[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN104850769A - Method and device for executing operation - Google Patents

Method and device for executing operation Download PDF

Info

Publication number
CN104850769A
CN104850769A CN201510205496.0A CN201510205496A CN104850769A CN 104850769 A CN104850769 A CN 104850769A CN 201510205496 A CN201510205496 A CN 201510205496A CN 104850769 A CN104850769 A CN 104850769A
Authority
CN
China
Prior art keywords
wearing state
wearable device
authentication mode
current environment
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510205496.0A
Other languages
Chinese (zh)
Other versions
CN104850769B (en
Inventor
黄媛媛
胡杨
林俊琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing millet Payment Technology Co., Ltd.
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510205496.0A priority Critical patent/CN104850769B/en
Publication of CN104850769A publication Critical patent/CN104850769A/en
Application granted granted Critical
Publication of CN104850769B publication Critical patent/CN104850769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses a method and a device for executing an operation and belongs to the field of wearable equipment. The method comprises the steps as follows: obtaining a wearing state of the wearable equipment which is bound when monitoring that a payment operation is executed and using a manner based on identity authentication of the wearable equipment, wherein the wearing state comprises the wearing state and a not-wearing state; detecting whether the wearing state is the not-wearing state; forbidding executing the payment operation if the wearing state is the not-wearing state, or replacing the manner based on the identity authentication of the wearable equipment as other identity authentication manner. The method and the device solve the problem that the manner based on the identity authentication of the wearable equipment could be not safe when a user does not wear the wearable equipment so as to solve the problem that the network property of the user could be effectively protected even though the user does not wear the wearable equipment.

Description

Operation manner of execution and device
Technical field
The disclosure relates to Wearable device field, particularly one operation manner of execution and device.
Background technology
Mobile payment uses mobile terminal to carry out a kind of modes of payments paid, and the form of mobile payment can be: Quick Response Code form of payment, sound wave form of payment, fingerprint form of payment and the form of payment based on Wearable device.
Correlation technique provides a kind of method of mobile payment based on Wearable device: mobile terminal perform delivery operation time, detect this mobile terminal and and the Wearable device of its binding between distance whether be less than preset distance; If be less than preset distance, then mobile terminal performs this delivery operation.
Summary of the invention
The disclosure provides a kind of operation manner of execution and device.Described technical scheme is as follows:
According to the first aspect of disclosure embodiment, provide a kind of operation manner of execution, the method comprises:
Monitor perform identification authentication mode based on Wearable device of delivery operation and current employing time, obtain the wearing state of the Wearable device of binding, wearing state comprises wears middle state and non-wearing state;
Detect whether wearing state is non-wearing state;
If wearing state is non-wearing state, then forbid performing delivery operation, or, the identification authentication mode based on Wearable device is replaced by other authentication mode.
In one embodiment, obtain the wearing state of the Wearable device of binding, comprising:
The current biometric data of user is obtained by the Wearable device of binding; Can the current biometric data according to get user obtain wearing state;
Or,
Call the preset interface of the Wearable device of binding, obtain wearing state, wearing state is that can Wearable device obtain according to the current biometric data that collect user.
In one embodiment, the identification authentication mode based on Wearable device is replaced by other authentication mode, comprises:
Identification authentication mode based on Wearable device is replaced by cipher authentication mode; Or,
Identification authentication mode based on Wearable device is replaced by finger print identifying mode; Or,
Identification authentication mode based on Wearable device is replaced by gesture authentication mode; Or,
Identification authentication mode based on Wearable device is replaced by electronic passwords authentication mode.
In one embodiment, the method also comprises:
If wearing state is non-wearing state, then perform at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
In one embodiment, the method also comprises:
If the authentication failed number of times of other authentication mode reaches preset times, then perform at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
According to second aspect of the present disclosure, provide a kind of operation actuating unit, this device comprises:
Acquisition module, be configured to monitor perform identification authentication mode based on Wearable device of delivery operation and current employing time, obtain the wearing state of the Wearable device of binding, wearing state comprises wears middle state and non-wearing state;
Detection module, is configured to detect whether wearing state is non-wearing state;
Forbid execution module, be configured to, when wearing state is for non-wearing state, forbid performing delivery operation, or mode change module, is configured to the identification authentication mode based on Wearable device to be replaced by other authentication mode.
In one embodiment, acquisition module, is configured to the current biometric data being obtained user by the Wearable device of binding; Can the current biometric data according to get user obtain wearing state; Or acquisition module, is configured to the preset interface of the Wearable device calling binding, obtain wearing state, wearing state is that can Wearable device obtain according to the current biometric data that collect user.
In one embodiment, mode changes module, is configured to the identification authentication mode based on Wearable device to be replaced by cipher authentication mode; Or,
Mode changes module, is configured to the identification authentication mode based on Wearable device to be replaced by finger print identifying mode; Or,
Mode changes module, is configured to the identification authentication mode based on Wearable device to be replaced by gesture authentication mode; Or,
Mode changes module, is configured to the identification authentication mode based on Wearable device to be replaced by electronic passwords authentication mode.
In one embodiment, this device also comprises:
First execution module, is configured to when wearing state is in non-wearing state, performs at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
In one embodiment, this device also comprises:
First execution module, is configured to when the authentication failed number of times of other authentication mode reaches preset times, performs at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
According to the third aspect of the present disclosure, provide a kind of operation actuating unit, this device comprises:
Processor;
For storing the storer of this processor executable;
Wherein, this processor is configured to:
When monitoring execution delivery operation and adopt the identification authentication mode based on Wearable device, obtain the wearing state of the Wearable device of binding, wearing state comprises wears middle state and non-wearing state;
Detect whether wearing state is non-wearing state;
If wearing state is non-wearing state, then forbid performing this delivery operation, or, this identification authentication mode based on Wearable device is replaced by other authentication mode.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
By obtaining the wearing state of the Wearable device of binding, when wearing state is non-wearing state, forbid performing delivery operation or adopting other authentication mode; Solve when the non-body-worn Wearable device of user, the authentication mode based on Wearable device may unsafe problem; Even if reach the non-body-worn Wearable device of user, the problem that the network property of user also can be effectively protected.
Should be understood that, it is only exemplary that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows and meets embodiment of the present disclosure, and is used from instructions one and explains principle of the present disclosure.
Fig. 1 is the schematic diagram of a kind of implementation environment according to exemplary partial embodiment;
Fig. 2 is a kind of process flow diagram operating manner of execution according to an exemplary embodiment;
Fig. 3 is a kind of process flow diagram operating manner of execution according to another exemplary embodiment;
Fig. 4 is that a kind of according to another exemplary embodiment operates the interface schematic diagram of manner of execution when implementing;
Fig. 5 is a kind of process flow diagram operating manner of execution according to another exemplary embodiment;
Fig. 6 is a kind of process flow diagram operating manner of execution according to another exemplary embodiment;
Fig. 7 is a kind of block diagram operating actuating unit according to an exemplary embodiment;
Fig. 8 is a kind of block diagram operating actuating unit according to an exemplary embodiment;
Fig. 9 is a kind of block diagram operating actuating unit according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
When user does not have body-worn Wearable device, malicious user can take Wearable device under the unwitting prerequisite of user, if there is malicious user to use the method for mobile payment that provides of correlation technique to perform delivery operation, then only need the Wearable device of the mobile terminal of user near user, just authentication can pass through and perform delivery operation smoothly, which results in user's property may maliciously be shifted.In order to avoid Similar Problems, disclosure embodiment provides following schematically embodiment:
Fig. 1 is the schematic diagram of a kind of implementation environment according to an exemplary embodiment.This implementation environment comprises Wearable device 120, mobile terminal 140 and background server 160.
Wearable device 120 can be Intelligent bracelet, Intelligent glove, intelligent watch, intelligent ring and intelligent dress ornament etc.Usually various sensor is provided with, such as Gravity accelerometer, gyro sensor, heart rate sensor and biopotential sensor etc. in Wearable device 120.Wearable device 120 has the ability of the biological data by built-in sensors collection user.Biological data can be the limb action, pulse, heart rate, bioelectricity etc. of user.That Intelligent bracelet is illustrated with Wearable device 120 in Fig. 1.
Wearable device 120 can be connected with mobile terminal 140 by Bluetooth technology, WiFi technology etc.
Mobile terminal 140 can be the electronic equipments such as smart mobile phone, intelligent router, panel computer.Mobile terminal 140 can set up binding relationship in advance with Wearable device 120.That smart mobile phone is illustrated with mobile terminal 140 in Fig. 1.Mobile terminal 140 has the ability performing delivery operation.
Mobile terminal 140 is connected with background server 160 by cable network or wireless network.
Background server 160 is mobile terminal 140 provides back-office support servers when performing delivery operation.
Fig. 2 is the process flow diagram of the operation manner of execution according to an exemplary embodiment.The present embodiment is applied in the mobile terminal shown in Fig. 1 with this operation manner of execution and illustrates.The method comprises:
In step 202., when monitoring execution delivery operation and adopt the identification authentication mode based on Wearable device, the wearing state of the Wearable device of binding is obtained.
Wearing state comprises wears middle state and non-wearing state.
In step 204, whether detect wearing state is non-wearing state.
In step 206, if wearing state is non-wearing state, then forbid performing delivery operation, or, the identification authentication mode based on Wearable device is replaced by other authentication mode.
In sum, the operation manner of execution that the present embodiment provides, by obtaining the wearing state of the Wearable device of binding, when wearing state is non-wearing state, forbids performing delivery operation or adopting other authentication mode; Solve when the non-body-worn Wearable device of user, the authentication mode based on Wearable device may unsafe problem; Even if reach the non-body-worn Wearable device of user, the problem that the network property of user also can be effectively protected.
Fig. 3 is the process flow diagram of the operation manner of execution according to another exemplary embodiment.The present embodiment is still applied to the mobile terminal shown in Fig. 1 to illustrate with this operation manner of execution.The method comprises:
In step 301, the identification authentication mode based on Wearable device is enabled to delivery operation;
Mobile terminal, when performing delivery operation, all needs the authentication carrying out user usually.The mode of authentication includes but not limited to: cipher authentication mode, finger print identifying mode, identifying code authentication mode, electronic passwords authentication mode, gesture authentication mode and the identification authentication mode based on Wearable device.
Cipher authentication mode is that user inputs n position preset password in the terminal to carry out the mode of authentication.
Finger print identifying mode is that user inputs user fingerprints in the terminal to carry out the mode of authentication.
Identifying code authentication mode is that background server provides identifying code to user, and user inputs the mode that this identifying code carries out authentication in the terminal.
Electronic passwords authentication mode provides electronic passwords maker to user in advance, and this electronic passwords maker has and generates the ability of dynamic password, and user inputs the mode that dynamic password that electronic passwords maker generates carries out authentication in the terminal.
Gesture authentication mode is that user inputs default gesture on the touch-screen of mobile terminal, or makes default gesture to carry out the mode of authentication by the sports type sensor in mobile terminal.
Identification authentication mode based on Wearable device is that user carries out the mode of authentication by Wearable device.Such as, when the distance between mobile terminal and the Wearable device of binding is less than predeterminable range, authentication is passed through; Again such as, in Preset Time after monitoring execution delivery operation, user uses the Wearable device of binding to make default gesture, the action data collected is sent to mobile terminal by Wearable device, when mobile terminal judges that this action data mates with the gesture motion preset, authentication is passed through.
User in the terminal, can enable Wearable device authentication mode to delivery operation.See Fig. 4, be mobile-phone payment for delivery operation, user chooses " use Intelligent bracelet carry out identity verification " option arranging interface 40, thus enables Wearable device authentication mode for mobile-phone payment function.
In step 302, when monitoring execution delivery operation and current identification authentication mode is wearable device authentication mode, obtained the current biometric data of user by the Wearable device of binding;
When user performs delivery operation to mobile terminal request, mobile terminal obtains the current biometric data of user by the Wearable device of binding.
Intelligent bracelet with Wearable device, current biometric data is the wrist movement data instance of user, Wearable device gathers the wrist movement data of user by built-in Gravity accelerometer, and mobile terminal connects the wrist movement data obtaining Wearable device and collect by bluetooth.
In step 303, wearing state is obtained according to the current biometric data that can get user.
Due to when user does not wear Wearable device, Wearable device cannot collect the current biometric data of user, so:
If can get the current biometric data of user, then mobile terminal determination Wearable device is in and wears middle state.
If can not get the current biometric data of user, then mobile terminal determination Wearable device is in non-wearing state.
In step 304, whether detect wearing state is non-wearing state;
If wearing state for wearing middle state, then enters step 305; If wearing state is non-wearing state, then enter step 306.
In step 305, if wearing state is for wearing middle state, then carry out authentication by the Wearable device of binding, and when authentication is passed through, perform delivery operation.
If wearing state is for wearing middle state, then mobile terminal carries out the step of authentication by the Wearable device of binding, and this step can be any one in following three kinds of implementations:
The first possible embodiment, whether mobile terminal detection exists bluetooth with the Wearable device of binding is connected, and the signal intensity that this bluetooth connects is higher than predetermined threshold value.This signal intensity may be used for characterizing the distance between mobile terminal and Wearable device.
Connect when there is bluetooth, and the signal intensity that connects of this bluetooth higher than predetermined threshold value time, the mobile terminal certification that determines one's identity is passed through.Connect when there is not bluetooth, or the signal intensity that connects of bluetooth lower than predetermined threshold value time, mobile terminal determines one's identity authentification failure.
The embodiment that the second is possible, mobile terminal display reminding information, this information is used to indicate user and makes prearranged gesture; The action data of the user that (in such as 5 seconds) gather in the scheduled duration time period of acquisition for mobile terminal Wearable device after display reminding information; Whether mobile terminal detects this action data and mates with prearranged gesture; If coupling, then the mobile terminal certification that determines one's identity is passed through, if do not mate, then mobile terminal determines one's identity authentification failure.
The third possible embodiment, mobile terminal detects the current user of wearing by the Wearable device of binding and whether belongs to pre-set user.The current biometric data collected is carried out mating carrying out with the history biological data of pre-set user by mobile terminal or Wearable device by this testing process.If current biometric data mates with the history biological data of pre-set user, then the mobile terminal certification that determines one's identity is passed through; If current biometric data does not mate with the history biological data of pre-set user, then mobile terminal determines one's identity authentification failure.
When authentication is passed through, mobile terminal performs delivery operation.Such as, mobile terminal completes delivery operation.Perform delivery operation and may need having come alternately by mobile terminal and background server.
Within step 306, if wearing state is non-wearing state, then forbid performing delivery operation.
If Wearable device is in non-wearing state, then mobile terminal is forbidden performing delivery operation.
In step 307, if wearing state is non-wearing state, then perform at least one in scheduled operation.
Alternatively, if Wearable device is in non-wearing state, then the user to mobile terminal request execution delivery operation may be malicious user.In order to record the information of malicious user, mobile terminal performs at least one in following scheduled operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
Alternatively, the image of the current environment collected or video or sound are also sent to background server by mobile terminal, or, send to other terminal of association.The mobile terminal that other terminal of association can be spouse, father and mother, children use.
In sum, the operation manner of execution that the present embodiment provides, by obtaining the wearing state of the Wearable device of binding, when wearing state is non-wearing state, forbids performing delivery operation or adopting other authentication mode; Solve when the non-body-worn Wearable device of user, the authentication mode based on Wearable device may unsafe problem; Even if reach the non-body-worn Wearable device of user, the problem that the network property of user also can be effectively protected.
The operation manner of execution that the present embodiment provides; also by when Wearable device is in non-wearing state; perform at least one scheduled operation, make mobile terminal can record the doubtful relevant information for malicious user, the network property of user can be protected better.
In the embodiment that another is possible, because the computing power of Wearable device is stronger, the step analyzing the wearing state of Wearable device can be performed by Wearable device.Also namely, step 303 and step 304 replaced realization can become step 303a, see Fig. 5:
In step 303a, call the preset interface of the Wearable device of binding, obtain wearing state, wearing state is that can Wearable device obtain according to the current biometric data that collect user.
Can Wearable device constantly can gather the biological data of user, then to analyze according to the biological data that collect user every predetermined time interval and obtain wearing state, and a buffer memory nearest time interval analyze the wearing state obtained.
Meanwhile, Wearable device can also provide preset interface, and this preset interface is used for being moved terminal when calling, feedback wearing state.
When monitoring execution delivery operation, mobile terminal calls the preset interface of the Wearable device of binding, obtains wearing state.
In the embodiment that another is possible, step 306 and step 307 are become step 306a and step 307a, see Fig. 6 by alternative realization:
In step 306a, if wearing state is non-wearing state, then current Wearable device authentication mode is replaced by other authentication mode.
This step can be following arbitrary step:
Identification authentication mode based on Wearable device is replaced by cipher authentication mode by mobile terminal; Or,
Identification authentication mode based on Wearable device is replaced by finger print identifying mode by mobile terminal; Or,
Identification authentication mode based on Wearable device is replaced by gesture authentication mode by mobile terminal; Or,
Identification authentication mode based on Wearable device is replaced by electronic passwords authentication mode by mobile terminal.
Due in identifying code authentication mode, identifying code is all directly send to mobile terminal usually, mobile terminal is easy to when being used by malicious user be revealed, so other identification authentication mode in this step does not comprise identifying code authentication mode, but the present embodiment does not limit this.
If the wearing state of Wearable device is non-wearing state, other authentication mode can be proved to be successful, then mobile terminal also performs delivery operation.Perform delivery operation and may need having come alternately by mobile terminal and background server.
In step 307a, if the authentication failed number of times of other authentication mode reaches preset times, then perform at least one in scheduled operation.
Alternatively, if the wearing state of Wearable device is non-wearing state, and the authentication failed number of times of other authentication mode reaches preset times, then using the user of mobile terminal may be malicious user.In order to record the information of malicious user, mobile terminal performs at least one in following scheduled operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
Following is disclosure device embodiment, may be used for performing disclosure embodiment of the method.For the details do not disclosed in disclosure device embodiment, please refer to disclosure embodiment of the method.
Fig. 7 is the block diagram of the operation actuating unit according to an exemplary embodiment.This operation actuating unit can realize becoming all or part of of mobile terminal by software, hardware or both combinations.This device comprises:
Acquisition module 720, be configured to monitor perform identification authentication mode based on Wearable device of delivery operation and current employing time, obtain the wearing state of the Wearable device of binding.Wearing state comprises wears middle state and non-wearing state.
Detection module 740, is configured to detect wearing state and is in and is just still in non-wearing state at wearing state;
Forbid execution module 760, be configured to when wearing state is in non-wearing state, forbid performing delivery operation, or mode changes module 780, is configured to the identification authentication mode based on Wearable device to be replaced by other authentication mode.
In sum, the operation actuating unit that the present embodiment provides, by obtaining the wearing state of the Wearable device of binding, when wearing state is non-wearing state, forbids performing delivery operation or adopting other authentication mode; Solve when the non-body-worn Wearable device of user, the authentication mode based on Wearable device may unsafe problem; Even if reach the non-body-worn Wearable device of user, the problem that the network property of user also can be effectively protected.
Fig. 8 is the block diagram of the operation actuating unit according to an exemplary embodiment.This operation actuating unit can realize becoming all or part of of mobile terminal by software, hardware or both combinations.This device comprises:
Acquisition module 720, be configured to monitor perform identification authentication mode based on Wearable device of delivery operation and current employing time, obtain the wearing state of the Wearable device of binding.Wearing state comprises wears middle state and non-wearing state.
Detection module 740, is configured to detect whether wearing state is non-wearing state.
Forbid execution module 760, be configured to, when wearing state is for non-wearing state, forbid performing delivery operation, or mode change module 780, is configured to the identification authentication mode based on Wearable device to be replaced by other authentication mode.
Alternatively, acquisition module 720, is configured to the current biometric data being obtained user by the Wearable device of binding; Can the current biometric data according to get user obtain wearing state; Or acquisition module 720, is configured to the preset interface of the Wearable device calling binding, obtain wearing state, wearing state is that can Wearable device obtain according to the current biometric data that collect user.
Alternatively, mode changes module 780, is configured to the identification authentication mode based on Wearable device to be replaced by cipher authentication mode; Or,
Mode changes module 780, is configured to the identification authentication mode based on Wearable device to be replaced by finger print identifying mode; Or,
Mode changes module 780, is configured to the identification authentication mode based on Wearable device to be replaced by gesture authentication mode; Or,
Mode changes module 780, is configured to the identification authentication mode based on Wearable device to be replaced by electronic passwords authentication mode.
Alternatively, this device also comprises:
First execution module 792, is configured to, when wearing state is for non-wearing state, perform at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
Alternatively, this device also comprises:
Second execution module 794, is configured to when the authentication failed number of times of other authentication mode reaches preset times, performs at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
In sum, the operation actuating unit that the present embodiment provides, by obtaining the wearing state of the Wearable device of binding, when wearing state is non-wearing state, forbids performing delivery operation or adopting other authentication mode; Solve when the non-body-worn Wearable device of user, the authentication mode based on Wearable device may unsafe problem; Even if reach the non-body-worn Wearable device of user, the problem that the network property of user also can be effectively protected.
The operation actuating unit that the present embodiment provides; also by when Wearable device is in non-wearing state; perform at least one scheduled operation, make mobile terminal can record the doubtful relevant information for malicious user, the network property of user can be protected better.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Fig. 9 is a kind of block diagram operating actuating unit according to an exemplary embodiment.Such as, device 900 can be mobile phone, computing machine, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 9, device 900 can comprise following one or more assembly: processing components 902, storer 904, power supply module 906, multimedia groupware 908, audio-frequency assembly 910, I/O (I/O) interface 912, sensor module 914, and communications component 916.
The integrated operation of the usual control device 900 of processing components 902, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 902 can comprise one or more processor 918 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 902 can comprise one or more module, and what be convenient between processing components 902 and other assemblies is mutual.Such as, processing components 902 can comprise multi-media module, mutual with what facilitate between multimedia groupware 908 and processing components 902.
Storer 904 is configured to store various types of data to be supported in the operation of device 900.The example of these data comprises for any application program of operation on device 900 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 904 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that power supply module 906 is device 900 provide electric power.Power supply module 906 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 900 and be associated.
Multimedia groupware 908 is included in the screen providing an output interface between device 900 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant with touch or slide and pressure.In certain embodiments, multimedia groupware 908 comprises a front-facing camera and/or post-positioned pick-up head.When device 900 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 910 is configured to export and/or input audio signal.Such as, audio-frequency assembly 910 comprises a microphone (MIC), and when device 900 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 904 further or be sent via communications component 916.In certain embodiments, audio-frequency assembly 910 also comprises a loudspeaker, for output audio signal.
I/O interface 912 is for providing interface between processing components 902 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 914 comprises one or more sensor, for providing the state estimation of various aspects for device 900.Such as, sensor module 914 can detect the opening/closing state of device 900, the relative positioning of assembly, such as assembly is display and the keypad of device 900, the position of all right pick-up unit 900 of sensor module 914 or device 900 1 assemblies changes, the presence or absence that user contacts with device 900, the temperature variation of device 900 orientation or acceleration/deceleration and device 900.Sensor module 914 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 914 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 914 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 916 is configured to the communication being convenient to wired or wireless mode between device 900 and other equipment.Device 900 can access the wireless network based on communication standard, as Wi-Fi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 916 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, communications component 916 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 900 can be realized, for performing aforesaid operations manner of execution by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 904 of instruction, above-mentioned instruction can perform aforesaid operations manner of execution by the processor 918 of device 900.Such as, non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
Those skilled in the art, at consideration instructions and after putting into practice invention disclosed herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (11)

1. operate a manner of execution, it is characterized in that, described method comprises:
When monitoring execution delivery operation and adopt the identification authentication mode based on Wearable device, obtain the wearing state of the Wearable device of binding, described wearing state comprises wears middle state and non-wearing state;
Whether detect described wearing state is non-wearing state;
If described wearing state is described non-wearing state, then forbid performing described delivery operation, or, the described identification authentication mode based on Wearable device is replaced by other authentication mode.
2. method according to claim 1, is characterized in that, the described wearing state obtaining the Wearable device of binding, comprising:
The current biometric data of user is obtained by the described Wearable device of binding; Described wearing state is obtained according to the current biometric data that can get user;
Or,
Call the preset interface of the described Wearable device of binding, obtain described wearing state, described wearing state is that can described Wearable device obtain according to the current biometric data that collect user.
3. method according to claim 1, is characterized in that, described the described identification authentication mode based on Wearable device is replaced by other authentication mode, comprising:
The described identification authentication mode based on Wearable device is replaced by cipher authentication mode; Or,
The described identification authentication mode based on Wearable device is replaced by finger print identifying mode; Or,
The described identification authentication mode based on Wearable device is replaced by gesture authentication mode; Or,
The described identification authentication mode based on Wearable device is replaced by electronic passwords authentication mode.
4., according to the arbitrary described method of claims 1 to 3, it is characterized in that, described method also comprises:
If described wearing state is described non-wearing state, then perform at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
5., according to the arbitrary described method of claims 1 to 3, it is characterized in that, described method also comprises:
If the authentication failed number of times of other authentication mode described reaches preset times, then perform at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
6. an operation actuating unit, is characterized in that, described device comprises:
Acquisition module, be configured to when monitoring execution delivery operation and adopt the identification authentication mode based on Wearable device, obtain the wearing state of the Wearable device of binding, described wearing state comprises wears middle state and non-wearing state;
Detection module, whether be configured to detect described wearing state is non-wearing state;
Forbid execution module, be configured to, when described wearing state is described non-wearing state, forbid performing described delivery operation, or mode change module, be configured to the described identification authentication mode based on Wearable device to be replaced by other authentication mode.
7. device according to claim 6, is characterized in that,
Described acquisition module, is configured to the current biometric data being obtained user by the described Wearable device of binding; Described wearing state is obtained according to the current biometric data that can get user;
Or,
Described acquisition module, is configured to the preset interface of the described Wearable device calling binding, obtains described wearing state, and described wearing state is that can described Wearable device obtain according to the current biometric data that collect user.
8. device according to claim 6, is characterized in that,
Described mode changes module, is configured to the described identification authentication mode based on Wearable device to be replaced by cipher authentication mode; Or,
Described mode changes module, is configured to the described identification authentication mode based on Wearable device to be replaced by finger print identifying mode; Or,
Described mode changes module, is configured to the described identification authentication mode based on Wearable device to be replaced by gesture authentication mode; Or,
Described mode changes module, is configured to the described identification authentication mode based on Wearable device to be replaced by electronic passwords authentication mode.
9., according to the arbitrary described device of claim 6 to 8, it is characterized in that, described device also comprises:
First execution module, is configured to when described wearing state is described non-wearing state, performs at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
10., according to the arbitrary described device of claim 6 to 8, it is characterized in that, described device also comprises:
Second execution module, is configured to when the authentication failed number of times of other authentication mode described reaches preset times, performs at least one in following operation:
Image or the video of current environment is gathered by front-facing camera;
Image or the video of current environment is gathered by post-positioned pick-up head;
By image or the video of the camera collection current environment of binding;
The sound of current environment is gathered by microphone.
11. 1 kinds of operation actuating units, is characterized in that, described device comprises:
Processor;
For storing the storer of described processor executable;
Wherein, described processor is configured to:
When monitoring execution delivery operation and adopt the identification authentication mode based on Wearable device, obtain the wearing state of the Wearable device of binding, described wearing state comprises wears middle state and non-wearing state;
Whether detect described wearing state is non-wearing state;
If described wearing state is described non-wearing state, then forbid performing described delivery operation, or, the described identification authentication mode based on Wearable device is replaced by other authentication mode.
CN201510205496.0A 2015-04-27 2015-04-27 Operation executes method and device Active CN104850769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510205496.0A CN104850769B (en) 2015-04-27 2015-04-27 Operation executes method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510205496.0A CN104850769B (en) 2015-04-27 2015-04-27 Operation executes method and device

Publications (2)

Publication Number Publication Date
CN104850769A true CN104850769A (en) 2015-08-19
CN104850769B CN104850769B (en) 2019-03-15

Family

ID=53850409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510205496.0A Active CN104850769B (en) 2015-04-27 2015-04-27 Operation executes method and device

Country Status (1)

Country Link
CN (1) CN104850769B (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105139194A (en) * 2015-09-30 2015-12-09 联想(北京)有限公司 Method and system of connection establishment, and electronic devices
CN105301948A (en) * 2015-10-09 2016-02-03 惠州Tcl移动通信有限公司 Intelligent wristwatch, screen locking management method and screen locking management system thereof
CN105389701A (en) * 2015-11-05 2016-03-09 大唐微电子技术有限公司 Secure consumption method and apparatus of wearable equipment
CN105718771A (en) * 2016-01-15 2016-06-29 广东小天才科技有限公司 Control method and system for privacy mode
CN105809438A (en) * 2016-03-17 2016-07-27 广东乐心医疗电子股份有限公司 Identity recognition method, payment method and device for intelligent wearable equipment
CN106204039A (en) * 2016-06-30 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of safe payment method and system
CN106210011A (en) * 2016-06-30 2016-12-07 珠海市魅族科技有限公司 A kind of message prompt method and device
CN106251139A (en) * 2016-07-29 2016-12-21 广东小天才科技有限公司 Payment method and device for mobile terminal
CN106296189A (en) * 2016-07-25 2017-01-04 北京小米移动软件有限公司 Electronic transaction safe verification method and device and electronic equipment
CN106445141A (en) * 2016-09-23 2017-02-22 广东小天才科技有限公司 Control method and device for capacitive touch screen terminal
CN106571493A (en) * 2015-10-13 2017-04-19 璁镐赴 Intelligent controllable battery
CN106686528A (en) * 2016-12-21 2017-05-17 上海斐讯数据通信技术有限公司 Data transmission method and system as well as master device and slave device
CN107026733A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Management is carried out by it
CN107026734A (en) * 2016-01-29 2017-08-08 李明 A kind of method and system that Password Management is carried out using certification lasting effectiveness
CN107026732A (en) * 2016-01-29 2017-08-08 李明 A kind of system that Password Input number of times is reduced by wearable device
WO2017147906A1 (en) * 2016-03-04 2017-09-08 Motorola Solutions, Inc. Method and system for cloning data using a wearable electronic device
CN107194218A (en) * 2017-05-27 2017-09-22 广州三星通信技术研究有限公司 Adjust the method and device of identification authentication mode
CN107241349A (en) * 2017-07-13 2017-10-10 深圳怡化电脑股份有限公司 A kind of transaction processing system, pseudo operation device, ATM and method for processing business
GB2554143A (en) * 2016-07-13 2018-03-28 Motorola Mobility Llc Electronic device with gesture actuation of companion and corresponding systems and methods
WO2018072215A1 (en) * 2016-10-21 2018-04-26 华为技术有限公司 Security verification method and apparatus
CN108540293A (en) * 2018-05-03 2018-09-14 山东浪潮通软信息科技有限公司 A kind of identity identifying method and device
CN108628434A (en) * 2017-03-24 2018-10-09 上海传英信息技术有限公司 A kind of wearable device induction Verification System and method
CN110084025A (en) * 2019-04-29 2019-08-02 努比亚技术有限公司 A kind of safety of payment verification method, equipment and computer readable storage medium
US10372892B2 (en) 2016-07-13 2019-08-06 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
CN110311700A (en) * 2018-03-23 2019-10-08 卡西欧计算机株式会社 Electric terminal, electronic watch, safety setting method and storage medium
CN110381274A (en) * 2018-04-12 2019-10-25 Tcl新技术(惠州)有限公司 A kind of crime scene investigation device sky record index output control method, system and storage medium
CN110933074A (en) * 2019-11-28 2020-03-27 中国银行股份有限公司 User behavior verification method and device
CN111507704A (en) * 2020-04-13 2020-08-07 佛山职业技术学院 NFC-based payment method, system and storage medium
US10878771B2 (en) 2016-07-13 2020-12-29 Motorola Mobility Llc Deformable electronic device and methods and systems for display remediation to compensate performance degradation
CN112704471A (en) * 2019-10-24 2021-04-27 北京小米移动软件有限公司 Control method of wearable device, and storage medium
US11093262B2 (en) 2019-07-29 2021-08-17 Motorola Mobility Llc Electronic devices and corresponding methods for switching between normal and privacy modes of operation
US11113375B2 (en) 2019-09-09 2021-09-07 Motorola Mobility Llc Electronic devices with proximity authentication and gaze actuation of companion electronic devices and corresponding methods
CN113645257A (en) * 2021-10-14 2021-11-12 广州锦行网络科技有限公司 Identity authentication method and device, electronic equipment and storage medium
CN113807860A (en) * 2021-09-29 2021-12-17 中国银行股份有限公司 Banking transaction system and method based on head-mounted equipment
US11243567B2 (en) 2016-07-13 2022-02-08 Motorola Mobility Llc Deformable electronic device and methods and systems for reconfiguring presentation data and actuation elements

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008008830A2 (en) * 2006-07-11 2008-01-17 Mastercard International Incorporated Wearable contactless payment devices
CN101964126A (en) * 2010-09-13 2011-02-02 中兴通讯股份有限公司 Mobile terminal payment method and mobile terminal
CN103106736A (en) * 2012-12-28 2013-05-15 华为软件技术有限公司 Identity authentication method, terminal and server
WO2014122558A1 (en) * 2013-02-06 2014-08-14 Zhou Dylan Wearable personal digital device for facilitating mobile device payments and personal use
CN104182871A (en) * 2014-02-19 2014-12-03 钟一鸣 Mobile payment system and smart wristband
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment
CN104283876A (en) * 2014-09-29 2015-01-14 小米科技有限责任公司 Operation authorization method and device
CN104331796A (en) * 2014-11-04 2015-02-04 北京握奇智能科技有限公司 Wearable device and working method thereof
CN104346548A (en) * 2013-08-01 2015-02-11 华为技术有限公司 Wearable equipment and authentication method thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008008830A2 (en) * 2006-07-11 2008-01-17 Mastercard International Incorporated Wearable contactless payment devices
CN101964126A (en) * 2010-09-13 2011-02-02 中兴通讯股份有限公司 Mobile terminal payment method and mobile terminal
CN103106736A (en) * 2012-12-28 2013-05-15 华为软件技术有限公司 Identity authentication method, terminal and server
WO2014122558A1 (en) * 2013-02-06 2014-08-14 Zhou Dylan Wearable personal digital device for facilitating mobile device payments and personal use
CN104346548A (en) * 2013-08-01 2015-02-11 华为技术有限公司 Wearable equipment and authentication method thereof
CN104182871A (en) * 2014-02-19 2014-12-03 钟一鸣 Mobile payment system and smart wristband
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment
CN104283876A (en) * 2014-09-29 2015-01-14 小米科技有限责任公司 Operation authorization method and device
CN104331796A (en) * 2014-11-04 2015-02-04 北京握奇智能科技有限公司 Wearable device and working method thereof

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105139194B (en) * 2015-09-30 2019-09-24 联想(北京)有限公司 A kind of method that establishing connection, electronic equipment and the system for establishing connection
CN105139194A (en) * 2015-09-30 2015-12-09 联想(北京)有限公司 Method and system of connection establishment, and electronic devices
CN105301948A (en) * 2015-10-09 2016-02-03 惠州Tcl移动通信有限公司 Intelligent wristwatch, screen locking management method and screen locking management system thereof
CN106571493A (en) * 2015-10-13 2017-04-19 璁镐赴 Intelligent controllable battery
CN105389701A (en) * 2015-11-05 2016-03-09 大唐微电子技术有限公司 Secure consumption method and apparatus of wearable equipment
CN105718771A (en) * 2016-01-15 2016-06-29 广东小天才科技有限公司 Control method and system for privacy mode
CN107026732A (en) * 2016-01-29 2017-08-08 李明 A kind of system that Password Input number of times is reduced by wearable device
CN107026733A (en) * 2016-01-29 2017-08-08 李明 A kind of wearable device and the method that Password Management is carried out by it
CN107026734A (en) * 2016-01-29 2017-08-08 李明 A kind of method and system that Password Management is carried out using certification lasting effectiveness
US10931751B2 (en) 2016-03-04 2021-02-23 Motorola Solutions, Inc. Method and system for cloning data using a wearable electronic device
WO2017147906A1 (en) * 2016-03-04 2017-09-08 Motorola Solutions, Inc. Method and system for cloning data using a wearable electronic device
CN105809438A (en) * 2016-03-17 2016-07-27 广东乐心医疗电子股份有限公司 Identity recognition method, payment method and device for intelligent wearable equipment
CN106210011A (en) * 2016-06-30 2016-12-07 珠海市魅族科技有限公司 A kind of message prompt method and device
CN106204039A (en) * 2016-06-30 2016-12-07 宇龙计算机通信科技(深圳)有限公司 A kind of safe payment method and system
US10372892B2 (en) 2016-07-13 2019-08-06 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
US10251056B2 (en) 2016-07-13 2019-04-02 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
US11243567B2 (en) 2016-07-13 2022-02-08 Motorola Mobility Llc Deformable electronic device and methods and systems for reconfiguring presentation data and actuation elements
US10878771B2 (en) 2016-07-13 2020-12-29 Motorola Mobility Llc Deformable electronic device and methods and systems for display remediation to compensate performance degradation
GB2554143A (en) * 2016-07-13 2018-03-28 Motorola Mobility Llc Electronic device with gesture actuation of companion and corresponding systems and methods
US10839059B2 (en) 2016-07-13 2020-11-17 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
US11282476B2 (en) 2016-07-13 2022-03-22 Motorola Mobility Llc Deformable electronic device and methods and systems for display remediation to compensate performance degradation
GB2554143B (en) * 2016-07-13 2019-12-04 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
CN106296189A (en) * 2016-07-25 2017-01-04 北京小米移动软件有限公司 Electronic transaction safe verification method and device and electronic equipment
CN106251139A (en) * 2016-07-29 2016-12-21 广东小天才科技有限公司 Payment method and device for mobile terminal
CN106445141A (en) * 2016-09-23 2017-02-22 广东小天才科技有限公司 Control method and device for capacitive touch screen terminal
CN106445141B (en) * 2016-09-23 2019-09-17 广东小天才科技有限公司 Control method and device for capacitive touch screen terminal
CN108604266A (en) * 2016-10-21 2018-09-28 华为技术有限公司 A kind of safe checking method and equipment
US11216549B2 (en) 2016-10-21 2022-01-04 Huawei Technologies Co., Ltd. Security verification method and device
WO2018072215A1 (en) * 2016-10-21 2018-04-26 华为技术有限公司 Security verification method and apparatus
CN106686528B (en) * 2016-12-21 2021-01-01 杭州新中大科技股份有限公司 Data transmission method and system, master device and slave device
CN106686528A (en) * 2016-12-21 2017-05-17 上海斐讯数据通信技术有限公司 Data transmission method and system as well as master device and slave device
CN108628434A (en) * 2017-03-24 2018-10-09 上海传英信息技术有限公司 A kind of wearable device induction Verification System and method
CN107194218A (en) * 2017-05-27 2017-09-22 广州三星通信技术研究有限公司 Adjust the method and device of identification authentication mode
CN107241349B (en) * 2017-07-13 2023-05-30 深圳怡化电脑股份有限公司 Service processing system, virtual operation device, ATM and service processing method
CN107241349A (en) * 2017-07-13 2017-10-10 深圳怡化电脑股份有限公司 A kind of transaction processing system, pseudo operation device, ATM and method for processing business
CN110311700A (en) * 2018-03-23 2019-10-08 卡西欧计算机株式会社 Electric terminal, electronic watch, safety setting method and storage medium
CN110311700B (en) * 2018-03-23 2021-07-20 卡西欧计算机株式会社 Electronic terminal, electronic timepiece, security setting method, and storage medium
US11222332B2 (en) 2018-03-23 2022-01-11 Casio Computer Co., Ltd. Electronic terminal, electronic watch, security setting method, and recording medium
CN110381274A (en) * 2018-04-12 2019-10-25 Tcl新技术(惠州)有限公司 A kind of crime scene investigation device sky record index output control method, system and storage medium
CN108540293A (en) * 2018-05-03 2018-09-14 山东浪潮通软信息科技有限公司 A kind of identity identifying method and device
CN108540293B (en) * 2018-05-03 2021-07-27 浪潮通用软件有限公司 Identity authentication method and device
CN110084025A (en) * 2019-04-29 2019-08-02 努比亚技术有限公司 A kind of safety of payment verification method, equipment and computer readable storage medium
CN110084025B (en) * 2019-04-29 2024-03-19 努比亚技术有限公司 Payment security verification method, device and computer readable storage medium
US11093262B2 (en) 2019-07-29 2021-08-17 Motorola Mobility Llc Electronic devices and corresponding methods for switching between normal and privacy modes of operation
US11113375B2 (en) 2019-09-09 2021-09-07 Motorola Mobility Llc Electronic devices with proximity authentication and gaze actuation of companion electronic devices and corresponding methods
CN112704471A (en) * 2019-10-24 2021-04-27 北京小米移动软件有限公司 Control method of wearable device, and storage medium
CN110933074A (en) * 2019-11-28 2020-03-27 中国银行股份有限公司 User behavior verification method and device
CN111507704A (en) * 2020-04-13 2020-08-07 佛山职业技术学院 NFC-based payment method, system and storage medium
CN111507704B (en) * 2020-04-13 2023-11-07 佛山职业技术学院 NFC-based payment method, system and storage medium
CN113807860A (en) * 2021-09-29 2021-12-17 中国银行股份有限公司 Banking transaction system and method based on head-mounted equipment
CN113645257A (en) * 2021-10-14 2021-11-12 广州锦行网络科技有限公司 Identity authentication method and device, electronic equipment and storage medium
CN113645257B (en) * 2021-10-14 2022-03-08 广州锦行网络科技有限公司 Identity authentication method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN104850769B (en) 2019-03-15

Similar Documents

Publication Publication Date Title
CN104850769A (en) Method and device for executing operation
CN104850995A (en) Operation executing method and device
CN106951884B (en) Fingerprint acquisition method and device and electronic equipment
CN104850827A (en) Fingerprint identification method and apparatus
CN104283876A (en) Operation authorization method and device
CN104615240B (en) The unlocking method and a device of terminal
CN104361303A (en) Terminal exception processing method and device and electronic equipment
CN106022072A (en) Method and device for achieving fingerprint unlocking and electronic equipment
CN104794382A (en) Application starting method and device
CN104850828A (en) Person identification method and person identification device
CN105407098A (en) Identity verification method and device
CN105472303A (en) Privacy protection method and apparatus for video chatting
CN105607805A (en) Corner mark processing method and apparatus for application icon
CN106204049A (en) The method and device of payment processes
CN104484799A (en) Payment method and device
CN106389062A (en) A massage chair control method and apparatus
CN105069426A (en) Similar picture determining method and apparatus
CN105678549A (en) Payment method and device
CN107070914A (en) Authorization method, device and equipment based on wearable device
CN104352228A (en) Method and device for processing application program
CN105159496A (en) Touch event response method and mobile terminal
CN105893854B (en) Encryption and decryption method and device
CN106096964A (en) Method of payment and device
CN104571709A (en) Mobile terminal and processing method of virtual keys
CN104332037A (en) Method and device for alarm detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180821

Address after: 100176 Beijing Beijing economic and Technological Development Zone, Chuang Chuang fourteen Street 99, 33 D Building 2 level 2243 (centralized office area)

Applicant after: Beijing millet Payment Technology Co., Ltd.

Address before: 100085 Beijing Haidian District Qinghe middle street 68 Huarun colorful shopping mall two phase 13 level.

Applicant before: Xiaomi Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant