[go: up one dir, main page]

CN110224713B - Safety protection method and system based on high-safety intelligent child watch - Google Patents

Safety protection method and system based on high-safety intelligent child watch Download PDF

Info

Publication number
CN110224713B
CN110224713B CN201910507893.1A CN201910507893A CN110224713B CN 110224713 B CN110224713 B CN 110224713B CN 201910507893 A CN201910507893 A CN 201910507893A CN 110224713 B CN110224713 B CN 110224713B
Authority
CN
China
Prior art keywords
watch
children
information
smart
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910507893.1A
Other languages
Chinese (zh)
Other versions
CN110224713A (en
Inventor
秦曙光
陈家峰
季英会
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Readboy Education Technology Co Ltd
Original Assignee
Readboy Education Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Readboy Education Technology Co Ltd filed Critical Readboy Education Technology Co Ltd
Priority to CN201910507893.1A priority Critical patent/CN110224713B/en
Publication of CN110224713A publication Critical patent/CN110224713A/en
Application granted granted Critical
Publication of CN110224713B publication Critical patent/CN110224713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/385Transceivers carried on the body, e.g. in helmets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/385Transceivers carried on the body, e.g. in helmets
    • H04B2001/3861Transceivers carried on the body, e.g. in helmets carried in a hand or on fingers

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a safety protection method based on an intelligent child watch.A third-party verification end is arranged on a server connected with the intelligent child watch, and when a background needs to read related information of the intelligent child watch in the server, a reading authority needs to be acquired from the third-party verification end; the server does not record ID information in watch equipment, and only records a signature timestamp and permission information corresponding to the intelligent child watch; compared with the prior art, the invention has the advantages that by arranging the third party verification unit and the ID setting unit, the parent information of the children and the accurate positions of the children cannot be obtained because the server side is attacked by the client, and meanwhile, a hacker can not eavesdrop and monitor under the condition that the parents and the children are completely unaware of the eavesdropping and monitoring by adopting the mode that the answering call needs identity authentication and the SIM card communication is disconnected at regular time to obtain and analyze the communication record.

Description

一种基于高安全性智能儿童手表的安全防护方法及系统A safety protection method and system based on a high-security smart children's watch

技术领域technical field

本发明涉及信息安全领域领域,尤其涉及一种高安全性智能儿童手表及其安全防护方法。The invention relates to the field of information security, in particular to a high-security smart children's watch and a security protection method thereof.

背景技术Background technique

儿童智能手机所有信息其实都在后台服务器上,各厂商在普通手表增加联网功能后,通过后台服务器作为枢纽,将家长手机和孩子的手表联系起来。由于一些厂商对服务器重视度不够,甚至有些厂商根本不具备自己的服务器,将儿童电话手表最为关键的一块服务内容外包给其他服务商,安全性存疑。黑客将服务器作为节点进行攻击,服务器薄弱的厂商则很容易受到控制。黑客可利用漏洞查询智能手表连接的服务器,就可以查看到客户信息,并根据相应ID直接查看孩子的地理位置、实时监控孩子的地理坐标、日常活动轨迹及环境录音等隐私内容。All the information of children's smartphones is actually on the backend server. After adding the networking function of ordinary watches, various manufacturers use the backend server as a hub to connect parents' mobile phones and children's watches. Because some manufacturers do not pay enough attention to servers, or even some manufacturers do not have their own servers at all, outsourcing the most critical service content of children's phone watches to other service providers has doubts about the security. Hackers use servers as nodes to attack, and vendors with weak servers are easily controlled. Hackers can use the vulnerability to query the server connected to the smart watch, and then they can view customer information, and directly view the child's geographic location according to the corresponding ID, monitor the child's geographic coordinates, daily activity tracks, and environmental recordings in real time.

对于心怀恶意的人而言,攻击代码对于专业人员来说并不复杂,一些网站甚至都已经公布了代码。现实中,家长的手机号码跟自己孩子的儿童电话手表都是绑定的。所以,黑客只需要知道家长的手机号,就能通过这个手机号码倒推出儿童电话手表的 ID号。每个儿童电话手表的ID号都是唯一的,获得ID号码后,直接输入攻击程序,就可以攻击这个儿童电话手表,受攻击的电话手表的精准位置很快就能显示出来。For the malicious, the attack code is not complicated for professionals, and some websites have even published the code. In reality, parents' mobile phone numbers are bound to their children's children's phone watches. Therefore, the hacker only needs to know the parent's mobile phone number, and can use this mobile phone number to deduce the ID number of the children's phone watch. The ID number of each children's phone watch is unique. After obtaining the ID number, you can directly enter the attack program to attack the children's phone watch, and the precise location of the attacked phone watch can be quickly displayed.

此外,利用漏洞,黑客不仅可以精准掌握手表所处的位置,还可以完整获取小朋友日常的行走路线。这就意味着,原本只被家长掌握的定位信息,因为安全漏洞的存在而有可能被不法分子获取。除此之外,黑客还可以监控儿童所处的环境,窃听小朋友的对话及周围的声音。也就是说,只要手表处于正常使用状态,黑客就可以在家长和孩子完全不知情的情况下进行窃听和监控,也就相当于在家里放了一个定位窃听器。黑客通过程序,控制智能手机进行拨出,被攻击的儿童电话手表一直处于黑屏状态,没有任何迹象,而接通的这方就可以听到儿童电话手表这边的一切声音。In addition, by exploiting the vulnerability, hackers can not only accurately grasp the location of the watch, but also fully obtain the daily walking route of children. This means that the location information originally only mastered by parents may be obtained by criminals due to the existence of security loopholes. In addition, hackers can monitor children's environment, eavesdropping on children's conversations and surrounding sounds. That is to say, as long as the watch is in normal use, hackers can eavesdrop and monitor without parents and children knowing, which is equivalent to placing a location bug at home. The hacker controlled the smart phone to make outgoing calls through the program. The attacked children's phone watch was always in a black screen state without any signs, and the connected party could hear all the sounds on the side of the children's phone watch.

同时,正处于快速发展的阶段的学龄前儿童对周围的事物认识都处于浅表层,更不懂得如何保护自己。如今火热的市场和频频出现的产品形象已经让这项保护措施失去了隐秘性,犯罪分子只要发现了儿童智能手表则会想方设法丢弃它,甚至小朋友自己也会因为各种原因把手表摘掉。现有技术中,为了克服这一问题,当可穿戴设备处于非使用状态时,其外观造型、颜色、材质等应遵循隐秘性原则;造型上避免分散孩子有限的注意力,同时针对对于社会认知不完善,缺乏安全意识的学龄前儿童,不让他人注意到孩子是否佩戴可穿戴设备。At the same time, preschool children who are in the stage of rapid development have a superficial understanding of the things around them, let alone how to protect themselves. Today's hot market and frequent product images have made this protection measure lose its secrecy. As long as criminals find a children's smart watch, they will try to discard it, and even children themselves will take off the watch for various reasons. In the prior art, in order to overcome this problem, when the wearable device is not in use, its appearance, color, material, etc. should follow the principle of concealment; avoid distracting children's limited attention in terms of shape, and at the same time, it is aimed at social recognition. Preschool children with imperfect knowledge and lack of safety awareness do not let others notice whether the child is wearing a wearable device.

发明内容SUMMARY OF THE INVENTION

本发明旨在至少解决现有技术中存在的技术问题之一。为此,本发明公开了一种基于智能儿童手表的安全防护方法,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表的对应的签名时间戳及许可信息。The present invention aims to solve at least one of the technical problems existing in the prior art. To this end, the present invention discloses a security protection method based on a smart children's watch. A third-party verification terminal is set on a server connected to the smart children's watch. When the background needs to read the relevant information of the smart children's watch in the server At the time, the read permission needs to be obtained from the third-party verification terminal; the ID information in the watch device is not recorded in the server, only the corresponding signature time stamp and permission information of the smart children's watch are recorded.

优选地,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器共享验证密钥,所述服务器通过上述验证密钥中的签名时间戳信息进行权限验证。Preferably, the third-party verification terminal is a home computer, and the third-party verification terminal includes a password generator consistent with the smart children's watch. When the background needs to read the relevant information of the smart children's watch in the server, The third-party verification terminal sends the license and the signature key generated by the password generator to the server, and the signature key is associated with the smart children's watch and the server to share the verification key, and the server passes the above verification password. The signature timestamp information in the key is used for authorization verification.

优选地,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过密码发生器,SIM卡PIN码及时间戳生成动态ID信息。Preferably, the ID information of the smart children's watch is dynamically changing information, and the smart children's watch generates dynamic ID information through a password generator, a SIM card PIN code and a timestamp.

优选地,所述智能儿童手表在接受到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。Preferably, when the smart children's watch receives a communication request, it needs to verify the biometric information before being allowed to connect, and the biometric information includes: one or more of face information, fingerprint, voiceprint, and iris. combination.

优选地,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。Preferably, when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch queries the communication records of the smart children's watch during the period of disconnecting the SIM card. If a suspicious communication record is detected Then an alarm message is sent to the server.

本发明还公开了一种高安全性的智能儿童手表,包括:智能手表,服务器,及第三方验证端;在服务器端,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;其中,所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表的对应的签名时间戳及许可信息。The invention also discloses a high-security smart children's watch, comprising: a smart watch, a server, and a third-party verification terminal; on the server side, a third-party verification terminal is set for the server connected to the smart children's watch, when the background needs to read When obtaining the relevant information of the smart children's watch in the server, it is necessary to obtain the read permission from the third-party verification terminal; wherein, the server does not record the ID information in the watch device, but only records the information of the smart children's watch. Corresponding signature timestamp and license information.

更进一步地,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器共享验证密钥,所述服务器通过上述验证密钥中的签名时间戳信息进行权限验证。Further, the third-party verification terminal is a home computer, and the third-party verification terminal contains a password generator consistent with the smart children's watch, when the background needs to read the relevant information of the smart children's watch in the server. , the third-party verification terminal sends the license and the signature key generated by the cipher generator to the server, the signature key is associated with the smart children's watch and the server shares the verification key, and the server passes the above verification The signature timestamp information in the key is used for authorization verification.

更进一步地,ID设置模块,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过密码发生器,SIM卡PIN码及时间戳生成动态ID信息。Further, in the ID setting module, the ID information of the smart children's watch is dynamically changing information, and the smart children's watch generates dynamic ID information through a password generator, a SIM card PIN code and a time stamp.

更进一步地,智能儿童手表通信验证模块,所述智能儿童手表在接受到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。Further, the communication verification module of the smart children's watch, when the smart children's watch receives a communication request, it needs to verify the biological information, and then allows to connect, and the biological information includes: face information, fingerprint, voiceprint, iris A combination of one or more of.

更进一步地,通信防劫持模块,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。Further, in the communication anti-hijacking module, when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch queries the communication records of the smart children's watch during the period of disconnecting the SIM card, If a suspicious communication record is detected, an alarm message is sent to the server.

本发明与现有技术相比,通过设置第三方验证单元及ID设置单元,不会因为服务器端被客户攻击而获得儿童的家长信息及儿童所在的精准位置,同时,通过接听电话需要身份认证以及定时断开SIM卡通信获取通信记录并分析的方式,也不会让黑客在家长和孩子完全不知情的情况下进行窃听和监控。Compared with the prior art, by setting the third-party verification unit and the ID setting unit, the present invention will not obtain the parent information of the child and the precise location of the child because the server is attacked by the client. The method of disconnecting SIM card communication regularly to obtain communication records and analyze them will not allow hackers to conduct eavesdropping and monitoring without parents and children completely unaware.

附图说明Description of drawings

从以下结合附图的描述可以进一步理解本发明。图中的部件不一定按比例绘制,而是将重点放在示出实施例的原理上。在图中,在不同的视图中,相同的附图标记指定对应的部分。The present invention can be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. In the figures, like reference numerals designate corresponding parts throughout the different views.

图1是本发明的一种基于智能儿童终端的安全防护方法的流程图。FIG. 1 is a flowchart of a security protection method based on a smart child terminal of the present invention.

具体实施方式Detailed ways

为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. . Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。需要说明的是,结合附图所阐述的详细描述旨在作为对各种配置的描述,而不旨在表示其中可以实践本文所描述的概念的唯一配置。本文中所记载的装置实施例和方法实施例将在下面的详细描述中进行描述,并在附图中通过各种框、模块、单元、组件、电路、步骤、过程、算法等等(统称为“要素”)来予以示出。这些要素可以使用电子硬件、计算机软件或者其任意组合来实现。至于这些要素是实现为硬件还是软件,取决于特定应用和施加在整体系统上的设计约束。本发明的说明书和权利要求书以及说明书附图中的术语如果使用“第一”、“第二”等描述,该种描述是用于区别不同对象,而不是用于描述特定顺序。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of the embodiments. It should be noted that the detailed description set forth in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. Apparatus embodiments and method embodiments described herein are described in the following detailed description and illustrated in the accompanying drawings by various blocks, modules, units, components, circuits, steps, processes, algorithms, etc. (collectively referred to as "elements") are shown. These elements may be implemented using electronic hardware, computer software, or any combination thereof. Whether these elements are implemented as hardware or software depends on the specific application and design constraints imposed on the overall system. If terms such as "first" and "second" in the description and claims of the present invention and the accompanying drawings are used for description, such description is used to distinguish different objects, rather than to describe a specific order.

应当理解,当在本说明书和所附权利要求书中使用时,术语“包括”和“包含”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。还应当理解,在此本发明说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本发明。如在本发明说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。还应当进一步理解,在本发明说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。It is to be understood that, when used in this specification and the appended claims, the terms "comprising" and "comprising" indicate the presence of the described features, integers, steps, operations, elements and/or components, but do not exclude one or The presence or addition of a number of other features, integers, steps, operations, elements, components, and/or sets thereof. It is also to be understood that the terminology used in this specification of the present invention is for the purpose of describing particular embodiments only and is not intended to limit the present invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural unless the context clearly dictates otherwise. It should further be understood that, as used in this specification and the appended claims, the term "and/or" refers to and including any and all possible combinations of one or more of the associated listed items .

应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本发明的说明,其本身没有特定的意义。因此,“模块”、“部件”或“单元”可以混合地使用。In the following description, suffixes such as 'module', 'component' or 'unit' used to represent elements are used only to facilitate the description of the present invention and have no specific meaning per se. Thus, "module", "component" or "unit" may be used interchangeably.

终端可以以各种形式来实施。例如,本发明中描述的终端可以包括诸如手机、平板电脑、笔记本电脑、掌上电脑、个人数字助理(Personal Digital Assistant, PDA)、便捷式媒体播放器(Portable Media Player,PMP)、导航装置、可穿戴设备、智能手环、计步器等移动终端,以及诸如数字TV、台式计算机等固定终端。The terminal may be implemented in various forms. For example, the terminal described in the present invention may include, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a Mobile terminals such as wearable devices, smart bracelets, and pedometers, as well as stationary terminals such as digital TVs and desktop computers.

后续描述中将以移动终端为例进行说明,本领域技术人员将理解的是,除了特别用于移动目的的元件之外,根据本发明的实施方式的构造也能够应用于固定类型的终端。In the following description, a mobile terminal will be used as an example, and those skilled in the art will understand that, in addition to elements specially used for mobile purposes, the configurations according to the embodiments of the present invention can also be applied to stationary type terminals.

实施例一Example 1

如图1所示的一种基于智能儿童终端的安全防护方法,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表的对应的签名时间戳及许可信息。As shown in Figure 1, a security protection method based on smart children's terminals is set up with a third-party verification terminal on the server connected to the smart children's watch. When the background needs to read the relevant information of the smart children's watch in the server , the read permission needs to be obtained from the third-party verification terminal; the ID information in the watch device is not recorded in the server, only the corresponding signature time stamp and permission information of the smart children's watch are recorded.

优选地,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器共享验证密钥,所述服务器通过上述验证密钥中的签名时间戳信息进行权限验证。Preferably, the third-party verification terminal is a home computer, and the third-party verification terminal includes a password generator consistent with the smart children's watch. When the background needs to read the relevant information of the smart children's watch in the server, The third-party verification terminal sends the license and the signature key generated by the password generator to the server, and the signature key is associated with the smart children's watch and the server to share the verification key, and the server passes the above verification password. The signature timestamp information in the key is used for authorization verification.

优选地,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过密码发生器,SIM卡PIN码及时间戳生成动态ID信息。Preferably, the ID information of the smart children's watch is dynamically changing information, and the smart children's watch generates dynamic ID information through a password generator, a SIM card PIN code and a timestamp.

优选地,所述智能儿童手表在接受到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。Preferably, when the smart children's watch receives a communication request, it needs to verify the biometric information before being allowed to connect, and the biometric information includes: one or more of face information, fingerprint, voiceprint, and iris. combination.

优选地,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。Preferably, when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch queries the communication records of the smart children's watch during the period of disconnecting the SIM card. If a suspicious communication record is detected Then an alarm message is sent to the server.

本发明还公开了一种高安全性的智能儿童手表,包括:智能手表,服务器,及第三方验证端;在服务器端,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;其中,所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表的对应的签名时间戳及许可信息。The invention also discloses a high-security smart children's watch, comprising: a smart watch, a server, and a third-party verification terminal; on the server side, a third-party verification terminal is set for the server connected to the smart children's watch, when the background needs to read When obtaining the relevant information of the smart children's watch in the server, it is necessary to obtain the read permission from the third-party verification terminal; wherein, the server does not record the ID information in the watch device, but only records the information of the smart children's watch. Corresponding signature timestamp and license information.

更进一步地,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器共享验证密钥,所述服务器通过上述验证密钥中的签名时间戳信息进行权限验证。Further, the third-party verification terminal is a home computer, and the third-party verification terminal contains a password generator consistent with the smart children's watch, when the background needs to read the relevant information of the smart children's watch in the server. , the third-party verification terminal sends the license and the signature key generated by the cipher generator to the server, the signature key is associated with the smart children's watch and the server shares the verification key, and the server passes the above verification The signature timestamp information in the key is used for authorization verification.

更进一步地,ID设置模块,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过密码发生器,SIM卡PIN码及时间戳生成动态ID信息。Further, in the ID setting module, the ID information of the smart children's watch is dynamically changing information, and the smart children's watch generates dynamic ID information through a password generator, a SIM card PIN code and a time stamp.

更进一步地,智能儿童手表通信验证模块,所述智能儿童手表在接受到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。Further, the communication verification module of the smart children's watch, when the smart children's watch receives a communication request, it needs to verify the biological information, and then allows to connect, and the biological information includes: face information, fingerprint, voiceprint, iris A combination of one or more of.

更进一步地,通信防劫持模块,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。Further, in the communication anti-hijacking module, when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch queries the communication records of the smart children's watch during the period of disconnecting the SIM card, If a suspicious communication record is detected, an alarm message is sent to the server.

所述的智能儿童手表并不局限于儿童随身携带的手表形智能终端,更包括其他便携式儿童智能通信装置,例如手机、智能眼镜等,这些等效变化和修饰同样落入本发明权利要求所限定的范围。The described smart children's watch is not limited to a watch-shaped smart terminal carried by children, but also includes other portable children's smart communication devices, such as mobile phones, smart glasses, etc. These equivalent changes and modifications also fall within the scope of the claims of the present invention. range.

还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device comprising a series of elements includes not only those elements, but also Other elements not expressly listed, or which are inherent to such a process, method, article of manufacture, or apparatus are also included. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in the process, method, article of manufacture, or device that includes the element.

本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。It will be appreciated by those skilled in the art that the embodiments of the present application may be provided as a method, a system or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

虽然上面已经参考各种实施例描述了本发明,但是应当理解,在不脱离本发明的范围的情况下,可以进行许多改变和修改。因此,其旨在上述详细描述被认为是例示性的而非限制性的,并且应当理解,以下权利要求(包括所有等同物)旨在限定本发明的精神和范围。以上这些实施例应理解为仅用于说明本发明而不用于限制本发明的保护范围。在阅读了本发明的记载的内容之后,技术人员可以对本发明作各种改动或修改,这些等效变化和修饰同样落入本发明权利要求所限定的范围。While the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications can be made without departing from the scope of the invention. It is therefore intended that the foregoing detailed description be regarded as illustrative and not restrictive, and that it is to be understood that the following claims, including all equivalents, are intended to define the spirit and scope of the present invention. The above embodiments should be understood as only for illustrating the present invention and not for limiting the protection scope of the present invention. After reading the contents of the description of the present invention, the skilled person can make various changes or modifications to the present invention, and these equivalent changes and modifications also fall within the scope defined by the claims of the present invention.

Claims (8)

1.一种基于智能儿童手表的安全防护方法,其特征在于,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表对应的签名时间戳及许可信息,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可信息和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器,所述服务器通过所述签名密钥中的所述签名时间戳信息进行权限验证。1. A safety protection method based on a smart children's watch, characterized in that a third-party verification terminal is set to the server connected to the smart children's watch, when the background needs to read the relevant information of the smart children's watch in the server. , the read permission needs to be obtained from the third-party verification terminal; the ID information in the watch device is not recorded in the server, only the signature time stamp and license information corresponding to the smart children's watch are recorded, and the third-party verification terminal is a home computer , the third-party verification terminal contains a password generator consistent with the smart children's watch, when the background needs to read the relevant information of the smart children's watch in the server, the third-party verification terminal sends the permission information and all The signature key generated by the cipher generator is sent to the server, the signature key is associated with the smart children's watch and the server, and the server performs authority verification through the signature timestamp information in the signature key. 2.如权利要求1所述的一种基于智能儿童手表的安全防护方法,其特征在于,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过所述密码发生器、SIM卡PIN码及所述签名时间戳生成动态ID信息。2. a kind of safety protection method based on smart children's watch as claimed in claim 1 is characterized in that, the ID information of described smart children's watch is information of dynamic change, and described smart children's watch passes through described password generator, The SIM card PIN code and the signature timestamp generate dynamic ID information. 3.如权利要求2所述的一种基于智能儿童手表的安全防护方法,其特征在于,所述智能儿童手表在接收到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。3. A kind of safety protection method based on smart children's watch as claimed in claim 2, it is characterized in that, when described smart children's watch receives the communication request, after needing to verify biological information, then permit to connect, the biological The information includes: one or a combination of face information, fingerprint, voiceprint, and iris. 4.如权利要求3所述的一种基于智能儿童手表的安全防护方法,其特征在于,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的连接期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。4. A security protection method based on a smart children's watch according to claim 3, wherein when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch is set to disconnect the SIM card. During the disconnection of the SIM card, the communication records of the smart children's watch are inquired, and if a suspicious communication record is detected, an alarm message is sent to the server. 5.一种高安全性的智能安全防护系统,其特征在于,包括:智能儿童手表,服务器,及第三方验证端;在服务器端,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;其中,所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表对应的签名时间戳及许可信息,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可信息和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器,所述服务器通过上述签名密钥中的所述签名时间戳信息进行权限验证。5. A high-security intelligent safety protection system, characterized in that it includes: a smart children's watch, a server, and a third-party verification terminal; on the server side, a third-party verification terminal is set for the server connected to the smart children's watch, when the When the background needs to read the relevant information of the smart children's watch in the server, it needs to obtain the read permission from the third-party verification terminal; wherein, the server does not record the ID information in the watch device, only records the smart watch The signature timestamp and license information corresponding to the children's watch, the third-party verification terminal is a home computer, and the third-party verification terminal includes a password generator consistent with the smart children's watch. When the background needs to read the When the relevant information of the smart children's watch is used, the third-party verification terminal sends the permission information and the signature key generated by the cipher generator to the server, and the signature key is associated with the smart children's watch and the server. The server performs authority verification through the signature timestamp information in the above signature key. 6.如权利要求5所述的一种高安全性的智能安全防护系统,其特征在于,智能儿童手表包括ID设置模块,所述智能儿童手表的ID信息为动态变化的信息,所述ID设置模块通过所述密码发生器、SIM卡PIN码及所述签名时间戳生成动态ID信息。6. A high-security intelligent safety protection system according to claim 5, wherein the smart children's watch comprises an ID setting module, the ID information of the smart children's watch is dynamically changing information, and the ID sets The module generates dynamic ID information through the password generator, SIM card PIN code and the signature time stamp. 7.如权利要求6所述的一种高安全性的智能安全防护系统,其特征在于,智能儿童手表包括通信验证模块,所述通信验证模块在接收到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。7. A high-security intelligent safety protection system as claimed in claim 6, wherein the smart children's watch comprises a communication verification module, and when the communication verification module receives a communication request, it needs to verify the biological information, The connection is permitted again, and the biometric information includes: one or a combination of face information, fingerprint, voiceprint, and iris. 8.如权利要求7所述的一种高安全性的智能安全防护系统,其特征在于,所述智能儿童手表包括通信防劫持模块,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述通信防劫持模块在断开SIM卡的连接期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。8 . The high-security smart security protection system according to claim 7 , wherein the smart children’s watch comprises a communication anti-hijacking module, and the smart children’s watch is set to set a fixed period to interrupt when the screen is turned off. 9 . Open the connection of the SIM card, the communication anti-hijacking module inquires the communication record of the smart children's watch during the disconnection of the SIM card, and sends an alarm message to the server if a suspicious communication record is detected.
CN201910507893.1A 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch Active CN110224713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910507893.1A CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910507893.1A CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Publications (2)

Publication Number Publication Date
CN110224713A CN110224713A (en) 2019-09-10
CN110224713B true CN110224713B (en) 2020-09-15

Family

ID=67816763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910507893.1A Active CN110224713B (en) 2019-06-12 2019-06-12 Safety protection method and system based on high-safety intelligent child watch

Country Status (1)

Country Link
CN (1) CN110224713B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022845B (en) * 2022-06-15 2023-07-07 中国联合网络通信集团有限公司 User contact identification method, operator platform, device and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104757937A (en) * 2015-03-25 2015-07-08 北京良舟通讯科技有限公司 Wearable device and method for old-age affection care and remote health care nursing
CN105007302A (en) * 2015-06-04 2015-10-28 成都果豆数字娱乐有限公司 Mobile terminal data storage method
CN105323245A (en) * 2015-09-29 2016-02-10 北京元心科技有限公司 Intelligent terminal, authorization method and system thereof
CN105656627A (en) * 2014-11-10 2016-06-08 腾讯数码(天津)有限公司 Identity verification method, device and system
CN105871867A (en) * 2016-04-27 2016-08-17 腾讯科技(深圳)有限公司 Identity authentication method, system and equipment
CN108875411A (en) * 2018-07-11 2018-11-23 成都理工大学 The storage of Intelligent bracelet data and sharing method based on block chain
CN109273086A (en) * 2018-07-02 2019-01-25 北京市天元网络技术股份有限公司 User health data management system and method
CN109714760A (en) * 2019-01-18 2019-05-03 浙江科技学院 A kind of right access control method suitable for smart machine under direct-connected communication environment
CN109815731A (en) * 2018-12-29 2019-05-28 深圳云天励飞技术有限公司 Permission processing method and related equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2505678B (en) * 2012-09-06 2014-09-17 Visa Europe Ltd Method and system for verifying an access request
CN113014400B (en) * 2015-02-17 2024-05-31 维萨国际服务协会 Secure authentication of users and mobile devices
EP3365824B1 (en) * 2015-10-23 2020-07-15 Oracle International Corporation Password-less authentication for access management
CN106878233B (en) * 2015-12-10 2020-11-10 联芯科技有限公司 Method for reading security data, security server, terminal and system
CN106506168A (en) * 2016-12-07 2017-03-15 北京信任度科技有限公司 A kind of safe method based on biological characteristic long-distance identity-certifying
CN107770275A (en) * 2017-10-25 2018-03-06 成都猴子软件有限公司 Intelligent bracelet data safe processing system
CN108881471B (en) * 2018-07-09 2020-09-11 北京信息科技大学 Union-based whole-network unified trust anchor system and construction method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656627A (en) * 2014-11-10 2016-06-08 腾讯数码(天津)有限公司 Identity verification method, device and system
CN104757937A (en) * 2015-03-25 2015-07-08 北京良舟通讯科技有限公司 Wearable device and method for old-age affection care and remote health care nursing
CN105007302A (en) * 2015-06-04 2015-10-28 成都果豆数字娱乐有限公司 Mobile terminal data storage method
CN105323245A (en) * 2015-09-29 2016-02-10 北京元心科技有限公司 Intelligent terminal, authorization method and system thereof
CN105871867A (en) * 2016-04-27 2016-08-17 腾讯科技(深圳)有限公司 Identity authentication method, system and equipment
CN109273086A (en) * 2018-07-02 2019-01-25 北京市天元网络技术股份有限公司 User health data management system and method
CN108875411A (en) * 2018-07-11 2018-11-23 成都理工大学 The storage of Intelligent bracelet data and sharing method based on block chain
CN109815731A (en) * 2018-12-29 2019-05-28 深圳云天励飞技术有限公司 Permission processing method and related equipment
CN109714760A (en) * 2019-01-18 2019-05-03 浙江科技学院 A kind of right access control method suitable for smart machine under direct-connected communication environment

Also Published As

Publication number Publication date
CN110224713A (en) 2019-09-10

Similar Documents

Publication Publication Date Title
US11943362B2 (en) System and method for providing personal information using one time private key based on blockchain of proof of use
US11870769B2 (en) System and method for identifying a browser instance in a browser session with a server
US20240086573A1 (en) Identity breach notification and remediation
Jones et al. On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time
US9888377B1 (en) Using personal computing device analytics as a knowledge based authentication source
JP6433978B2 (en) Advanced authentication technology and its applications
US20190305955A1 (en) Push notification authentication
KR20180016235A (en) Authentication techniques including speech and/or lip movement analysis
EP3937040B1 (en) Systems and methods for securing login access
KR20180016232A (en) Authentication techniques including speech and/or lip movement analysis
CN111475841A (en) Access control method, related device, equipment, system and storage medium
US20160379328A1 (en) Identification Authentication in a Communications Network
Smith et al. User authentication in smartphones for telehealth
CN109740319B (en) Digital identity verification method and server
CN110597906A (en) Block chain-based entrance integral generation method, device, equipment and storage medium
CN110224713B (en) Safety protection method and system based on high-safety intelligent child watch
CN108540591B (en) Address book management method, address book management device and electronic device
JP7632294B2 (en) Information processing system, information processing method, program, and user interface
Kataria et al. Quantifying smartphone vulnerabilities
CN110532792B (en) Method and system for checking privacy information
CN113904850A (en) Secure login method, generation method, system and electronic device based on blockchain private key keystore
CN108989998A (en) A kind of information processing method and device
JP2013182552A (en) Authentication system in remote learning and method therefor
CN106534149A (en) DNS anti-hijacking method and device, terminal and server
Riad et al. Heath device security and privacy: A comparative analysis of fitbit, jawbone, google glass and samsung galaxy watch

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant