US 12,265,481 B2
Method and system for communicating between apple mobile device and apple peripheral
Zhou Lu, Beijing (CN); and Huazhang Yu, Beijing (CN)
Assigned to FEITIAN TECHNOLOGIES CO., LTD., Beijing (CN)
Appl. No. 18/044,109
Filed by FEITIAN TECHNOLOGIES CO., LTD., Beijing (CN)
PCT Filed Nov. 23, 2021, PCT No. PCT/CN2021/132578
§ 371(c)(1), (2) Date Mar. 6, 2023,
PCT Pub. No. WO2022/121682, PCT Pub. Date Jun. 16, 2022.
Claims priority of application No. 202011433764.1 (CN), filed on Dec. 10, 2020.
Prior Publication US 2023/0315650 A1, Oct. 5, 2023
Int. Cl. G06F 13/10 (2006.01); G06F 21/44 (2013.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC G06F 13/102 (2013.01) [G06F 21/44 (2013.01); H04L 9/0825 (2013.01); H04L 9/3265 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for communicating between an Apple mobile device and an Apple peripheral, which is applied in a system comprising the Apple mobile device, the Apple peripheral, and a server, wherein the Apple mobile device on which a first script is running comprises an Apple application, and the method comprises the following steps:
Step 101, sending, by the Apple application, a first preset webpage loading request to the server according to first user operation information;
Step 102, loading, by the server, a first preset webpage for the Apple application according to the first preset webpage loading request, wherein the first preset webpage comprises the first script;
Step 103, running, by the Apple application, the first script and sending a credential creating request to the server, when the first script receives a challenge code returned by the server, retrieving data to be processed as a parameter of user information and/or a parameter of server information, generating the user information according to the parameter of the user information, generating the server information according to the parameter of the server information, setting a value of a first extension and a value of a key storing identification to preset values, and obtaining preset public key credential data;
Step 104, transferring, by the first script, the user information, the server information, the challenge code, the public key credential data, the set first extension and the set key storing identification into the Apple application;
Step 105, encapsulating, according to a data format required for calling a preset register interface, by the Apple application, the user information, the server information, the challenge code, the public key credential data, the set first extension and the set key storing identification that are transferred, to obtain register data, calling the register interface, transferring the register data into the register interface, and determining whether the Apple peripheral is an authentication device according to a return value of the register interface, when yes, executing Step 106, when no, ending the procedure;
Step 106, obtaining, by the Apple peripheral, the user information, the server information, the public key credential data, the first extension and the key storing identification from the register data, and extracting the data to be processed from the user information or the server information;
Step 107, performing, by the Apple peripheral, preset processing on the data to be processed to obtain a processing result, generating a second extension according to the processing result, setting a value of a response parameter required for generating a register response to a preset value according to the first extension and the key storing identification, encapsulating the second extension and the set response parameter according to a format required for generating authentication data to obtain a register response, and sending the register response to the first script via the preset register interface;
Step 108, parsing, by the first script, the register response to obtain authentication data, parsing the authentication data to obtain the second extension, extracting the processing result from the second extension, and sending the processing result to the Apple application; and
the method further comprises: reporting, by the Apple peripheral, to the Apple application that the Apple peripheral is the authentication device when the Apple peripheral is plugged into the Apple mobile device.