 2007-07-18 | 2011-12-28 | 中国移动通信集团公司 | Dynamic cipher authentication system and method |
CN104332012A (en) * | 2014-10-31 | 2015-02-04 | 小米科技有限责任公司 | Anti-theft method and device of terminal device |
CN105678124A (en) * | 2014-11-20 | 2016-06-15 | 华为终端(东莞)有限公司 | Device and method for enhancing terminal safety |
CN105992125B (en) * | 2015-02-16 | 2020-01-10 | 阿里巴巴集团控股有限公司 | Method and device for protecting safety of electronic equipment |
CN106657587A (en) * | 2016-09-30 | 2017-05-10 | 上海斐讯数据通信技术有限公司 | Handset loss prevention method and system based on wearable equipment |
-
2017
- 2017-10-26 CN CN201711017152.2A patent/CN109714466B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1684411A (en) * | 2004-04-13 | 2005-10-19 | 华为技术有限公司 | Method for verifying user's legitimate of mobile terminal |
CN1848891A (en) * | 2006-04-05 | 2006-10-18 | 中国移动通信集团公司 | Method for Network Detecting Anti-theft Terminal Status |
CN104348959A (en) * | 2013-08-01 | 2015-02-11 | 展讯通信(上海)有限公司 | Mobile terminal alarm method and device |
CN105100130A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Terminal device and terminal device theft prevention method and system |
CN104462929A (en) * | 2014-11-27 | 2015-03-25 | 广东欧珀移动通信有限公司 | Privacy protection method and device for mobile equipment |
CN105072596A (en) * | 2015-07-02 | 2015-11-18 | 上海与德通讯技术有限公司 | Privacy protection method for mobile terminal |
CN106331169A (en) * | 2016-10-14 | 2017-01-11 | 深圳天珑无线科技有限公司 | Method for reporting loss of mobile terminal and cloud customer terminal, cloud server, mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN109714466A (en) | 2019-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107249170B (en) | Method and system for safe communication of Bluetooth equipment | |
US10425410B2 (en) | Identity authentication method and apparatus, and user equipment | |
EP3206428B1 (en) | Data traffic management method and device | |
CN106296888B (en) | Unlocking method and device based on face recognition and terminal | |
CN105873028B (en) | Terminal control method, terminal control device and terminal | |
JP2015026357A (en) | Method and apparatus for protection of application program | |
WO2014026616A1 (en) | Nfc-based information exchange method and device | |
CN105046135A (en) | Information display method, information display apparatus and terminal | |
CN104156657A (en) | Information input method and information input device of terminal and terminal | |
US9549322B2 (en) | Methods and systems for authentication of a communication device | |
CN107437016B (en) | Application control method and related product | |
CN105992125A (en) | Electronic device safety protection method and device | |
CN113129486A (en) | Vehicle lock control method, terminal device, HID vehicle lock device and electronic device | |
CN110719583B (en) | A communication method and device | |
CN106096923A (en) | A kind of secure payment means of defence and electronic equipment | |
CN109714466B (en) | Dynamic password authentication processing method and device and mobile terminal thereof | |
CN107786486B (en) | Method and device for activating operating system | |
CN109699015B (en) | Machine-card binding relationship authentication method and device and communication system | |
CN107710673B (en) | User identity authentication method and device | |
CN103916856A (en) | Method for establishing wireless communication, user equipment and access point | |
CN109960536B (en) | Electronic equipment safety starting method and device and electronic equipment | |
CN105760754A (en) | Method and device for processing application notice | |
CN106446719B (en) | Method for preventing eSIM file from being tampered and mobile terminal | |
CN105472616B (en) | Wireless access point connection method and electronic equipment | |
CN107026737B (en) | System for managing passwords through wearable equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |