Information interaction methods and devices
First Claim
1. An information interaction method, comprising:
- establishing, by an electronic device, a connection with a wearable device;
sending, by the electronic device, information at least partially related to a logged-in identification (ID) to the wearable device via the connection, wherein the logged-in ID is a registered user ID for logging on the electronic device;
receiving, by the electronic device, a first encrypted result from the wearable device, wherein the first encrypted result is obtained by encrypting the information by the wearable device with a pre-stored encryption key uniquely corresponding to the logged-in ID being the registered user ID for logging on the electronic device;
generating, by the electronic device, a first verifying factor corresponding to the first encrypted result with a predetermined algorithm;
sending, by the electronic device, the information and the first verifying factor in an associated manner to a server; and
receiving, by the electronic device, a message indicating that an interaction is finished, wherein the message is sent if the server determines that a second verifying factor matches the first verifying factor, wherein the second verifying factor is generated with the predetermined algorithm and corresponds to a second encrypted result, wherein the second encrypted result is obtained by encrypting the information by the server with the pre-stored encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
An information interaction method and device are provided. In the method, the device establishes a connection with a wearable device. The device sends information to be interacted corresponding to a logged-in ID to the wearable device via the connection. The device receives a first encrypted result returned by the wearable device. The device generates a first verifying factor corresponding to the first encrypted result with a predetermined algorithm. The device sends the information to be interacted and the first verifying factor in an associated manner to a server. The device receives a message indicating that an interaction is finished, where the message is sent if the server determines that a second verifying factor generated with the predetermined algorithm and corresponding to a second encrypted result matches the first verifying factor. The second encrypted result is obtained by encrypting the information by the server with the pre-stored encryption key.
81 Citations
14 Claims
-
1. An information interaction method, comprising:
-
establishing, by an electronic device, a connection with a wearable device; sending, by the electronic device, information at least partially related to a logged-in identification (ID) to the wearable device via the connection, wherein the logged-in ID is a registered user ID for logging on the electronic device; receiving, by the electronic device, a first encrypted result from the wearable device, wherein the first encrypted result is obtained by encrypting the information by the wearable device with a pre-stored encryption key uniquely corresponding to the logged-in ID being the registered user ID for logging on the electronic device; generating, by the electronic device, a first verifying factor corresponding to the first encrypted result with a predetermined algorithm; sending, by the electronic device, the information and the first verifying factor in an associated manner to a server; and receiving, by the electronic device, a message indicating that an interaction is finished, wherein the message is sent if the server determines that a second verifying factor matches the first verifying factor, wherein the second verifying factor is generated with the predetermined algorithm and corresponds to a second encrypted result, wherein the second encrypted result is obtained by encrypting the information by the server with the pre-stored encryption key. - View Dependent Claims (2, 3)
-
-
4. An information interaction method, comprising:
-
establishing, by an electronic device, a connection with a wearable device; sending, by the electronic device, information at least partially related to a logged-in identification (ID) to the wearable device via the connection, wherein the logged-in ID is a registered user ID for logging on the electronic device; receiving, by the electronic device, an encrypted result returned by the wearable device, wherein the encrypted result is obtained by encrypting the information by the wearable device with a first encryption key corresponding to the logged-in ID being the registered user ID for logging on the electronic device; generating, by the electronic device, a first verifying factor corresponding to the information with a predetermined algorithm; sending, by the electronic device, the first verifying factor and the encrypted result in an associated manner to a server; and receiving, by the electronic device, a message indicating that an interaction is finished, wherein the message is sent after a decryption operation on the encrypted result is performed by the server using a second encryption key matching with the first encryption key and if the server determines that a second verifying factor matches the first verifying factor, wherein the second verifying factor is generated with the predetermined algorithm and corresponds to a result of the decryption operation. - View Dependent Claims (5, 6)
-
-
7. An information interaction device, comprising:
-
a processor; a memory configured to store instructions executed by the processor; wherein the processor is configured to; establish a connection with a wearable device; send information to be interacted corresponding to a logged-in identification (ID) to the wearable device via the connection, wherein the logged-in ID is a registered user ID for logging on the electronic device; receive a first encrypted result returned by the wearable device, wherein the first encrypted result is obtained by encrypting the information to be interacted by the wearable device with a pre-stored encryption key corresponding to the logged-in ID being the registered user ID for logging on the electronic device; generate a first verifying factor corresponding to the first encrypted result with a predetermined algorithm; send the information to be interacted and the first verifying factor in an associated manner to a server; and receive a message indicating that an interaction is finished, wherein the message is sent if the server determines that a second verifying factor matches the first verifying factor, wherein the second verifying factor is generated with the predetermined algorithm and corresponds to a second encrypted result, wherein the second encrypted result is obtained by encrypting the information to be interacted by the server with the pre-stored encryption key. - View Dependent Claims (8, 9)
-
-
10. An information interaction device, comprising:
-
a processor; a memory configured to store instructions executed by the processor; wherein the processor is configured to; establish a connection with a wearable device; send information to be interacted corresponding to a logged-in identification (ID) to the wearable device via the connection, wherein the logged-in ID is a registered user ID for logging on the electronic device; receive an encrypted result returned by the wearable device, wherein the encrypted result is obtained by encrypting the information to be interacted by the wearable device with a first encryption key corresponding to the logged-in ID being the registered user ID for logging on the electronic device; generate a first verifying factor corresponding to the information to be interacted with a predetermined algorithm; send the first verifying factor and the encrypted result in an associated manner to a server; and receive a message indicating that an interaction is finished, wherein the message is sent after a decryption operation on the encrypted result is performed by the server using a second encryption key matching with the first encryption key and if the server determines that a second verifying factor matches the first verifying factor, wherein the second verifying factor is generated with the predetermined algorithm and corresponds to a result of the decryption operation. - View Dependent Claims (11, 12, 13, 14)
-
Specification