[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108183794B - Authentication method based on optical information - Google Patents

Authentication method based on optical information Download PDF

Info

Publication number
CN108183794B
CN108183794B CN201711428517.0A CN201711428517A CN108183794B CN 108183794 B CN108183794 B CN 108183794B CN 201711428517 A CN201711428517 A CN 201711428517A CN 108183794 B CN108183794 B CN 108183794B
Authority
CN
China
Prior art keywords
authentication
authentication key
light
information
luminous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711428517.0A
Other languages
Chinese (zh)
Other versions
CN108183794A (en
Inventor
李成宇
张洪杰
王森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Rare Earth Changchun Co ltd
Original Assignee
Zhongke Rare Earth Changchun Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Rare Earth Changchun Co ltd filed Critical Zhongke Rare Earth Changchun Co ltd
Priority to CN201711428517.0A priority Critical patent/CN108183794B/en
Publication of CN108183794A publication Critical patent/CN108183794A/en
Application granted granted Critical
Publication of CN108183794B publication Critical patent/CN108183794B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/11Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
    • H04B10/114Indoor or close-range type systems
    • H04B10/116Visible light communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to an authentication method based on optical information, which comprises the following steps: sending an authentication request to a portable second device through a first device and acquiring second device configuration information from the second device receiving the authentication request; the first equipment generates a first authentication key and a second authentication key which are matched with the second equipment according to the second equipment configuration information and sends the first authentication key and the second authentication key to the second equipment; attaching the second device to a third device communicatively connected to the first device such that the first authentication key is transmitted to the third device via a wireless communication module of the second device in an electromagnetic induction coupling manner and the second authentication key is transmitted to the third device via a light-emitting unit of the second device in a light information manner for authentication; the third device notifies or controls the controlled apparatus to transition from the first state to the second state after the second device passes the authentication. The invention solves the problem that the authentication is easy to be copied by singly using an electromagnetic induction coupling mode, and has high authentication safety and efficiency.

Description

Authentication method based on optical information
Technical Field
The invention relates to the technical field of authentication, in particular to an authentication method based on optical information.
Background
At present, most mobile terminals are equipped with various wireless communication modules, such as a WiFi module, a bluetooth module, and an NFC module, and because the mobile terminals are portable, the mobile terminals have become products that modern people must bring when going out. Because, for convenience, it is conceivable to use the wireless communication module of the mobile terminal for authentication, and thus authentication methods or systems based on various wireless communication modules have been developed.
For example, chinese patent document with an authorization publication number CN103679883B discloses an inductive access control system based on WIFI, which is characterized in that: the system comprises a central server unit, an access control unit and a mobile terminal, wherein the central server unit is connected with the access control unit through a local area network or the Internet, and the mobile terminal and the access control unit are interacted through WIFI signals; the door opening process of the system comprises the following steps: step S101, registering own MAC address to a central server unit when the mobile terminal is used for the first time; step S102, the mobile terminal detects a WIFI beacon signal of an access control unit and initiates an access authentication request; step S103, the access control unit receives an access authentication request of the mobile terminal, extracts MAC address information from the authentication request information, and sends the extracted MAC address information to the central server unit, or responds according to a standard WIFI access authentication process; step S104, performing access control authority authentication detection; step S105: and the access control unit executes the door opening instruction and reports an execution result. Through the access control system, a user can only carry the mobile terminal without swiping a card or using the access control system through other means such as biological identity recognition and the like, and the user does not need to perform physical contact interactive operation with the access control system, so that the use of the user is more convenient; from the cost perspective, compared with a card identification system, a large amount of card expenses are saved.
For another example, chinese patent document with an authorization publication number CN104821031B discloses a dynamic authentication method for a bluetooth mobile phone smart lock control system, which is characterized by comprising the following steps: s1: establishing connection between the Bluetooth mobile phone and the Bluetooth lock control terminal; s2: the method comprises the steps that a Bluetooth mobile phone sends registration information to a Bluetooth lock control terminal, wherein the registration information comprises a user-defined password and a Bluetooth mobile phone identification code; s3: the Bluetooth lock control terminal generates a dynamic password and combines the dynamic password, a user-defined password and a Bluetooth mobile phone identification code into a password to be verified; s4: the Bluetooth lock control terminal sends a dynamic password to the Bluetooth mobile phone; s5: the Bluetooth mobile phone encapsulates the received dynamic password, the user defined password and the Bluetooth mobile phone identification code which are sent in the step S2 into an unlocking password; s6: the Bluetooth mobile phone sends an unlocking password to the Bluetooth lock control terminal; s7: the Bluetooth lock control terminal receives the unlocking password and verifies the unlocking password and the password to be verified; s8: feeding back a verification result, successfully verifying, executing an unlocking operation by the Bluetooth lock control terminal, and returning to the step S3 to generate a new dynamic password; and if the verification fails, the Bluetooth lock control terminal outputs prompt information or alarm information.
Whether the authentication is based on the WiFi module or the bluetooth module, during the first authentication, the authentication device needs to be connected through the processes of scanning the device and inputting the password (or pairing code), and then the authentication information can be interacted, which results in a long verification time. During subsequent authentication, the scanning device is not timely, and when the user arrives at the authentication device, the user needs to wait for the connection between the mobile terminal and the authentication device before authentication interaction can be performed, so that the authentication time is uncontrollable and the use is inconvenient.
Near Field Communication (NFC) technology evolved from contactless Radio Frequency Identification (RFID) and was also transferred by electromagnetic inductive coupling in the radio frequency part of the spectrum. Although the authentication speed of the authentication method based on the NFC module is high, electromagnetic waves are easy to intercept, so that authentication information is copied, and the hidden danger of insecurity exists.
Disclosure of Invention
In view of the shortcomings of the prior art, the present invention provides an authentication method based on optical information, which uses a wireless communication module of a second device to send a first authentication key in an electromagnetic induction coupling manner for authentication, and also sends a second authentication key in an optical information manner by using a light-emitting unit of the second device for authentication. The problem that the wireless communication module which singly uses an electromagnetic induction coupling mode is easy to copy during authentication is solved, and the authentication safety is greatly improved. Moreover, because the wireless communication module and the light-emitting unit which communicate in the electromagnetic induction coupling mode do not need to be manually connected with the third equipment for authentication in advance by inputting the password or the pairing code, the authentication efficiency is high. The method has good advantages in occasions with high requirements on authentication security and large number of authenticated users.
According to a preferred embodiment, the method comprises: sending an authentication request to a portable second device through a first device and acquiring second device configuration information from the second device receiving the authentication request; the first equipment generates a first authentication key and a second authentication key which are matched with the second equipment according to the second equipment configuration information and sends the first authentication key and the second authentication key to the second equipment; attaching the second device to a third device communicatively connected to the first device such that the first authentication key is transmitted to the third device via a wireless communication module of the second device in an electromagnetic induction coupling manner and the second authentication key is transmitted to the third device via a light-emitting unit of the second device in a light information manner for authentication; and the third equipment informs or controls the controlled device to be switched from the first state to the second state after the second equipment passes the authentication. By the method, the authentication safety and the authentication efficiency can be improved.
According to a preferred embodiment, when the second device sends the first authentication key and the second authentication key to a third device, the first sending time of the first authentication key is earlier than the second sending time of the second authentication key, and the second authentication key is sent in an automatic triggering manner after the second device recognizes that the first authentication key passes authentication. The first sending time of the first authentication key is earlier than the second sending time of the second authentication key, so that the first authentication key and the second authentication key can be prevented from being leaked at the same time, and the confidentiality is improved. And the second authentication key is sent in an automatic triggering mode after the second equipment identifies that the first authentication key passes the authentication, so that the uncontrollable authentication time caused by a manual operation process is avoided, the authentication efficiency is improved, and the user experience is indirectly improved. In addition, the second authentication key is set to be sent after the first authentication key passes the authentication, because the first authentication key sent in the electromagnetic induction coupling mode has a larger information transmission range than the second authentication key sent in the optical information mode, and is easy to be stolen by card reading equipment arranged at a secret place, and the confidentiality is not strong. The decoding difficulty of the optical information is higher, and because the corresponding light-emitting unit is attached to the acquisition unit when the second authentication key is sent in the optical information mode, the light-emitting unit is less prone to leakage compared with the acquisition unit. Therefore, the first authentication key with low confidentiality is sent for authentication, even if the disguised authentication device steals the first authentication key, the second authentication key with higher decoding difficulty cannot be revealed because the first authentication key cannot be identified to pass the authentication, and the authentication safety is improved.
According to a preferred embodiment, the first device further obtains a second device identity from a second device that receives the authentication request to bind a legitimate carrier of the first authentication key and the second authentication key as the second device and the first device further sends a third device identity of the third device to the second device. The legal carriers of the first authentication key and the second authentication key are bound to the second equipment, so that the first authentication key and the second authentication key sent by the third equipment are prevented from being intercepted by others after the user receives the authentication request, and the other equipment is used for authentication, thereby improving the security of authentication.
According to a preferred embodiment, when the second device is attached to a third device communicatively connected to the first device, the second device receives the third device identifier from the third device through the wireless communication module in an electromagnetic induction coupling manner, and sends the second device identifier, the first authentication key, and the second authentication key to the third device after confirming the identity of the third device. After the identity of the third device is confirmed, the second device identity identifier, the first authentication key and the second authentication key are sent to the third device, so that the first authentication key can be prevented from being leaked by the second device before the identity of the third device is not confirmed, and the authentication security is improved.
According to a preferred embodiment, after the second device confirms the identity of the third device and before the second device sends the light information, the third device receives the verification light sent by the second device through the light-emitting unit in parallel in the process of authenticating the first authentication key and adjusts the identification reference of the light information according to the verification light. By the method, the time period before the optical information is sent can be fully utilized to complete the adjustment process of the identification reference, and the authentication efficiency and accuracy are improved.
According to a preferred embodiment, the light emitting unit is a flash or a display screen; wherein the third device determines that the light information is from the flash or the display and associates an authentication result of the second authentication key with it by analyzing an optical characteristic associated with the second device configuration information, or the third device acquires user selection information from the second device determines that the light information is from the flash or the display and associates an authentication result of the second authentication key with it; and the first equipment acquires the authentication result from the third equipment, counts the flash lamp authentication passing rate of passing authentication of the second authentication key sent by the flash lamp and the display screen authentication passing rate of passing authentication of the light information sent by the display screen under the condition that the first authentication key passes authentication in a device type mode, and provides reference and/or suggestion for a user who subsequently uses the second equipment with the corresponding equipment type to select the flash lamp or send the second authentication key by the display screen. By the method, accurate selection reference can be rapidly provided for the selection of the appropriate light-emitting unit by the subsequent user, and the user experience is improved. Meanwhile, the total time consumption in the subsequent queuing authentication process can be reduced, and the authentication efficiency is improved.
According to a preferred embodiment, the first device generates at least two second authentication keys associated with the second device having the second device configuration information according to the obtained second device configuration information, wherein preferably one of the at least two second authentication keys conforms to the light emission characteristic of the flash and the other second authentication key conforms to the light emission characteristic of the display. By the method, when the light-emitting characteristics of the flash lamp and the display screen cannot share one second authentication key, the second authentication keys which are in accordance with the light-emitting characteristics can be respectively applied.
According to a preferred embodiment, the light information is stroboscopic light emission, and one light emission cycle of the stroboscopic light emission comprises a controlled first light emission stage, a controlled second light emission stage and a third light emission stage, and the adjustment of at least one parameter of the light emission intensity, the light emission duration, the light emission curve and the light emission wavelength in the first light emission stage is realized by adjusting the driving scheme of the light emission unit; adjusting at least one parameter of the luminous intensity, the luminous duration, the luminous curve and the luminous wavelength of the second luminous phase is realized by adjusting the driving scheme of the luminous unit, and the third luminous phase can be obtained by adjusting the first and the second luminous phases, wherein the luminous intensity of the third luminous phase is close to or equal to zero candela.
According to a preferred embodiment, the third device has an indication mechanism for directing the second device, preferably the indication mechanism uses a fluorescent marker for directing the light emitting unit of the corresponding second device to the collecting unit of the third device for acquiring the light information, wherein preferably the indication mechanism is arranged beside the collecting unit in such a way that the light emitting direction thereof does not intersect with the collecting direction of the light information. By providing the indication mechanism, the third device 3 can be clearly and quickly found at night, so that the flash lamp or the display screen can be directed to the acquisition unit before authentication. By adopting the fluorescent mark, the interference of stray light on the authentication process can be avoided, and the accuracy and reliability of the authentication are improved.
According to a preferred embodiment, after the first device sends an authentication request to the second device, the first device generates at least the first authentication key and the second authentication key that are cryptographically different from each other in response to the acquisition of the second device identity and the second device configuration information of the second device, and preferably the generation of the first authentication key is earlier in time than the generation of the second authentication key. The same algorithm is adopted to generate the secret keys, and different secret keys are generated only according to the time sequence relation, so that the calculation load can be reduced, the authentication process can be simplified, and the authentication execution efficiency can be improved.
Drawings
FIG. 1 is a schematic diagram of the connection relationship of the main devices employed in a preferred embodiment of the present invention;
FIG. 2 is a diagram of a strobe curve of a lighting cycle of the present invention;
FIG. 3 is a diagram of a strobe curve in which five display second illumination phases;
FIG. 4 is a diagram of a strobe curve in which seven kinds of first light emission phases are shown;
FIG. 5 is a graph of spectra at A, B and C stages between 0 and 5 ms;
FIG. 6 is a graph of spectra at D, E and F stages between 0 and 5 ms;
FIG. 7 is a graph of spectra at A, B and C phase between 10 and 12 ms;
FIG. 8 is a graph of spectra at D, E and F stages between 10 and 12 ms;
FIG. 9 is a graph of spectra at A, B and C-stage between 12 and 15 ms; and
FIG. 10 is a graph of the spectrum at D, E and F-stage between 12 and 15 ms.
List of reference numerals
1: the first device 2: the second device 3: third device
4: controlled device
Detailed Description
The following detailed description is made with reference to the accompanying drawings.
The present invention will be described in detail with reference to the accompanying drawings 1 to 10.
Example 1
The invention discloses an authentication method based on optical information, which comprises the following steps: an authentication request is sent by the first device 1 to the portable second device 2 and second device configuration information is obtained from the second device 2 receiving the authentication request. The first device 1 generates a first authentication key and a second authentication key adapted to the second device 2 according to the second device configuration information and sends the first authentication key and the second authentication key to the second device 2. The second device 2 is placed against a third device 3 communicatively connected to the first device 1 such that the first authentication key is transmitted to the third device 3 for authentication via the wireless communication module of the second device 2 in an electromagnetic inductive coupling manner. The second device 2 recognizes that the first authentication key is authenticated and then sends the second authentication key to the third device 3 in the form of optical information for authentication. The third device 3 controls the controlled apparatus 4 to transit from the first state to the second state after the second authentication key passes the authentication.
Preferably, the first device 1 may be a smart device having data processing capabilities. For example, the first device 1 is at least one of a server, a desktop computer, a notebook computer, a tablet computer, a mobile phone, VR glasses, a smart watch, and other forms of special purpose devices.
Preferably, the second device 2 may be a portable mobile device having a light emitting device and/or a wireless communication module. For example, the second device 2 is at least one of a laptop, a tablet, a cell phone, VR glasses, and a smart watch.
Preferably, the third device 3 may be an authentication device. Such as an electronic ticket validator. It is particularly preferred that the third device 3 also has a further wireless communication module which communicates in an electromagnetic inductive coupling.
Preferably, the controlled device 4 may be a lock device. For example, the first state may be an off state. The second state may be an on state. For another example, the first state may be a non-passing state. The second state may be a passable state.
Preferably, the wireless communication module in the present invention is a module capable of performing bidirectional communication in an electromagnetic induction coupling manner. For example, existing NFC modules, or other modules subsequently developed that communicate in an electromagnetic inductive coupling manner.
Preferably, the second device configuration information is a configuration condition that can be used to represent a software and/or hardware configuration of the second device. In particular software and hardware information about the wireless communication module, the flash and/or the display screen. It may be directly represented, for example, the model of the wireless communication module, the model of the flash and/or the model of the display screen and its corresponding software information. It may also be indirectly expressed, for example, the second device configuration information is a device model, and the first device 1 may obtain the specific configuration information of the second device through a query manner after obtaining the device model.
Preferably, the first device 1 generates the first authentication key and the second authentication key adapted to the second device 2 according to the second device configuration information, that means that the sending of the first authentication key and the second authentication key can be implemented by software and/or hardware conditions of the second device derived from the second device configuration information. Therefore, the authentication failure caused by the fact that the software and/or hardware conditions of the second equipment do not match the sending conditions of the first authentication key and the second authentication key can be prevented, and the energy and time of corresponding personnel are consumed. According to the present invention, it is easily conceivable that, if the configuration condition of the second device is derived from the configuration information of the second device, which cannot implement the method of the present invention, a reminder message is sent to the second device 2 that the corresponding configuration condition does not match. At the same time, the user of the second device 2 may also be informed of the handling method to be handled.
Preferably, in some cases, the third device 3 may be integrated with the controlled apparatus 4.
According to a preferred embodiment, the light information is emitted by a flash or a display screen of the second device 2.
According to a preferred embodiment, the first device 1 may also obtain a second device identity from the second device 2 receiving the authentication request. And binding the first authentication key and the second authentication key with the second device identity, so as to judge whether the sending device sending the first authentication key and the second authentication key is the second device 2 with the second device identity during authentication. If not, the authentication is not passed. Meanwhile, corresponding alarm information can be sent out. The first device 1 may also send a third device identity of the third device 3 to the second device 2. The second device 2 may issue the first authentication key after determining the identity of the third device 3. In general, a wireless communication module with an NFC module or the like passively sends out an authentication key immediately when approaching a magnetic field of an authentication device, so that the identity of the authentication device is not verified a priori, and a card reading device is easily used by others to obtain the authentication key, which causes an unsafe factor. The second device 2 sends the first authentication key after determining the identity of the third device 3, so that the second device 2 can be prevented from leaking the first authentication key before the identity of the third device 3 is not determined, and the authentication security is improved.
Preferably, the second device identity is information capable of representing a unique identity of the second device. By means of the second device identity, different second devices can be distinguished. Taking the mobile phone as an example, the second device id may be at least one of an IMIE number, a UDID, a SN, an ICCID, a MAC address, a bluetooth address, and a mobile phone card number.
According to a preferred embodiment, when the second device 2 is placed against the third device 3 communicatively connected to the first device 1, the second device 2 first receives the third device identification from the third device 3 via the wireless communication module in an electromagnetic inductive coupling manner and only sends the second device identification, the first authentication key and the second authentication key to the third device 3 after confirming the identity of the third device 3.
Preferably, the third device identity is information capable of representing a unique identity of the third device. For example, the third device identification is a vendor-set device number. Alternatively, the third device identity is an address of a component constituting the third device 3, and the address has a uniqueness, such as a MAC address. Still alternatively, the third device id is a device code assigned to each third device 3 by the first device 1.
According to a preferred embodiment, after the second device 2 confirms the identity of the third device 3 and before the light information is emitted, the third device 3 receives the verification light sent by the second device 2 through the flash lamp or the display screen in parallel during the process of authenticating the first authentication key and adjusts the identification reference of the light information according to the verification light.
Preferably, since the flash lamps or display screens of different models of second devices may have different light emitting characteristics due to different hardware and different software, the display screens or flash lamps of the same model of second devices may have different light emitting characteristics due to different film sticking, different film sticking types, different software versions, different hardware aging degrees, and the like, even if one second device has different light emitting characteristics of different light emitting devices, such as the light emitting characteristics of the flash lamps and the display screens are obviously different. Therefore, before the light information is emitted, the verification light is emitted. The method is used for adjusting the identification standard of the optical information before the optical information representing the second authentication key is sent out for authentication so as to improve the accuracy of the authentication process. The verification light can be controlled by a section of uniform and universal light-emitting codes so as to reduce communication overhead, calculation overhead and storage overhead of each link. It is particularly preferable that the verification light is different from the light information to prevent the second authentication key from being leaked, improving the security of the authentication.
According to a preferred embodiment, the third device 3 may determine that the light information is coming from a flash or a display screen by analyzing optical characteristics associated with the second device configuration information. Alternatively, the third device 3 may acquire the user selection information from the second device 2 to judge whether the light information is from a flash or a display screen. The first device 1 acquires the authentication result from the third device 3, and counts a flash lamp authentication passing rate that the second authentication key is sent by the flash lamp to pass the authentication and a display screen authentication passing rate that the light information sent by the display screen passes the authentication under the condition that the first authentication key passes the authentication according to the device model. Thereby providing a reference and/or suggestion for a user of the second device 2 to subsequently use the corresponding device model to select a flash or a display screen to issue a second authentication key. In addition, the statistical data can be regularly published or fed back to the manufacturer of the corresponding second device, so that the manufacturer can be helped to continuously improve the product of the second device, and the light-emitting characteristic of a flash lamp or a display screen of the second device is more stable. An exemplary statistical data is given in the table below, for example, when the second device 2 is gorgeous 7 or iPhone6S, the first device 1 may suggest that its user chooses to issue the second authentication key from the display. Or, the historical statistical data of the same equipment model is visually given, and the user autonomously selects according to the statistical data. For another example, when the second device 2 is millet 5S, the first device 1 may suggest that its user choose to issue the second authentication key by the flash. Alternatively, the historical statistical data of the same equipment model can be visually given, and the user can autonomously select the equipment model according to the statistical data.
Figure BDA0001522892280000091
According to a preferred embodiment, the light information is a stroboscopic light emission and one light emission cycle of the stroboscopic light emission comprises a controlled first light emission phase, a controlled second light emission phase and a third light emission phase. The adjustment of at least one parameter of the luminous intensity, the luminous duration, the luminous curve and the luminous wavelength of the first luminous stage can be realized by adjusting the driving scheme of the flash lamp or the display screen. The adjustment of at least one parameter of the luminous intensity, the luminous duration, the luminous curve and the luminous wavelength of the second luminous stage can be realized by adjusting the driving scheme of the flash lamp or the display screen. And a third lighting phase can be obtained by adjusting the first lighting phase and the second lighting phase, wherein the lighting intensity of the third lighting phase is close to or equal to zero candela.
According to another preferred embodiment, the light information is a stroboscopic light emission and one light emission cycle of the stroboscopic light emission comprises a controlled first light emission phase, a controlled second light emission phase and a third light emission phase. Wherein the second device 2 may adjust at least one parameter of the luminous intensity, the luminous duration, the luminous curve and the luminous wavelength of the first lighting phase. The second device 2 may adjust at least one of the parameters of the luminous intensity, the luminous duration, the luminous curve and the luminous wavelength of the second lighting phase. The second device 2 may obtain the third lighting phase by adjusting the first lighting phase and the second lighting phase. The luminous intensity of the third luminous phase is close to or equal to zero candela. The duration of the third lighting phase is determined by the first lighting phase and the second lighting phase.
According to a preferred embodiment, the third device 3 may have an indication mechanism for directing the second device 2 to direct a flash or display of the respective second device 2 to an acquisition unit of the third device 3 for acquiring light information. Preferably, the indication mechanism employs a fluorescent marker. Preferably, the indication mechanism is arranged beside the acquisition unit in a manner that the light emitting direction of the indication mechanism is not intersected with the acquisition direction of the optical information. By providing the indication mechanism, the third device 3 can be clearly and quickly found at night, so that the flash lamp or the display screen can be directed to the acquisition unit before authentication. By adopting the fluorescent mark, the interference of stray light on the authentication process can be avoided, and the accuracy and reliability of the authentication are improved.
According to a preferred embodiment, after the first device 1 sends an authentication request to the second device 2, the first device 1 generates at least a first authentication key and a second authentication key that are cryptographically different from each other in response to the acquisition of the second device identity and the second device configuration information of the second device 2. Preferably, the first authentication key and the second authentication key may employ the same algorithm associated with time. The generation of the first authentication key may be earlier in time than the generation of the second authentication key. Alternatively, the generation of the second authentication key may be earlier in time than the generation of the first authentication key. The same algorithm is adopted to generate the secret keys, and different secret keys are generated only according to the time sequence relation, so that the calculation load can be reduced, the authentication process can be simplified, and the authentication execution efficiency can be improved.
According to a preferred embodiment, the first device 1 may generate at least two second authentication keys related to the second device 2 having the second device configuration information in dependence of the obtained second device configuration information. Preferably, one of the at least two second certification keys conforms to a light emission characteristic of the flash. The other second authentication key corresponds to a light emitting characteristic of the display screen.
Example 2
This embodiment is a further improvement of embodiment 1, and repeated contents are not described again.
According to a preferred embodiment, the first device 1 may be a web server. The second device 2 may be a mobile terminal. The third device 3 may be an authentication apparatus. For example, after a user purchases tickets for a concert on the internet, a ticket seller sends an authentication request to a portable mobile terminal via a network server. The authentication request can be sent in the form of short message, mail or push in APP. The authentication request may include a reminder text for obtaining the authority of the configuration information and/or the identity information. The user checks the corresponding authentication request and then clicks a confirmation button or performs an operation of equivalent effect to receive the authentication request. Then, the network server acquires mobile terminal configuration information from the mobile terminal that received the authentication request. And the network server generates a first authentication key and a second authentication key which are matched with the mobile terminal according to the configuration information of the mobile terminal and sends the first authentication key and the second authentication key to the mobile terminal. The mobile terminal is attached to an authentication device which is in communication connection with the network server so that the first authentication key is sent to the authentication device for authentication in an electromagnetic induction coupling mode through a wireless communication module of the mobile terminal. The mobile terminal identifies that the first authentication key passes the authentication and then sends the second authentication key to the authentication device in a mode of optical information for authentication. The authentication device controls the controlled device 4 to transition from the first state to the second state after the second authentication key passes the authentication. The controlled device is a gate control of a concert site, and the first state is an impassable state. The second state is a pass state. By the method, the user can remotely acquire the trusted certificate entering the corresponding place, and the authentication can be quickly and conveniently completed through the mobile terminal.
The above embodiments are merely illustrative and the field of application of the method of the invention is not limited thereto. For example, one company invites a plurality of professors to the company to give a speech, and by the method, a link of explaining for security guards is omitted, so that the working efficiency is improved, and the user experience of invitees can be improved. For another example, a person works in two locations, namely, in sand and the sea, each for 3 to 4 months, with fixed houses for rest in both sand and sea. However, since the time interval is long, the house is full of dust when the next place works, and the house is inconvenient to complete cleaning work by itself due to busy work or late arrival time. However, the key is handed to the corresponding home agent for storage, which is unsafe. It can adopt the method of the invention with the door lock being the controlled device and the door being externally provided with a third device 3 for authentication. Before the user arrives at the next place of departure, the user can contact the corresponding housekeeping personnel, then send an authentication request to the mobile phone of the housekeeping personnel through the mobile phone of the user, and give unlocking authority within a certain time period or a certain number of times. Therefore, the cleaning can be efficiently and safely realized, and unsafe factors possibly caused by handing an entity key to housekeeping personnel are solved.
Example 3
This embodiment is a product embodiment corresponding to the method of the present invention, and the non-repetitive content in embodiment 1 may be a supplement to this embodiment and is a part of this embodiment. The non-repetitive content in this embodiment can also be a part of embodiment 1 as a supplement to embodiment 1.
According to a preferred embodiment, an authentication system comprises: a first device 1, a second device 2, a third device 3 and a controlled device 4. Wherein the system sends an authentication request to the portable second device 2 via the first device 1 and obtains second device configuration information from the second device 2 receiving the authentication request. The first device 1 generates a first authentication key and a second authentication key adapted to the second device 2 according to the second device configuration information and sends the first authentication key and the second authentication key to the second device 2. The second device 2 is attached to a third device 3 which is communicatively connected to the first device 1 such that the first authentication key is transmitted to the third device 3 via a wireless communication module of the second device 2 in an electromagnetic inductive coupling manner and the second authentication key is transmitted to the third device 3 via a light-emitting unit of the second device 2 in a light information manner for authentication; the third device 3 notifies or controls the controlled apparatus 4 to transition from the first state to the second state after the second device 2 passes the authentication.
According to a preferred embodiment, when the second device 2 sends the first authentication key and the second authentication key to the third device 3, the first sending time of the first authentication key is earlier than the second sending time of the second authentication key, and the second authentication key is sent in an automatic triggering manner after the second device 2 recognizes that the first authentication key is authenticated.
According to a preferred embodiment, the first device 1 further obtains a second device identity from the second device 2 receiving the authentication request to bind the legitimate carrier of the first authentication key and the second authentication key to the second device 2 and the first device 1 further sends a third device identity of the third device 3 to the second device 2.
According to a preferred embodiment, when the second device 2 is placed against the third device 3 communicatively connected to the first device 1, the second device 2 first receives the third device identification from the third device 3 via the wireless communication module in an electromagnetic inductive coupling manner and only sends the second device identification, the first authentication key and the second authentication key to the third device 3 after confirming the identity of the third device 3.
According to a preferred embodiment, after the second device 2 has confirmed the identity of the third device 3, before emitting the light information, the third device 3 receives the verification light transmitted by the second device 2 through the light emitting unit in parallel during the process of authenticating the first authentication key and adjusts the identification reference of the light information according to the verification light.
According to a preferred embodiment, the light emitting unit is a flash or a display screen;
wherein the third device 3 judges whether the light information is from the flash or the display and associates the authentication result of the second authentication key with it by analyzing the optical characteristics related to the second device configuration information, or the third device 3 acquires the user selection information from the second device 2 and judges whether the light information is from the flash or the display and associates the authentication result of the second authentication key with it;
the first device 1 obtains the authentication result from the third device 3, and under the condition that the first authentication key passes the authentication according to the device model, the flash lamp authentication passing rate of the second authentication key passing the authentication sent by the flash lamp and the display screen authentication passing rate of the light information sent by the display screen passing the authentication are counted, and reference and/or suggestion are provided for the user who subsequently uses the second device 2 with the corresponding device model to select the flash lamp or the display screen to send the second authentication key.
According to a preferred embodiment, the first device 1 generates at least two second authentication keys related to the second device 2 having the second device configuration information in dependence on the obtained second device configuration information, wherein preferably one of the at least two second authentication keys conforms to the lighting characteristics of the flash and the other second authentication key conforms to the lighting characteristics of the display.
According to a preferred embodiment, the light information is stroboscopic light emission, and one light emission cycle of the stroboscopic light emission comprises a controlled first light emission stage, a controlled second light emission stage and a third light emission stage, and the adjustment of at least one parameter of the light emission intensity, the light emission duration, the light emission curve and the light emission wavelength in the first light emission stage is realized by adjusting the driving scheme of the light emission unit; and adjusting at least one parameter of the luminous intensity, the luminous duration, the luminous curve and the luminous wavelength of the second luminous phase by adjusting the driving scheme of the luminous unit, and obtaining a third luminous phase by adjusting the first and second luminous phases, wherein the luminous intensity of the third luminous phase is close to or equal to zero candela.
According to a preferred embodiment, the third device 3 has an indicator means for directing the second device 2, preferably a fluorescent marker, for directing the light emitting unit of the respective second device 2 to the collecting unit of the third device 3 for obtaining the light information, wherein preferably the indicator means is arranged beside the collecting unit in such a way that its light emitting direction does not intersect the collecting direction of the light information.
According to a preferred embodiment, after the first device 1 sends the authentication request to the second device 2, the first device 1 generates at least a first authentication key and a second authentication key that are cryptographically different from each other in response to the acquisition of the second device identity and the second device configuration information of the second device 2, and preferably the generation of the first authentication key is earlier in time than the generation of the second authentication key.
Example 4
This embodiment is a further improvement on embodiments 1, 2, and 3 and their combination, and repeated details are not repeated.
This embodiment describes in detail the characteristic curve change of the optical information shown in fig. 2 to 10. The trend of the characteristic curves of the preferred first lighting phase of the invention is shown in fig. 2 to 4. The horizontal axis in the figure represents time in ms. The vertical axis represents intensity or relative intensity, in unlimited units, as represented by the international common designation a.u. The light emitting period of the present embodiment is preferably 20ms, the first light emitting period is 0-5 ms, the second light emitting period is 5-15 ms, and the third light emitting period is 15-20 ms.
The luminous intensity in the first emission period is constant according to the luminous curves N1-N6 shown in fig. 2 and 3. As shown in the N7 emission curve of fig. 4, the emission intensity in the first emission stage repeatedly changes in a sharp rise and a sharp fall, but the range of change of the entire curve is not changed. As shown in the N8 luminous curve of fig. 4, the luminous intensity in the first emission phase has a repeated change of a slow rise and a slow fall, but the whole curve range does not change. As shown in the emission curve No. N9 in fig. 4, the emission intensity in the first emission period has a change of a step-up and a step-down. As shown in the emission curve No. N10 in fig. 4, the emission intensity in the first emission period has a variation of a smooth rise and a smooth fall. As shown in the emission curve No. N11 in fig. 4, the emission intensity in the first emission period has a trend of decreasing in a straight line. As shown in the emission curve No. N12 in fig. 4, the emission intensity in the first emission period has a change in which the emission intensity first steps down and then steps up. As shown in the emission curve N13 in fig. 4, the emission intensity in the first emission period has a change of first smooth decrease and then smooth increase.
The emission curves N1-N6 shown in fig. 2 and 3 illustrate the variation of the characteristic curves of several second emission phases. As shown in the N1 luminous curve of fig. 2, the luminous intensity in the second emission stage is in a downward trend of the concave curve. As shown in the emission curve N2 in fig. 3, the emission intensity in the second emission period is in a downward trend of a convex curve. As shown in the N3 luminous curve of fig. 3, the luminous intensity of the second lighting period is in a descending trend of a concave wave curve. As shown in the N4 luminous curve of fig. 3, the luminous intensity of the second luminous phase is in the descending trend of the convex wave curve. As shown in the emission curve of N5 in fig. 3, the emission intensity in the second emission stage is decreased in a stepwise manner. As shown in the N6 luminous curve of fig. 3, the luminous intensity in the second light-emitting stage is in a downward trend of a linear curve.
Fig. 5 to 10 are graphs showing the spectral changes of the present invention. The horizontal axis represents wavelength in nm. The vertical axis represents intensity or relative intensity, in unlimited units, as represented by the international common designation a.u.
Wherein, fig. 5 and fig. 6 show the spectrums of six stages A to F of the first lighting stage of 0 to 5ms in the lighting period. The sequence of the spectrum changes is A → B → C → D → E → F. Preferably, the order of change of the spectra can be changed as desired. As shown in FIG. 5, the emission spectrum of the optical information at stage A is between 350-700 nm, and the peaks are respectively at 450nm, 550nm and 650 nm. The emission spectrum of the optical information in the B stage is 350-700 nm in wavelength, and the wave crests are respectively located at 450nm and 550 nm. The emission spectrum of the optical information in the C stage is 350-750 nm in wavelength, and the wave crests are respectively located at 450nm and 650 nm. As shown in FIG. 6, the emission spectrum of the optical information in stage D is between 150 nm and 800nm, and the peaks are respectively at 250nm and 650 nm. The light emission spectrum of the optical information in the E stage is 150-900 nm in wavelength, and the wave crests are respectively located at 450nm, 650nm and 850 nm. The light emission spectrum of the optical information in the F stage is 150-900 nm in wavelength, and the wave crests are respectively located at 650nm and 850 nm.
In which, FIGS. 7 and 8 show the spectra of six stages A to F of the second light-emitting stage of 10 to 12ms in the light-emitting period. The sequence of the spectrum changes is A → B → C → D → E → F. Preferably, the order of change of the spectra can be changed as desired. As shown in FIG. 7, the emission spectrum of the optical information at stage A is between 350-750 nm, and the peaks are at 550nm and 650nm, respectively. The emission spectrum of the optical information in the B stage is 350-700 nm in wavelength, and the peak is 550 nm. The emission spectrum of the optical information in the C stage is 350-750 nm in wavelength, and the peak is 650 nm. As shown in FIG. 8, the emission spectrum of the optical information at stage D is between 150 nm and 800nm, and the peak is at 650 nm. In particular, the emission intensity of the characteristic curve in the vicinity of 650nm rapidly increases and decreases. The light-emitting spectrum of the optical information in the E stage is 150-850 nm in wavelength, and the peak is 650 nm. In particular, the emission intensity of the characteristic curve in the vicinity of 650nm rapidly increases and gradually decreases. The light-emitting spectrum of the optical information in the F stage is 150-900 nm in wavelength, and the peak is 650 nm. In particular, the emission intensity of the characteristic curve in the vicinity of 650nm rises and falls slowly.
In which, fig. 9 and 10 show the spectra of six stages a to F of the third light-emitting stage of 12 to 15ms in the light-emitting period. The sequence of the spectrum changes is A → B → C → D → E → F. Preferably, the order of change of the spectra can be changed as desired. As shown in FIG. 9, the emission spectrum of the optical information at stage A is in the wavelength range of 350 to 750nm, the peak is at 550nm, and the emission intensity near 550nm gradually increases with the wavelength, rapidly increases near the peak, and gradually decreases after reaching the peak. The emission spectrum of the optical information in the B stage is 350-700 nm in wavelength, the peak is located at 550nm, and the emission intensity near 550nm gradually rises along with the wavelength and slowly falls after reaching the peak. The emission spectrum of the optical information in the C stage is 350-750 nm in wavelength, the peak is 650nm, and the emission intensity near 650nm gradually increases with the wavelength and rapidly decreases after reaching the peak.
As shown in FIG. 10, the emission spectrum of the optical information in the D stage is between the wavelengths of 150-850 nm, the peak is located at 650nm, and the emission intensity near 650nm gradually increases with the wavelength and gradually decreases after reaching the peak. The light emission spectrum of the optical information in the E stage is 150-850 nm in wavelength, the wave peaks are respectively located at 650nm, the light emission intensity near 650nm is gradually increased along with the wavelength, rapidly increased near the peak value and slowly decreased after reaching the peak value. The light emission spectrum of the optical information in the F stage is 150-900 nm in wavelength, the peak is located at 650nm, the light emission intensity near 650nm gradually increases along with the wavelength, rapidly increases near the peak, and slowly decreases after reaching the peak. Preferably, the emission intensity of the peak in the E stage is relatively low in the D → F stage.
The above characteristic curves are only exemplary, and the optical information of the present invention may also include other variation characteristic curves, which are numerous and cannot be shown one by one.
It should be noted that the above-mentioned embodiments are exemplary, and that those skilled in the art, having benefit of the present disclosure, may devise various arrangements that are within the scope of the present disclosure and that fall within the scope of the invention. It should be understood by those skilled in the art that the present specification and figures are illustrative only and are not limiting upon the claims. The scope of the invention is defined by the claims and their equivalents.

Claims (9)

1. A method of authentication based on optical information, the method comprising:
sending an authentication request to a portable second device (2) by a first device (1) and obtaining second device configuration information from the second device (2) receiving the authentication request;
the first device (1) generates a first authentication key and a second authentication key which are matched with the second device (2) according to the second device configuration information and sends the first authentication key and the second authentication key to the second device (2);
placing the second device (2) against a third device (3) communicatively connected to the first device (1) such that the first authentication key is transmitted to the third device (3) via a wireless communication module of the second device (2) in an electromagnetically inductively coupled manner and the second authentication key is transmitted to the third device (3) via a lighting unit of the second device (2) in a light-information manner for authentication;
the third device (3) informs or controls the controlled device (4) to switch from the first state to the second state after the second device (2) passes the authentication;
the light-emitting unit is a flash lamp or a display screen;
wherein the third device (3) determines that the light information is from the flash or the display and associates the authentication result of the second authentication key with it by analyzing the optical characteristics related to the second device configuration information, or the third device (3) acquires user selection information from the second device (2) determines that the light information is from the flash or the display and associates the authentication result of the second authentication key with it;
the first device (1) acquires the authentication result from the third device (3), and under the condition that the first authentication key passes authentication according to the device model, the flash lamp authentication passing rate of the second authentication key passing authentication sent by the flash lamp and the display screen authentication passing rate of the light information passing authentication sent by the display screen are counted, so that reference and/or suggestion are provided for the user of the second device (2) using the corresponding device model to select the flash lamp or the display screen to send the second authentication key.
2. The method according to claim 1, characterized in that the second device (2) sends the first authentication key and the second authentication key to a third device (3), the first sending time of the first authentication key is earlier than the second sending time of the second authentication key, and the second authentication key is sent in an auto-triggered manner after the second device (2) recognizes that the first authentication key is authenticated.
3. The method according to claim 2, characterized in that the first device (1) further obtains a second device identity from a second device (2) receiving the authentication request to bind the legitimate carrier of the first authentication key and the second authentication key to the second device (2) and the first device (1) further sends a third device identity of the third device (3) to the second device (2).
4. The method according to claim 3, characterized in that, when the second device (2) is attached to a third device (3) which is communicatively connected to the first device (1), the second device (2) receives the third device identification from the third device (3) via the wireless communication module in an electromagnetic inductive coupling manner and transmits the second device identification, the first authentication key and the second authentication key to the third device (3) after confirming the identity of the third device (3).
5. The method according to claim 4, characterized in that, after the second device (2) has confirmed the identity of the third device (3), before the light information is emitted, the third device (3) receives in parallel a verification light transmitted by the second device (2) through the light emitting unit in the process of authenticating the first authentication key and adjusts the identification reference of the light information according to the verification light.
6. The method according to claim 5, characterized in that the first device (1) generates at least two second authentication keys related to a second device (2) having the second device configuration information depending on the obtained second device configuration information, wherein one of the at least two second authentication keys conforms to the lighting characteristics of the flash and the other second authentication key conforms to the lighting characteristics of the display.
7. The method according to one of claims 1 to 6, wherein the light information is strobe light emission and one light emission cycle of the strobe light emission comprises a controlled first light emission phase, a controlled second light emission phase and a third light emission phase, and the adjustment of at least one parameter of the light emission intensity, the light emission duration, the light emission curve and the light emission wavelength of the first light emission phase is realized by adjusting the driving scheme of the light emitting unit; adjusting at least one parameter of the luminous intensity, the luminous duration, the luminous curve and the luminous wavelength of the second luminous phase is realized by adjusting the driving scheme of the luminous unit, and the third luminous phase can be obtained by adjusting the first and the second luminous phases, wherein the luminous intensity of the third luminous phase is close to or equal to zero candela.
8. The method according to one of claims 1 to 6, characterized in that the third device (3) has an indication means for directing the second device (2), which indication means uses a fluorescent marker for directing the light emitting unit of the respective second device (2) to the acquisition unit of the third device (3) for acquiring the light information, wherein the indication means is arranged beside the acquisition unit in such a way that its light emitting direction does not intersect the acquisition direction of the light information.
9. The method according to one of claims 1 to 6, characterized in that after the first device (1) sends an authentication request to the second device (2), the first device (1) generates at least the first and second authentication keys that are cryptographically different from each other in response to an acquisition of a second device identity and second device configuration information of the second device (2), and the generation of the first authentication key is earlier in time than the generation of the second authentication key.
CN201711428517.0A 2017-12-25 2017-12-25 Authentication method based on optical information Active CN108183794B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711428517.0A CN108183794B (en) 2017-12-25 2017-12-25 Authentication method based on optical information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711428517.0A CN108183794B (en) 2017-12-25 2017-12-25 Authentication method based on optical information

Publications (2)

Publication Number Publication Date
CN108183794A CN108183794A (en) 2018-06-19
CN108183794B true CN108183794B (en) 2020-08-28

Family

ID=62547593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711428517.0A Active CN108183794B (en) 2017-12-25 2017-12-25 Authentication method based on optical information

Country Status (1)

Country Link
CN (1) CN108183794B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105405005A (en) * 2015-12-18 2016-03-16 宁波大学 Mobile wallet payment method based on optical communication and near field communication
CN106101137A (en) * 2016-07-22 2016-11-09 努比亚技术有限公司 Information processor and Information Authentication method
CN106533666A (en) * 2016-11-08 2017-03-22 深圳大学 Sub secret key generation method and decryption or authentication method for optical threshold coding
CN106550319A (en) * 2015-12-11 2017-03-29 南方科技大学 Wi-Fi authentication method and system
CN106600274A (en) * 2017-02-07 2017-04-26 桂林理工大学 Multi-algorithm multi-key optical authentication offline payment apparatus
CN106656349A (en) * 2015-10-28 2017-05-10 深圳光启智能光子技术有限公司 Photo CA authentication method and system
CN106910068A (en) * 2017-02-07 2017-06-30 桂林理工大学 The light certification offline electronic payment method of many algorithm multi-key ciphers
CN107074174A (en) * 2014-10-01 2017-08-18 大陆智能交通系统有限责任公司 Method and system for Remote Visit and Control
CN107408165A (en) * 2015-03-19 2017-11-28 Ntt 电子株式会社 Processing unit and long-distance management system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10133857B2 (en) * 2016-05-18 2018-11-20 Bank Of America Corporation Phalangeal authentication device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107074174A (en) * 2014-10-01 2017-08-18 大陆智能交通系统有限责任公司 Method and system for Remote Visit and Control
CN107408165A (en) * 2015-03-19 2017-11-28 Ntt 电子株式会社 Processing unit and long-distance management system
CN106656349A (en) * 2015-10-28 2017-05-10 深圳光启智能光子技术有限公司 Photo CA authentication method and system
CN106550319A (en) * 2015-12-11 2017-03-29 南方科技大学 Wi-Fi authentication method and system
CN105405005A (en) * 2015-12-18 2016-03-16 宁波大学 Mobile wallet payment method based on optical communication and near field communication
CN106101137A (en) * 2016-07-22 2016-11-09 努比亚技术有限公司 Information processor and Information Authentication method
CN106533666A (en) * 2016-11-08 2017-03-22 深圳大学 Sub secret key generation method and decryption or authentication method for optical threshold coding
CN106600274A (en) * 2017-02-07 2017-04-26 桂林理工大学 Multi-algorithm multi-key optical authentication offline payment apparatus
CN106910068A (en) * 2017-02-07 2017-06-30 桂林理工大学 The light certification offline electronic payment method of many algorithm multi-key ciphers

Also Published As

Publication number Publication date
CN108183794A (en) 2018-06-19

Similar Documents

Publication Publication Date Title
US20230105132A1 (en) Pairing A Payment Object Reader With A Point-Of-Sale Terminal
EP3228098B1 (en) Capturing user intent when interacting with multiple access controls
EP2355050B1 (en) Method and system for permitting remote check-in and coordinating access control
CN105493635B (en) System for remotely controlling controllable device
US9330511B2 (en) Apparatus and methods for identity verification
US11039293B2 (en) Method and devices for transmitting a secured data package to a communication device
US10687407B2 (en) Wireless luminaire configuration
US10482458B2 (en) User equipment, service providing device, payment system comprising the same, control method thereof and non-transitory computer-readable storage medium storing computer program recorded thereon
KR101865448B1 (en) Authentication system and method using a flash of a smart mobile
CN109478284A (en) Utilize the method for payment and equipment of beacon
CN108183794B (en) Authentication method based on optical information
CN110751768A (en) Offline data transmission management method and device for access control equipment
CN109544146B (en) Card-free interaction system and analog card equipment
US20230376721A1 (en) Touchless identity card emulator systems and methods
US20220180353A1 (en) Location-based control of a function
KR101612943B1 (en) Automatic Vending Machine By Nearfield User Identification
CA2901725A1 (en) A method, device and system for secure transactions
US20160321646A1 (en) Method for initiating a transaction between a communication device and a transaction device
KR20150091757A (en) Mobile service method and system on sound wave or BLE(Bluetooth Low Energy) Communication confirm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant