CN110224713B - Safety protection method and system based on high-safety intelligent child watch - Google Patents
Safety protection method and system based on high-safety intelligent child watch Download PDFInfo
- Publication number
- CN110224713B CN110224713B CN201910507893.1A CN201910507893A CN110224713B CN 110224713 B CN110224713 B CN 110224713B CN 201910507893 A CN201910507893 A CN 201910507893A CN 110224713 B CN110224713 B CN 110224713B
- Authority
- CN
- China
- Prior art keywords
- watch
- children
- information
- smart
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000012795 verification Methods 0.000 claims abstract description 55
- 238000004891 communication Methods 0.000 claims abstract description 31
- 238000012544 monitoring process Methods 0.000 abstract description 2
- 238000013475 authorization Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 208000013409 limited attention Diseases 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
- H04B1/385—Transceivers carried on the body, e.g. in helmets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/38—Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
- H04B1/3827—Portable transceivers
- H04B1/385—Transceivers carried on the body, e.g. in helmets
- H04B2001/3861—Transceivers carried on the body, e.g. in helmets carried in a hand or on fingers
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Description
技术领域technical field
本发明涉及信息安全领域领域,尤其涉及一种高安全性智能儿童手表及其安全防护方法。The invention relates to the field of information security, in particular to a high-security smart children's watch and a security protection method thereof.
背景技术Background technique
儿童智能手机所有信息其实都在后台服务器上,各厂商在普通手表增加联网功能后,通过后台服务器作为枢纽,将家长手机和孩子的手表联系起来。由于一些厂商对服务器重视度不够,甚至有些厂商根本不具备自己的服务器,将儿童电话手表最为关键的一块服务内容外包给其他服务商,安全性存疑。黑客将服务器作为节点进行攻击,服务器薄弱的厂商则很容易受到控制。黑客可利用漏洞查询智能手表连接的服务器,就可以查看到客户信息,并根据相应ID直接查看孩子的地理位置、实时监控孩子的地理坐标、日常活动轨迹及环境录音等隐私内容。All the information of children's smartphones is actually on the backend server. After adding the networking function of ordinary watches, various manufacturers use the backend server as a hub to connect parents' mobile phones and children's watches. Because some manufacturers do not pay enough attention to servers, or even some manufacturers do not have their own servers at all, outsourcing the most critical service content of children's phone watches to other service providers has doubts about the security. Hackers use servers as nodes to attack, and vendors with weak servers are easily controlled. Hackers can use the vulnerability to query the server connected to the smart watch, and then they can view customer information, and directly view the child's geographic location according to the corresponding ID, monitor the child's geographic coordinates, daily activity tracks, and environmental recordings in real time.
对于心怀恶意的人而言,攻击代码对于专业人员来说并不复杂,一些网站甚至都已经公布了代码。现实中,家长的手机号码跟自己孩子的儿童电话手表都是绑定的。所以,黑客只需要知道家长的手机号,就能通过这个手机号码倒推出儿童电话手表的 ID号。每个儿童电话手表的ID号都是唯一的,获得ID号码后,直接输入攻击程序,就可以攻击这个儿童电话手表,受攻击的电话手表的精准位置很快就能显示出来。For the malicious, the attack code is not complicated for professionals, and some websites have even published the code. In reality, parents' mobile phone numbers are bound to their children's children's phone watches. Therefore, the hacker only needs to know the parent's mobile phone number, and can use this mobile phone number to deduce the ID number of the children's phone watch. The ID number of each children's phone watch is unique. After obtaining the ID number, you can directly enter the attack program to attack the children's phone watch, and the precise location of the attacked phone watch can be quickly displayed.
此外,利用漏洞,黑客不仅可以精准掌握手表所处的位置,还可以完整获取小朋友日常的行走路线。这就意味着,原本只被家长掌握的定位信息,因为安全漏洞的存在而有可能被不法分子获取。除此之外,黑客还可以监控儿童所处的环境,窃听小朋友的对话及周围的声音。也就是说,只要手表处于正常使用状态,黑客就可以在家长和孩子完全不知情的情况下进行窃听和监控,也就相当于在家里放了一个定位窃听器。黑客通过程序,控制智能手机进行拨出,被攻击的儿童电话手表一直处于黑屏状态,没有任何迹象,而接通的这方就可以听到儿童电话手表这边的一切声音。In addition, by exploiting the vulnerability, hackers can not only accurately grasp the location of the watch, but also fully obtain the daily walking route of children. This means that the location information originally only mastered by parents may be obtained by criminals due to the existence of security loopholes. In addition, hackers can monitor children's environment, eavesdropping on children's conversations and surrounding sounds. That is to say, as long as the watch is in normal use, hackers can eavesdrop and monitor without parents and children knowing, which is equivalent to placing a location bug at home. The hacker controlled the smart phone to make outgoing calls through the program. The attacked children's phone watch was always in a black screen state without any signs, and the connected party could hear all the sounds on the side of the children's phone watch.
同时,正处于快速发展的阶段的学龄前儿童对周围的事物认识都处于浅表层,更不懂得如何保护自己。如今火热的市场和频频出现的产品形象已经让这项保护措施失去了隐秘性,犯罪分子只要发现了儿童智能手表则会想方设法丢弃它,甚至小朋友自己也会因为各种原因把手表摘掉。现有技术中,为了克服这一问题,当可穿戴设备处于非使用状态时,其外观造型、颜色、材质等应遵循隐秘性原则;造型上避免分散孩子有限的注意力,同时针对对于社会认知不完善,缺乏安全意识的学龄前儿童,不让他人注意到孩子是否佩戴可穿戴设备。At the same time, preschool children who are in the stage of rapid development have a superficial understanding of the things around them, let alone how to protect themselves. Today's hot market and frequent product images have made this protection measure lose its secrecy. As long as criminals find a children's smart watch, they will try to discard it, and even children themselves will take off the watch for various reasons. In the prior art, in order to overcome this problem, when the wearable device is not in use, its appearance, color, material, etc. should follow the principle of concealment; avoid distracting children's limited attention in terms of shape, and at the same time, it is aimed at social recognition. Preschool children with imperfect knowledge and lack of safety awareness do not let others notice whether the child is wearing a wearable device.
发明内容SUMMARY OF THE INVENTION
本发明旨在至少解决现有技术中存在的技术问题之一。为此,本发明公开了一种基于智能儿童手表的安全防护方法,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表的对应的签名时间戳及许可信息。The present invention aims to solve at least one of the technical problems existing in the prior art. To this end, the present invention discloses a security protection method based on a smart children's watch. A third-party verification terminal is set on a server connected to the smart children's watch. When the background needs to read the relevant information of the smart children's watch in the server At the time, the read permission needs to be obtained from the third-party verification terminal; the ID information in the watch device is not recorded in the server, only the corresponding signature time stamp and permission information of the smart children's watch are recorded.
优选地,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器共享验证密钥,所述服务器通过上述验证密钥中的签名时间戳信息进行权限验证。Preferably, the third-party verification terminal is a home computer, and the third-party verification terminal includes a password generator consistent with the smart children's watch. When the background needs to read the relevant information of the smart children's watch in the server, The third-party verification terminal sends the license and the signature key generated by the password generator to the server, and the signature key is associated with the smart children's watch and the server to share the verification key, and the server passes the above verification password. The signature timestamp information in the key is used for authorization verification.
优选地,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过密码发生器,SIM卡PIN码及时间戳生成动态ID信息。Preferably, the ID information of the smart children's watch is dynamically changing information, and the smart children's watch generates dynamic ID information through a password generator, a SIM card PIN code and a timestamp.
优选地,所述智能儿童手表在接受到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。Preferably, when the smart children's watch receives a communication request, it needs to verify the biometric information before being allowed to connect, and the biometric information includes: one or more of face information, fingerprint, voiceprint, and iris. combination.
优选地,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。Preferably, when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch queries the communication records of the smart children's watch during the period of disconnecting the SIM card. If a suspicious communication record is detected Then an alarm message is sent to the server.
本发明还公开了一种高安全性的智能儿童手表,包括:智能手表,服务器,及第三方验证端;在服务器端,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;其中,所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表的对应的签名时间戳及许可信息。The invention also discloses a high-security smart children's watch, comprising: a smart watch, a server, and a third-party verification terminal; on the server side, a third-party verification terminal is set for the server connected to the smart children's watch, when the background needs to read When obtaining the relevant information of the smart children's watch in the server, it is necessary to obtain the read permission from the third-party verification terminal; wherein, the server does not record the ID information in the watch device, but only records the information of the smart children's watch. Corresponding signature timestamp and license information.
更进一步地,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器共享验证密钥,所述服务器通过上述验证密钥中的签名时间戳信息进行权限验证。Further, the third-party verification terminal is a home computer, and the third-party verification terminal contains a password generator consistent with the smart children's watch, when the background needs to read the relevant information of the smart children's watch in the server. , the third-party verification terminal sends the license and the signature key generated by the cipher generator to the server, the signature key is associated with the smart children's watch and the server shares the verification key, and the server passes the above verification The signature timestamp information in the key is used for authorization verification.
更进一步地,ID设置模块,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过密码发生器,SIM卡PIN码及时间戳生成动态ID信息。Further, in the ID setting module, the ID information of the smart children's watch is dynamically changing information, and the smart children's watch generates dynamic ID information through a password generator, a SIM card PIN code and a time stamp.
更进一步地,智能儿童手表通信验证模块,所述智能儿童手表在接受到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。Further, the communication verification module of the smart children's watch, when the smart children's watch receives a communication request, it needs to verify the biological information, and then allows to connect, and the biological information includes: face information, fingerprint, voiceprint, iris A combination of one or more of.
更进一步地,通信防劫持模块,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。Further, in the communication anti-hijacking module, when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch queries the communication records of the smart children's watch during the period of disconnecting the SIM card, If a suspicious communication record is detected, an alarm message is sent to the server.
本发明与现有技术相比,通过设置第三方验证单元及ID设置单元,不会因为服务器端被客户攻击而获得儿童的家长信息及儿童所在的精准位置,同时,通过接听电话需要身份认证以及定时断开SIM卡通信获取通信记录并分析的方式,也不会让黑客在家长和孩子完全不知情的情况下进行窃听和监控。Compared with the prior art, by setting the third-party verification unit and the ID setting unit, the present invention will not obtain the parent information of the child and the precise location of the child because the server is attacked by the client. The method of disconnecting SIM card communication regularly to obtain communication records and analyze them will not allow hackers to conduct eavesdropping and monitoring without parents and children completely unaware.
附图说明Description of drawings
从以下结合附图的描述可以进一步理解本发明。图中的部件不一定按比例绘制,而是将重点放在示出实施例的原理上。在图中,在不同的视图中,相同的附图标记指定对应的部分。The present invention can be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. In the figures, like reference numerals designate corresponding parts throughout the different views.
图1是本发明的一种基于智能儿童终端的安全防护方法的流程图。FIG. 1 is a flowchart of a security protection method based on a smart child terminal of the present invention.
具体实施方式Detailed ways
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. . Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。需要说明的是,结合附图所阐述的详细描述旨在作为对各种配置的描述,而不旨在表示其中可以实践本文所描述的概念的唯一配置。本文中所记载的装置实施例和方法实施例将在下面的详细描述中进行描述,并在附图中通过各种框、模块、单元、组件、电路、步骤、过程、算法等等(统称为“要素”)来予以示出。这些要素可以使用电子硬件、计算机软件或者其任意组合来实现。至于这些要素是实现为硬件还是软件,取决于特定应用和施加在整体系统上的设计约束。本发明的说明书和权利要求书以及说明书附图中的术语如果使用“第一”、“第二”等描述,该种描述是用于区别不同对象,而不是用于描述特定顺序。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of the embodiments. It should be noted that the detailed description set forth in connection with the appended drawings is intended as a description of various configurations and is not intended to represent the only configurations in which the concepts described herein may be practiced. Apparatus embodiments and method embodiments described herein are described in the following detailed description and illustrated in the accompanying drawings by various blocks, modules, units, components, circuits, steps, processes, algorithms, etc. (collectively referred to as "elements") are shown. These elements may be implemented using electronic hardware, computer software, or any combination thereof. Whether these elements are implemented as hardware or software depends on the specific application and design constraints imposed on the overall system. If terms such as "first" and "second" in the description and claims of the present invention and the accompanying drawings are used for description, such description is used to distinguish different objects, rather than to describe a specific order.
应当理解,当在本说明书和所附权利要求书中使用时,术语“包括”和“包含”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。还应当理解,在此本发明说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本发明。如在本发明说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。还应当进一步理解,在本发明说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。It is to be understood that, when used in this specification and the appended claims, the terms "comprising" and "comprising" indicate the presence of the described features, integers, steps, operations, elements and/or components, but do not exclude one or The presence or addition of a number of other features, integers, steps, operations, elements, components, and/or sets thereof. It is also to be understood that the terminology used in this specification of the present invention is for the purpose of describing particular embodiments only and is not intended to limit the present invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural unless the context clearly dictates otherwise. It should further be understood that, as used in this specification and the appended claims, the term "and/or" refers to and including any and all possible combinations of one or more of the associated listed items .
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.
在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本发明的说明,其本身没有特定的意义。因此,“模块”、“部件”或“单元”可以混合地使用。In the following description, suffixes such as 'module', 'component' or 'unit' used to represent elements are used only to facilitate the description of the present invention and have no specific meaning per se. Thus, "module", "component" or "unit" may be used interchangeably.
终端可以以各种形式来实施。例如,本发明中描述的终端可以包括诸如手机、平板电脑、笔记本电脑、掌上电脑、个人数字助理(Personal Digital Assistant, PDA)、便捷式媒体播放器(Portable Media Player,PMP)、导航装置、可穿戴设备、智能手环、计步器等移动终端,以及诸如数字TV、台式计算机等固定终端。The terminal may be implemented in various forms. For example, the terminal described in the present invention may include, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a Mobile terminals such as wearable devices, smart bracelets, and pedometers, as well as stationary terminals such as digital TVs and desktop computers.
后续描述中将以移动终端为例进行说明,本领域技术人员将理解的是,除了特别用于移动目的的元件之外,根据本发明的实施方式的构造也能够应用于固定类型的终端。In the following description, a mobile terminal will be used as an example, and those skilled in the art will understand that, in addition to elements specially used for mobile purposes, the configurations according to the embodiments of the present invention can also be applied to stationary type terminals.
实施例一Example 1
如图1所示的一种基于智能儿童终端的安全防护方法,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表的对应的签名时间戳及许可信息。As shown in Figure 1, a security protection method based on smart children's terminals is set up with a third-party verification terminal on the server connected to the smart children's watch. When the background needs to read the relevant information of the smart children's watch in the server , the read permission needs to be obtained from the third-party verification terminal; the ID information in the watch device is not recorded in the server, only the corresponding signature time stamp and permission information of the smart children's watch are recorded.
优选地,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器共享验证密钥,所述服务器通过上述验证密钥中的签名时间戳信息进行权限验证。Preferably, the third-party verification terminal is a home computer, and the third-party verification terminal includes a password generator consistent with the smart children's watch. When the background needs to read the relevant information of the smart children's watch in the server, The third-party verification terminal sends the license and the signature key generated by the password generator to the server, and the signature key is associated with the smart children's watch and the server to share the verification key, and the server passes the above verification password. The signature timestamp information in the key is used for authorization verification.
优选地,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过密码发生器,SIM卡PIN码及时间戳生成动态ID信息。Preferably, the ID information of the smart children's watch is dynamically changing information, and the smart children's watch generates dynamic ID information through a password generator, a SIM card PIN code and a timestamp.
优选地,所述智能儿童手表在接受到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。Preferably, when the smart children's watch receives a communication request, it needs to verify the biometric information before being allowed to connect, and the biometric information includes: one or more of face information, fingerprint, voiceprint, and iris. combination.
优选地,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。Preferably, when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch queries the communication records of the smart children's watch during the period of disconnecting the SIM card. If a suspicious communication record is detected Then an alarm message is sent to the server.
本发明还公开了一种高安全性的智能儿童手表,包括:智能手表,服务器,及第三方验证端;在服务器端,对智能儿童手表所连接的服务器设置第三方验证端,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,需要从第三方验证端获取读取权限;其中,所述服务器中不记录手表设备中的ID信息,只记录所述智能儿童手表的对应的签名时间戳及许可信息。The invention also discloses a high-security smart children's watch, comprising: a smart watch, a server, and a third-party verification terminal; on the server side, a third-party verification terminal is set for the server connected to the smart children's watch, when the background needs to read When obtaining the relevant information of the smart children's watch in the server, it is necessary to obtain the read permission from the third-party verification terminal; wherein, the server does not record the ID information in the watch device, but only records the information of the smart children's watch. Corresponding signature timestamp and license information.
更进一步地,所述第三方验证端为家庭计算机,第三方验证端中包含有与智能儿童手表一致的密码发生器,当后台需要读取所述服务器中的所述智能儿童手表的相关信息时,所述第三方验证端通过发送许可和所述密码发生器生成的签名密钥至服务器,所述签名密钥关联所述智能儿童手表及所述服务器共享验证密钥,所述服务器通过上述验证密钥中的签名时间戳信息进行权限验证。Further, the third-party verification terminal is a home computer, and the third-party verification terminal contains a password generator consistent with the smart children's watch, when the background needs to read the relevant information of the smart children's watch in the server. , the third-party verification terminal sends the license and the signature key generated by the cipher generator to the server, the signature key is associated with the smart children's watch and the server shares the verification key, and the server passes the above verification The signature timestamp information in the key is used for authorization verification.
更进一步地,ID设置模块,所述智能儿童手表的ID信息为动态变化的信息,所述智能儿童手表通过密码发生器,SIM卡PIN码及时间戳生成动态ID信息。Further, in the ID setting module, the ID information of the smart children's watch is dynamically changing information, and the smart children's watch generates dynamic ID information through a password generator, a SIM card PIN code and a time stamp.
更进一步地,智能儿童手表通信验证模块,所述智能儿童手表在接受到通信请求时,需要验证生物信息后,再准许接通,所述生物信息包括:人脸信息、指纹、声纹、虹膜中的一种或多种的组合。Further, the communication verification module of the smart children's watch, when the smart children's watch receives a communication request, it needs to verify the biological information, and then allows to connect, and the biological information includes: face information, fingerprint, voiceprint, iris A combination of one or more of.
更进一步地,通信防劫持模块,所述智能儿童手表在屏幕熄屏时,设置固定周期断开SIM卡的连接,所述智能儿童手表在断开SIM卡的期间查询智能儿童手表的通讯记录,若检测到可疑通信记录则发出报警信息至所述服务器。Further, in the communication anti-hijacking module, when the screen of the smart children's watch is turned off, a fixed period is set to disconnect the SIM card, and the smart children's watch queries the communication records of the smart children's watch during the period of disconnecting the SIM card, If a suspicious communication record is detected, an alarm message is sent to the server.
所述的智能儿童手表并不局限于儿童随身携带的手表形智能终端,更包括其他便携式儿童智能通信装置,例如手机、智能眼镜等,这些等效变化和修饰同样落入本发明权利要求所限定的范围。The described smart children's watch is not limited to a watch-shaped smart terminal carried by children, but also includes other portable children's smart communication devices, such as mobile phones, smart glasses, etc. These equivalent changes and modifications also fall within the scope of the claims of the present invention. range.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device comprising a series of elements includes not only those elements, but also Other elements not expressly listed, or which are inherent to such a process, method, article of manufacture, or apparatus are also included. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in the process, method, article of manufacture, or device that includes the element.
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。It will be appreciated by those skilled in the art that the embodiments of the present application may be provided as a method, a system or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
虽然上面已经参考各种实施例描述了本发明,但是应当理解,在不脱离本发明的范围的情况下,可以进行许多改变和修改。因此,其旨在上述详细描述被认为是例示性的而非限制性的,并且应当理解,以下权利要求(包括所有等同物)旨在限定本发明的精神和范围。以上这些实施例应理解为仅用于说明本发明而不用于限制本发明的保护范围。在阅读了本发明的记载的内容之后,技术人员可以对本发明作各种改动或修改,这些等效变化和修饰同样落入本发明权利要求所限定的范围。While the invention has been described above with reference to various embodiments, it should be understood that many changes and modifications can be made without departing from the scope of the invention. It is therefore intended that the foregoing detailed description be regarded as illustrative and not restrictive, and that it is to be understood that the following claims, including all equivalents, are intended to define the spirit and scope of the present invention. The above embodiments should be understood as only for illustrating the present invention and not for limiting the protection scope of the present invention. After reading the contents of the description of the present invention, the skilled person can make various changes or modifications to the present invention, and these equivalent changes and modifications also fall within the scope defined by the claims of the present invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910507893.1A CN110224713B (en) | 2019-06-12 | 2019-06-12 | Safety protection method and system based on high-safety intelligent child watch |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910507893.1A CN110224713B (en) | 2019-06-12 | 2019-06-12 | Safety protection method and system based on high-safety intelligent child watch |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110224713A CN110224713A (en) | 2019-09-10 |
CN110224713B true CN110224713B (en) | 2020-09-15 |
Family
ID=67816763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910507893.1A Active CN110224713B (en) | 2019-06-12 | 2019-06-12 | Safety protection method and system based on high-safety intelligent child watch |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110224713B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115022845B (en) * | 2022-06-15 | 2023-07-07 | 中国联合网络通信集团有限公司 | User contact identification method, operator platform, device and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104757937A (en) * | 2015-03-25 | 2015-07-08 | 北京良舟通讯科技有限公司 | Wearable device and method for old-age affection care and remote health care nursing |
CN105007302A (en) * | 2015-06-04 | 2015-10-28 | 成都果豆数字娱乐有限公司 | Mobile terminal data storage method |
CN105323245A (en) * | 2015-09-29 | 2016-02-10 | 北京元心科技有限公司 | Intelligent terminal, authorization method and system thereof |
CN105656627A (en) * | 2014-11-10 | 2016-06-08 | 腾讯数码(天津)有限公司 | Identity verification method, device and system |
CN105871867A (en) * | 2016-04-27 | 2016-08-17 | 腾讯科技(深圳)有限公司 | Identity authentication method, system and equipment |
CN108875411A (en) * | 2018-07-11 | 2018-11-23 | 成都理工大学 | The storage of Intelligent bracelet data and sharing method based on block chain |
CN109273086A (en) * | 2018-07-02 | 2019-01-25 | 北京市天元网络技术股份有限公司 | User health data management system and method |
CN109714760A (en) * | 2019-01-18 | 2019-05-03 | 浙江科技学院 | A kind of right access control method suitable for smart machine under direct-connected communication environment |
CN109815731A (en) * | 2018-12-29 | 2019-05-28 | 深圳云天励飞技术有限公司 | Permission processing method and related equipment |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2505678B (en) * | 2012-09-06 | 2014-09-17 | Visa Europe Ltd | Method and system for verifying an access request |
CN113014400B (en) * | 2015-02-17 | 2024-05-31 | 维萨国际服务协会 | Secure authentication of users and mobile devices |
EP3365824B1 (en) * | 2015-10-23 | 2020-07-15 | Oracle International Corporation | Password-less authentication for access management |
CN106878233B (en) * | 2015-12-10 | 2020-11-10 | 联芯科技有限公司 | Method for reading security data, security server, terminal and system |
CN106506168A (en) * | 2016-12-07 | 2017-03-15 | 北京信任度科技有限公司 | A kind of safe method based on biological characteristic long-distance identity-certifying |
CN107770275A (en) * | 2017-10-25 | 2018-03-06 | 成都猴子软件有限公司 | Intelligent bracelet data safe processing system |
CN108881471B (en) * | 2018-07-09 | 2020-09-11 | 北京信息科技大学 | Union-based whole-network unified trust anchor system and construction method |
-
2019
- 2019-06-12 CN CN201910507893.1A patent/CN110224713B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105656627A (en) * | 2014-11-10 | 2016-06-08 | 腾讯数码(天津)有限公司 | Identity verification method, device and system |
CN104757937A (en) * | 2015-03-25 | 2015-07-08 | 北京良舟通讯科技有限公司 | Wearable device and method for old-age affection care and remote health care nursing |
CN105007302A (en) * | 2015-06-04 | 2015-10-28 | 成都果豆数字娱乐有限公司 | Mobile terminal data storage method |
CN105323245A (en) * | 2015-09-29 | 2016-02-10 | 北京元心科技有限公司 | Intelligent terminal, authorization method and system thereof |
CN105871867A (en) * | 2016-04-27 | 2016-08-17 | 腾讯科技(深圳)有限公司 | Identity authentication method, system and equipment |
CN109273086A (en) * | 2018-07-02 | 2019-01-25 | 北京市天元网络技术股份有限公司 | User health data management system and method |
CN108875411A (en) * | 2018-07-11 | 2018-11-23 | 成都理工大学 | The storage of Intelligent bracelet data and sharing method based on block chain |
CN109815731A (en) * | 2018-12-29 | 2019-05-28 | 深圳云天励飞技术有限公司 | Permission processing method and related equipment |
CN109714760A (en) * | 2019-01-18 | 2019-05-03 | 浙江科技学院 | A kind of right access control method suitable for smart machine under direct-connected communication environment |
Also Published As
Publication number | Publication date |
---|---|
CN110224713A (en) | 2019-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11943362B2 (en) | System and method for providing personal information using one time private key based on blockchain of proof of use | |
US11870769B2 (en) | System and method for identifying a browser instance in a browser session with a server | |
US20240086573A1 (en) | Identity breach notification and remediation | |
Jones et al. | On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time | |
US9888377B1 (en) | Using personal computing device analytics as a knowledge based authentication source | |
JP6433978B2 (en) | Advanced authentication technology and its applications | |
US20190305955A1 (en) | Push notification authentication | |
KR20180016235A (en) | Authentication techniques including speech and/or lip movement analysis | |
EP3937040B1 (en) | Systems and methods for securing login access | |
KR20180016232A (en) | Authentication techniques including speech and/or lip movement analysis | |
CN111475841A (en) | Access control method, related device, equipment, system and storage medium | |
US20160379328A1 (en) | Identification Authentication in a Communications Network | |
Smith et al. | User authentication in smartphones for telehealth | |
CN109740319B (en) | Digital identity verification method and server | |
CN110597906A (en) | Block chain-based entrance integral generation method, device, equipment and storage medium | |
CN110224713B (en) | Safety protection method and system based on high-safety intelligent child watch | |
CN108540591B (en) | Address book management method, address book management device and electronic device | |
JP7632294B2 (en) | Information processing system, information processing method, program, and user interface | |
Kataria et al. | Quantifying smartphone vulnerabilities | |
CN110532792B (en) | Method and system for checking privacy information | |
CN113904850A (en) | Secure login method, generation method, system and electronic device based on blockchain private key keystore | |
CN108989998A (en) | A kind of information processing method and device | |
JP2013182552A (en) | Authentication system in remote learning and method therefor | |
CN106534149A (en) | DNS anti-hijacking method and device, terminal and server | |
Riad et al. | Heath device security and privacy: A comparative analysis of fitbit, jawbone, google glass and samsung galaxy watch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |