CN106685945B - Service request processing method, service handling number verification method and terminal thereof - Google Patents
Service request processing method, service handling number verification method and terminal thereof Download PDFInfo
- Publication number
- CN106685945B CN106685945B CN201611195081.0A CN201611195081A CN106685945B CN 106685945 B CN106685945 B CN 106685945B CN 201611195081 A CN201611195081 A CN 201611195081A CN 106685945 B CN106685945 B CN 106685945B
- Authority
- CN
- China
- Prior art keywords
- terminal
- service
- verification
- identity
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses a service request processing method, a service handling number verification method and a terminal thereof, wherein the service request processing method comprises the following steps: the method comprises the steps of acquiring communication information of a service terminal, and sending a service request to the service terminal according to the communication information of the service terminal, wherein the service request comprises a service handling number and an identity of the terminal; acquiring a communication number of a verification terminal, and sending an identity verification request to the verification terminal through a short message according to the communication number of the verification terminal, wherein the identity verification request comprises communication information of a service terminal, a service handling number and an identity of the terminal; and receiving a service request execution result returned by the service terminal after the service request is processed according to the verification result of the verification terminal. The embodiment of the invention can improve the safety of business handling.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a service request processing method, a service handling number verification method, and a terminal thereof.
Background
In addition, according to the regulations of the national relevant law, the user identity needs to be authenticated in real name no matter whether a new identity card or an original identity card is provided with a data service function, namely, one identity card or one telephone number represents the identity of one person, so that many internet services can be authenticated and used through the telephone number at present.
In the prior art, a method for authenticating the use of internet services through a telephone number generally includes that a user inputs the telephone number to be authenticated through a terminal in a display interface for service handling, the telephone number is sent to a corresponding service terminal, then a verification code returned by the service terminal is received and then input into a specified input box, the verification code is sent to the service terminal for verification, the authentication is completed after the service terminal passes the verification, and at this time, the user can handle the corresponding service through the telephone number. However, in some cases, since the verification code received by the terminal may be stolen by other users, the phone number of the user may be illegally used by other users, so that the user cannot use the phone number, and if some bad operation records are generated when the other users transact business through the phone number of the user, the user may be affected.
Disclosure of Invention
The embodiment of the invention provides a service request processing method, a service handling number verification method and a terminal thereof, which can improve the safety of service handling.
In a first aspect, an embodiment of the present invention provides a method for processing a service request, where the method includes:
acquiring communication information of the service terminal, and sending a service request to the service terminal according to the communication information of the service terminal, wherein the service request comprises a service handling number and an identity of the terminal;
acquiring a communication number of a verification terminal, and sending an identity verification request to the verification terminal through a short message according to the communication number of the verification terminal, wherein the identity verification request comprises communication information of the service terminal, the service handling number and an identity of the terminal;
and receiving a service request execution result returned by the service terminal after the service request is processed by the service terminal according to the verification result of the verification terminal.
On the other hand, an embodiment of the present invention provides a method for verifying a service handling number, including:
receiving an identity verification request sent by a terminal through a short message when the terminal sends a service request to a service terminal, wherein the service request comprises a service handling number and an identity of the terminal, and the identity verification request comprises communication information of the service terminal, the service handling number and the identity of the terminal;
reading the communication number of the short message sending the identity authentication request, and verifying whether the service handling number in the identity authentication request is consistent with the communication number of the short message;
and sending a verification result to the service terminal according to the communication information of the service terminal, wherein the verification result carries the identity of the terminal, so that the service terminal determines whether to execute the service request according to the verification result and returns a service request execution result to the terminal.
In another aspect, an embodiment of the present invention provides a method for processing a service request, including:
receiving a service request sent by a terminal, wherein the service request comprises a service handling number and an identity of the terminal;
receiving a verification result of performing identity verification on the service handling number, which is sent by a verification terminal, wherein the verification result carries an identity of the terminal;
and determining whether to execute the service request according to the verification result, and returning the service request execution result to the terminal.
In another aspect, an embodiment of the present invention provides a terminal, including:
a service request sending unit, configured to obtain communication information of the service terminal, and send a service request to the service terminal according to the communication information of the service terminal, where the service request includes a service handling number and an identity of the terminal;
the system comprises a verification request sending unit, a verification terminal and a verification processing unit, wherein the verification request sending unit is used for acquiring a communication number of the verification terminal and sending an identity verification request to the verification terminal through a short message according to the communication number of the verification terminal, and the identity verification request comprises communication information of the service terminal, the service handling number and an identity of the terminal;
and the service request result acquisition unit is used for receiving a service request execution result returned by the service terminal after the service request is processed according to the verification result of the verification terminal.
In another aspect, an embodiment of the present invention provides a verification terminal, including:
the terminal comprises a verification request receiving unit and a verification request sending unit, wherein the verification request receiving unit is used for receiving an identity verification request sent by a terminal through a short message when the terminal sends a service request to a service terminal, the service request comprises a service handling number and an identity of the terminal, and the identity verification request comprises communication information of the service terminal, the service handling number and the identity of the terminal;
the authentication request processing unit is used for reading the communication number of the short message sending the authentication request and verifying whether the service handling number in the authentication request is consistent with the communication number of the short message;
and the verification result returning unit is used for sending a verification result to the service terminal according to the communication information of the service terminal, wherein the verification result carries the identity of the terminal, so that the service terminal determines whether to execute the service request according to the verification result and returns a service request execution result to the terminal.
In another aspect, an embodiment of the present invention provides a service terminal, including:
a service request receiving unit, configured to receive a service request sent by a terminal, where the service request includes a service handling number and an identity of the terminal;
the verification request receiving unit is used for receiving a verification result of identity verification of the service handling number sent by a verification terminal, and the verification result carries an identity of the terminal;
and the service request execution unit is used for determining whether to execute the service request according to the verification result and returning the service request execution result to the terminal.
The embodiment of the invention sends a service request to the service terminal according to the communication information of the service terminal by acquiring the communication information of the service terminal, wherein the service request comprises a service handling number and an identity of the terminal; acquiring a communication number of a verification terminal, and sending an identity verification request to the verification terminal through a short message according to the communication number of the verification terminal, wherein the identity verification request comprises communication information of the service terminal, the service handling number and an identity of the terminal; and receiving a service request execution result returned by the service terminal after processing the service request according to the verification result of the verification terminal, thereby improving the safety of handling the service, greatly reducing the risk that the telephone number of the user is illegally stolen by other people, and overcoming the problems that the telephone number of the user can be illegally used by other people, the user cannot use the telephone number, and the user can be influenced if other people generate some bad operation records when handling the service through the telephone number of the user in the prior art.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic block diagram of a service request processing system according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a service request processing method according to a second embodiment of the present invention;
fig. 3 is a schematic flowchart of a service request processing method according to a third embodiment of the present invention;
fig. 4 is a schematic flow chart of a method for verifying a service transaction number according to a fourth embodiment of the present invention;
fig. 5 is a schematic flow chart of a method for verifying a service transaction number according to a fifth embodiment of the present invention;
fig. 6 is a schematic flowchart of a service request processing method according to a sixth embodiment of the present invention;
fig. 7 is a schematic block diagram of a terminal according to a seventh embodiment of the present invention;
fig. 8 is a schematic block diagram of a terminal according to an eighth embodiment of the present invention;
fig. 9 is a schematic block diagram of an authentication terminal according to a ninth embodiment of the present invention;
fig. 10 is a schematic block diagram of an authentication terminal according to a tenth embodiment of the present invention;
fig. 11 is a schematic block diagram of a service terminal according to an eleventh embodiment of the present invention;
fig. 12 is a schematic block diagram of a terminal according to a twelfth embodiment of the present invention;
fig. 13 is a schematic block diagram of an authentication terminal according to a thirteenth embodiment of the present invention;
fig. 14 is a schematic block diagram of a service terminal according to a fourteenth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In particular implementations, the terminals described in embodiments of the invention include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the discussion that follows, a terminal that includes a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the terminal may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal can be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
Fig. 1 is an architecture diagram of a service request processing system according to an embodiment of the present invention. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 1, the system includes a terminal 10 for requesting transaction of a service, a service terminal 30 for providing the service, and a verification terminal 20 for authenticating a service transaction number requesting the transaction of the service, wherein the terminal 10 communicates with the service terminal 30 through a data network, communicates with the verification terminal 20 through a mobile operator provided mobile communication network, and the verification terminal 20 communicates with the service terminal 30 through the data network. In addition, it should be noted that the service request processing system shown in fig. 1 is only a preferred implementation manner of the embodiment of the present invention, in other implementation examples, the authentication and the service processing may also be performed in the same server, and the present invention focuses on a case where the authentication and the service processing are respectively processed by different servers.
Based on the system structure shown in fig. 1, the service request processing method provided by the embodiment of the present invention is described in detail below with reference to specific embodiments:
fig. 2 shows an implementation flow of a service request processing method according to a second embodiment of the present invention, and in the embodiment shown in fig. 2, an execution subject of the flow is the terminal 10 in fig. 1. The implementation process of the method is detailed as follows:
in S201, the communication information of the service terminal 30 is obtained, and a service request is sent to the service terminal 30 according to the communication information of the service terminal 30, where the service request includes a service handling number and an identity of the terminal.
In this embodiment, the communication information of the service terminal 30 includes, but is not limited to, communication address information such as an IP address, a domain name, and a MAC address of the service terminal 30. The terminal 10 may send a service request to the service terminal 30 of the application through a data network according to the communication address information of the service terminal 30 by using an application installed in itself. The service request includes, but is not limited to, a service request for registering an application, logging in to a website, and paying, and accordingly, the service transaction number may be a telephone number input by the user on the terminal 10 for registering an application, logging in to a website, or requesting payment.
In S202, a communication number of the verification terminal 20 is obtained, and an authentication request is sent to the verification terminal 20 by a short message according to the communication number of the verification terminal 20, where the authentication request includes the communication information of the service terminal 30, the service transaction number, and the identity of the terminal 10.
In this embodiment, since the terminal 10 itself cannot directly read the phone number that the identification card corresponds to and is opened by the operator, it can only obtain the ID number that the identification card corresponds to, where the identification card includes but is not limited to a SIM card, a USIM card, a UIM card, a CSIM card, and the like. Therefore, the terminal 10 itself cannot verify whether the service transaction number input by the user for requesting transaction of the service is the telephone number of the user itself, so in this embodiment, an authentication request needs to be sent to the authentication terminal 20 by the terminal 10 through a short message, and the authentication terminal 20 performs authentication on the service transaction number.
In this embodiment, since the authentication request includes the communication information of the service terminal 30, after the authentication terminal 20 obtains the authentication result of the service transaction number, the authentication result may be sent to the service terminal 30 through the communication information of the service terminal 30, where the authentication result carries the identity of the terminal 10, so that the service terminal 30 determines whether to execute the service request according to the authentication result, specifically: after receiving the verification result, the service terminal 30 queries a service request matched with the verification result according to the identity of the terminal 10 carried by the verification result, and determines whether to execute the service request according to the verification result.
In S203, a service request execution result returned after the service terminal 30 processes the service request according to the verification result of the verification terminal 20 is received.
In this embodiment, the service terminal 30 determines whether to execute the service request according to the verification result, and then returns the execution result of the service request to the terminal 10 through a data network, specifically: if the verification is passed, the service handling number is the telephone number of the user, and at this time, the service terminal 30 executes the service request and returns a prompt message of success of the service request to the terminal 10 through a data network; if the verification fails, it indicates that the service handling number is not the user's own phone number, and at this time, the service terminal 30 terminates the service request processing flow and returns a service request failure prompt message to the terminal 10 through the data network.
As can be seen from the above, in the service request processing method provided in this embodiment, the communication information of the service terminal 30 is obtained, and a service request is sent to the service terminal 30 according to the communication information of the service terminal 30, where the service request includes a service handling number and an identity of the terminal; acquiring a communication number of a verification terminal 20, and sending an authentication request to the verification terminal 20 through a short message according to the communication number of the verification terminal 20, wherein the authentication request comprises communication information of the service terminal 30, the service transaction number and an identity of the terminal 10; and receiving a service request execution result returned after the service terminal 30 processes the service request according to the verification result of the verification terminal 20, thereby improving the safety of service handling, greatly reducing the risk that the telephone number of the user is illegally stolen by other people, and overcoming the problems that the telephone number of the user may be illegally used by other people in the prior art, so that the user cannot use the telephone number, and the user may be affected if other people generate some bad operation records when handling services through the telephone number of the user.
Fig. 3 shows an implementation flow of a service request processing method provided by the third embodiment of the present invention, and in the embodiment shown in fig. 2, an execution subject of the flow is the terminal 10 in fig. 1. Referring to fig. 3, with respect to the previous embodiment, before acquiring the communication number of the verification terminal 20 and sending an authentication request to the verification terminal 20 by a short message according to the communication number of the verification terminal 20, the service request processing method provided in this embodiment further includes:
in S302, the service handling number is encrypted by a preset secure encryption algorithm, and an authentication request is generated according to the encrypted service handling number, the communication information of the service terminal 30, and the identifier of the terminal 10, where the service handling number included in the authentication request is specifically the encrypted service handling number.
In this embodiment, the terminal 10 includes a secure encryption chip, the preset secure encryption algorithm is stored in the secure encryption chip, and when the secure encryption chip is implemented, the service transaction number is encrypted by using the preset secure encryption algorithm. Preferably, the preset security algorithm is a hash algorithm, and due to the uniqueness and irreversibility of a one-way password mechanism of the hash algorithm, the accuracy and the security of the service handling number verification can be ensured.
In this embodiment, before sending the authentication request, the terminal 10 first performs encryption calculation on the service handling number by using a secure encryption algorithm preset in a secure encryption chip, then generates an authentication request according to the encrypted service handling number, the communication information of the service terminal 30, and the identifier of the terminal 10, and then sends the authentication request including the communication information of the service terminal 30, the identifier of the terminal 10, and the encrypted service handling number to the authentication terminal 10, so that the service handling number can be prevented from being illegally intercepted by others in the communication process between the terminal 10 and the authentication terminal 10, and the security of the whole communication process is ensured.
It should be noted that, the implementation manners of step S301 and steps S303 to step S304 in this embodiment are completely the same as those of steps S201 to step S203 in the embodiment shown in fig. 2, and therefore, no further description is given here.
Therefore, it can be seen that the service request processing method provided by the embodiment can also improve the security of handling the service, reduce the risk that the telephone number of the user is illegally stolen by others, and overcome the problems that the telephone number of the user may be illegally used by others in the prior art, so that the user cannot use the telephone number, and the user may be affected if some bad operation records are generated when the other people handle the service through the telephone number of the user; and compared with the previous embodiment, the method can also prevent the service transaction number from being illegally intercepted by others in the communication process of the terminal 10 and the verification terminal 20, and ensure the safety of the whole communication process.
Fig. 4 shows an implementation flow of a verification method for a service transaction number according to a fourth embodiment of the present invention, and in the embodiment shown in fig. 4, an execution subject of the flow is the verification terminal 20 in fig. 1. The implementation process of the method is detailed as follows:
in S401, an authentication request sent by a short message when the terminal 10 sends a service request to the service terminal 30 is received, where the service request includes a service transaction number and an identity of the terminal 10, and the authentication request includes communication information of the service terminal 30, the service transaction number, and the identity of the terminal 10.
In this embodiment, the terminal 10 may send a service request to the service terminal 30 of the application through the data network by using the application installed in the terminal, where the service request includes, but is not limited to, a service request for registering an application, logging in a website, and paying, and accordingly, the service transaction number may be a telephone number input by the user on the terminal 10 for registering an application, logging in a website, or requesting payment.
In S402, the communication number of the short message that sent the authentication request is read, and it is verified whether the service transaction number in the authentication request is consistent with the communication number of the short message.
In this embodiment, after receiving an authentication request sent by the terminal 10 through a short message, the authentication terminal 20 may obtain, through an operator server of the short message service, a communication number for sending the short message, where the communication number is a communication number corresponding to an identification card of the terminal 10, and therefore the authentication terminal 20 may perform authentication on the service handling number according to the communication number, specifically: verifying whether the service handling number is consistent with the communication number corresponding to the short message, if so, indicating that the service handling number is the own telephone number of the user, and then passing the verification; if not, the service handling number is the own telephone number of the user, and the verification fails at the moment.
In S403, a verification result is sent to the service terminal 30 according to the communication information of the service terminal 30, where the verification result carries the identity of the terminal 10, so that the service terminal 30 determines whether to execute the service request according to the verification result, and returns a service request execution result to the terminal 10.
In this embodiment, after obtaining the verification result, the verification terminal 20 may send the verification result to the service terminal 30 through a data network according to the communication information of the service terminal 30 in the authentication request, where the verification result carries the identity of the terminal 10, so that the service terminal 30 determines whether to execute the service request according to the verification result, and returns the service request result to the terminal 10 through the data network. Specifically, after receiving the verification result, the service terminal 30 queries a service request matched with the verification result according to the identity of the terminal 10 carried by the verification result, then determines whether to execute the matched service request according to the verification result, and returns the execution result to the application of the terminal 10 through the data network for displaying.
Therefore, it can be seen that the method for verifying the service handling number provided by the embodiment can also improve the security of handling the service, reduce the risk that the telephone number of the user is illegally stolen by other people, and overcome the problems that the telephone number of the user may be illegally used by other people in the prior art, so that the user cannot use the telephone number, and the user may be affected if other people generate some bad operation records when handling the service through the telephone number of the user.
Fig. 5 shows an implementation flow of a verification method for a service transaction number according to a fifth embodiment of the present invention, and in the embodiment shown in fig. 5, an execution subject of the flow is the verification terminal 20 in fig. 1. The implementation process of the method is detailed as follows:
in S501, an authentication request sent by a short message when the terminal 10 sends a service request to the service terminal 30 is received, where the service request includes a service transaction number and an identity of the terminal 10, and the authentication request includes communication information of the service terminal 30, the service transaction number processed by a preset secure encryption algorithm, and the identity of the terminal 10.
In this embodiment, since the service transaction number in the authentication request is processed by the preset security encryption algorithm, the service transaction number can be prevented from being illegally intercepted by others in the communication process between the terminal 10 and the authentication terminal 20, and the security of the whole communication process is ensured.
In S502, the communication number of the short message that sends the authentication request is read, the communication number of the short message is encrypted and calculated by the preset secure encryption algorithm, and it is verified whether the service transaction number after encryption calculation is consistent with the communication number of the short message after encryption calculation.
In this embodiment, after receiving an authentication request sent by the terminal 10 through a short message, the authentication terminal 20 may read a communication number that sends the short message, and since the service handling number in the authentication request is processed by a preset security encryption algorithm, in order to verify whether the service handling number is consistent with the communication number, it is necessary to perform encryption calculation on the communication number by using the preset security encryption algorithm, and then compare whether the service handling number after the encryption calculation is consistent with the communication number after the encryption calculation.
Further, in this embodiment, the preset security algorithm is a hash algorithm, and due to the uniqueness and irreversibility of a one-way password mechanism of the hash algorithm, the accuracy and security of number verification in service handling can be ensured.
In S503, a verification result is sent to the service terminal 30 according to the communication information of the service terminal 30, where the verification result carries the identity of the terminal 10, so that the service terminal 30 determines whether to execute the service request according to the verification result, and returns a service request execution result to the terminal 10.
Preferably, in this embodiment, after S503, the method may further include:
in S504, if the verification result is that the verification fails, a binding relationship between the communication number of the short message and the identity of the terminal 10 is established, and the binding relationship is sent to the service terminal 30.
In this embodiment, since the verification terminal 20 can establish the binding relationship between the communication number of the short message and the identity of the terminal 10 when the verification fails, and return the binding relationship to the service terminal 30, when the terminal 10 sends a service request to the service terminal 30 next time, the identity of the service handling number in the service request can be directly verified in the service terminal 30, and an identity verification request does not need to be sent to the verification terminal 20 through the short message, so that the verification efficiency can be improved, and the user experience is further improved.
In addition, it should be noted that in this embodiment, the implementation processes of steps S501 and S503 are completely the same as the implementation processes of steps S401 and S403 in the previous embodiment, and therefore, detailed description is omitted here.
Therefore, it can be seen that the verification method for the service handling number provided by the embodiment can also improve the security of handling the service, reduce the risk that the telephone number of the user is illegally stolen by others, and overcome the problems that the telephone number of the user may be illegally used by others in the prior art, so that the user cannot use the telephone number, and the user may be affected if some bad operation records are generated when others handle the service through the telephone number of the user; in addition, compared with the previous embodiment, the embodiment can also prevent the service transaction number from being illegally intercepted by others in the communication process of the terminal 10 and the verification terminal 10, and ensure the safety of the whole communication process.
Fig. 6 shows an implementation flow of a service processing method according to a sixth embodiment of the present invention, and in the embodiment shown in fig. 6, an execution subject of the flow is the service terminal 30 in fig. 1. The implementation process of the method is detailed as follows:
in S601, receiving a service request sent by a terminal 10, where the service request includes a service handling number and an identity of the terminal 10;
in S602, receiving a verification result of authenticating the service transaction number sent by the verification terminal 20, where the verification result carries an identity of the terminal 10;
in S603, it is determined whether to execute the service request according to the verification result, and the service request execution result is returned to the terminal 10.
In this embodiment, if the service terminal 30 receives the service request sent by the terminal 10 and receives the verification result carrying the terminal identifier sent by the verification terminal 20 within a preset time, it will determine whether to execute the service request according to the verification result, and return the service request execution result to the terminal, specifically: if the verification result is that the verification is passed, executing the service request, and returning prompt information of success of the service request to the terminal 10; otherwise, the service request is prohibited from being executed, and a prompt message of service request failure is returned to the terminal 1.
Preferably, in this embodiment, after step S601, the method may further include:
and if the verification result which is sent by the verification terminal and carries the identity identifier of the terminal is not received within the preset time, returning a prompt message of service request failure to the terminal.
In this embodiment, if the service terminal 30 does not receive the verification result carrying the identity of the terminal 10 and sent by the verification terminal 20 within the preset time after receiving the service request sent by the terminal 10, it indicates that the verification fails, and the service terminal prohibits the execution of the service request and returns a prompt message of the service request failure to the terminal 10.
It can be seen from the above that, the service request processing method provided in this embodiment can also improve the security of handling the service, reduce the risk that the phone number of the user is illegally stolen by others, and overcome the problems that the phone number of the user may be illegally used by others in the prior art, which may cause the user to be unable to use, and the user may be affected if some bad operation records are generated when others handle the service through the phone number of the user.
Fig. 7 is a schematic block diagram of a terminal according to a seventh embodiment of the present invention, in which only the portions related to the present embodiment are shown for convenience of explanation.
Referring to fig. 7, the present embodiment provides a terminal 10, including:
a service request sending unit 11, configured to obtain communication information of the service terminal 30, and send a service request to the service terminal 30 according to the communication information of the service terminal 30, where the service request includes a service handling number and an identity of the terminal;
a verification request sending unit 12, configured to obtain a communication number of the verification terminal 20, and send an authentication request to the verification terminal 20 through a short message according to the communication number of the verification terminal 20, where the authentication request includes communication information of the service terminal 30, the service transaction number, and an identity of the terminal 10;
a service request result obtaining unit 13, configured to receive a service request execution result returned by the service terminal 30 after processing the service request according to the verification result of the verification terminal 20.
Optionally, referring to fig. 8, in another embodiment, the terminal 10 further includes:
the first encryption calculation unit 14 is configured to encrypt the service handling number through a preset secure encryption algorithm, and generate an authentication request according to the encrypted service handling number, the communication information of the service terminal 30, and the identifier of the terminal 10, where the service handling number included in the authentication request is specifically the encrypted service handling number.
It should be noted that, since the method embodiments shown in fig. 1 to fig. 2 of the present invention are based on the same concept, the technical effects of the units in the terminal 10 provided in this embodiment are the same as the method embodiments shown in fig. 1 to fig. 2 of the present invention, and specific contents may refer to the descriptions in the method embodiments shown in fig. 2 to fig. 3 of the present invention, and are not described again here.
Therefore, it can be seen that the terminal 10 provided in the embodiment of the present invention can also improve the security of handling the service, reduce the risk that the phone number of the user is illegally stolen by others, and overcome the problems that the phone number of the user may be illegally used by others in the prior art, so that the user cannot use the phone number of the user, and the user may be affected if some bad operation records are generated when the others handle the service through the phone number of the user.
Fig. 9 is a schematic block diagram of an authentication terminal according to a ninth embodiment of the present invention. Only the portions related to the present embodiment are shown for convenience of explanation.
Referring to fig. 9, the present embodiment provides an authentication terminal 20 including:
an authentication request receiving unit 21, configured to receive an authentication request sent by a short message when a terminal 10 sends a service request to a service terminal 30, where the service request includes a service transaction number and an identity of the terminal 10, and the authentication request includes communication information of the service terminal 30, the service transaction number, and the identity of the terminal 10;
a verification request processing unit 22, configured to read a communication number of a short message that sends the authentication request, and verify whether a service transaction number in the authentication request is consistent with the communication number of the short message;
the verification result returning unit 23 is configured to send a verification result to the service terminal 30 according to the communication information of the service terminal 30, where the verification result carries the identity of the terminal 10, so that the service terminal 30 determines whether to execute the service request according to the verification result, and returns a service request execution result to the terminal 10.
Optionally, referring to fig. 10, in another embodiment, the verification request processing unit 22 includes:
the second encryption calculation unit 221 is configured to perform encryption calculation on the communication number of the short message through the preset security encryption algorithm, and the service transaction number in the authentication request is processed through the preset security encryption algorithm;
and the comparing unit 222 is configured to verify whether the service handling number after the encryption calculation is consistent with the communication number of the short message after the encryption calculation.
Optionally, the verification terminal 20 further includes:
and a binding relationship establishing unit 24, configured to establish a binding relationship between the communication number of the short message and the identity of the terminal 10 if the verification fails, and send the binding relationship to the service terminal 30.
It should be noted that, since the method embodiments shown in fig. 4 to fig. 5 of the present invention are based on the same concept, the technical effects of the units in the verification terminal 20 provided in this embodiment are the same as those of the method embodiments shown in fig. 4 to fig. 5 of the present invention, and specific contents may refer to the descriptions in the method embodiments shown in fig. 4 to fig. 5 of the present invention, and are not described again here.
Therefore, it can be seen that the verification terminal 20 provided in the embodiment of the present invention can also improve the security of handling the service, reduce the risk that the phone number of the user is illegally stolen by others, and overcome the problems that the phone number of the user may be illegally used by others in the prior art, so that the user cannot use the phone number of the user, and the user may be affected if some bad operation records are generated when the others handle the service through the phone number of the user.
Fig. 11 is a schematic block diagram of a service terminal according to an eleventh embodiment of the present invention. Only the portions related to the present embodiment are shown for convenience of explanation.
Referring to fig. 11, the service terminal 30 provided in this embodiment includes:
a service request receiving unit 31, configured to receive a service request sent by a terminal, where the service request includes a service handling number and an identity of the terminal;
a verification request receiving unit 32, configured to receive a verification result that is sent by a verification terminal and used for performing identity verification on the service transaction number, where the verification result carries an identity of the terminal;
a service request execution unit 33, configured to determine whether to execute the service request according to the verification result, and return a service request execution result to the terminal.
Optionally, the service terminal 30 further includes:
and the service request failure prompting unit 34 is configured to return a service request failure prompting message to the terminal if a verification result carrying the identity of the terminal and sent by the verification terminal is not received within a preset time.
It should be noted that, since the embodiments of the method shown in fig. 6 of the present invention are based on the same concept, the technical effects of the units in the service terminal 30 provided in this embodiment are the same as those of the embodiments of the method shown in fig. 6 of the present invention, and specific contents may refer to the description in the embodiments of the method shown in fig. 6 of the present invention, and are not described again here.
Therefore, it can be seen that the service terminal provided by the embodiment of the present invention can also improve the security of handling the service, reduce the risk that the telephone number of the user is illegally stolen by others, and overcome the problems that the telephone number of the user may be illegally used by others in the prior art, so that the user cannot use the telephone number, and the user may be affected if some bad operation records are generated when the other people handle the service through the telephone number of the user.
Referring to fig. 12, a schematic block diagram of a terminal according to a twelfth embodiment of the present invention, where the terminal is configured to operate the methods according to the embodiments of the present invention shown in fig. 2 to fig. 3. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 12, the present embodiment provides a terminal 10, including:
a first processor 100(processor), a first communication Interface 200(Communications Interface), a first memory 300(memory), and a first bus 400.
The first processor 100, the first communication interface 200 and the first memory 300 are communicated with each other through a bus 400.
A first communication interface 200 for communicating with a cable modem.
The first processor 100 is configured to execute a first program 301.
In particular, the first program 301 may include program code comprising computer operating instructions.
The first processor 100 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention.
The first memory 300 is used for storing a first program 301. The first memory 300 may comprise a high-speed RAM memory, and may further comprise a non-volatile memory (non-volatile memory), such as at least one disk memory. The first program 301 specifically includes:
a service request sending unit 11, configured to obtain communication information of the service terminal 30, and send a service request to the service terminal 30 according to the communication information of the service terminal 30, where the service request includes a service handling number and an identity of the terminal;
a verification request sending unit 12, configured to obtain a communication number of the verification terminal 20, and send an authentication request to the verification terminal 20 through a short message according to the communication number of the verification terminal 20, where the authentication request includes communication information of the service terminal 30, the service transaction number, and an identity of the terminal 10;
a service request result obtaining unit 13, configured to receive a service request execution result returned by the service terminal 30 after processing the service request according to the verification result of the verification terminal 20.
Optionally, the first program 301 further includes:
the first encryption calculation unit 14 is configured to encrypt the service handling number through a preset secure encryption algorithm, and generate an authentication request according to the encrypted service handling number, the communication information of the service terminal 30, and the identifier of the terminal 10, where the service handling number included in the authentication request is specifically the encrypted service handling number.
Referring to fig. 13, a schematic block diagram of an authentication terminal according to a thirteenth embodiment of the present invention is shown, where the authentication terminal is configured to execute the methods according to the embodiments shown in fig. 4 to fig. 5. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 13, the present embodiment provides an authentication terminal 20, including:
a second processor 500(processor), a second communication Interface 600(Communications Interface), a second memory 700(memory), and a second bus 800.
The second processor 500, the second communication interface 600 and the second memory 700 are communicated with each other via the bus 800.
A second communication interface 600 for communicating with a cable modem.
A second processor 500 for executing a second program 701.
In particular, the second program 701 may include program code comprising computer operating instructions.
The second processor 500 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention.
The second memory 700 is used for storing a second program 701. The secondary memory 700 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory. The second program 701 specifically includes:
an authentication request receiving unit 21, configured to receive an authentication request sent by a short message when a terminal 10 sends a service request to a service terminal 30, where the service request includes a service transaction number and an identity of the terminal 10, and the authentication request includes communication information of the service terminal 30, the service transaction number, and the identity of the terminal 10;
a verification request processing unit 22, configured to read a communication number of a short message that sends the authentication request, and verify whether a service transaction number in the authentication request is consistent with the communication number of the short message;
the verification result returning unit 23 is configured to send a verification result to the service terminal 30 according to the communication information of the service terminal 30, where the verification result carries the identity of the terminal 10, so that the service terminal 30 determines whether to execute the service request according to the verification result, and returns a service request execution result to the terminal 10.
Optionally, the verification request processing unit 22 includes:
the second encryption calculation unit 221 is configured to perform encryption calculation on the communication number of the short message through the preset security encryption algorithm, and the service transaction number in the authentication request is processed through the preset security encryption algorithm;
and the comparing unit 222 is configured to verify whether the service handling number after the encryption calculation is consistent with the communication number of the short message after the encryption calculation.
Optionally, the second program 701 further includes:
and a binding relationship establishing unit 24, configured to establish a binding relationship between the communication number of the short message and the identity of the terminal 10 if the verification fails, and send the binding relationship to the service terminal 30.
Referring to fig. 14, a schematic block diagram of a service terminal according to a fourteenth embodiment of the present invention is shown, where the verification terminal is configured to execute the method according to the embodiment of the present invention shown in fig. 6. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 14, the service terminal 30 provided in this embodiment includes:
a third processor 910(processor), a third communication Interface 920(Communications Interface), a third memory 930(memory), and a third bus 940.
The third processor 910, the third communication interface 920 and the third memory 930 communicate with each other via a bus 940.
A third communication interface 920 for communicating with a cable modem.
A third processor 910 for executing a third program 931.
In particular, the third program 931 may include program code that includes computer operation instructions.
The third processor 910 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present invention.
A third memory 930 for storing a third program 931. The third memory 930 may comprise a high-speed RAM memory and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The third program 931 specifically includes:
a service request receiving unit 31, configured to receive a service request sent by a terminal, where the service request includes a service handling number and an identity of the terminal;
a verification request receiving unit 32, configured to receive a verification result that is sent by a verification terminal and used for performing identity verification on the service transaction number, where the verification result carries an identity of the terminal;
a service request execution unit 33, configured to determine whether to execute the service request according to the verification result, and return a service request execution result to the terminal.
Optionally, the third program 931 further includes:
and the service request failure prompting unit 34 is configured to return a service request failure prompting message to the terminal if a verification result carrying the identity of the terminal and sent by the verification terminal is not received within a preset time.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the unit in the terminal described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal and method can be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the terminal of the embodiment of the invention can be merged, divided and deleted according to actual needs.
The functions, if implemented in the form of software function modules and sold or used as a stand-alone product, may be stored in a terminal-readable storage medium. Based on such understanding, the technical solution of the present invention or a part thereof, which essentially contributes to the prior art, may be embodied in the form of a software product stored in a storage medium and including instructions for causing a terminal (which may be a mobile phone, an IPAD, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (14)
1. A service request processing method is characterized by comprising the following steps:
a terminal acquires communication information of the service terminal and sends a service request to the service terminal according to the communication information of the service terminal, wherein the service request comprises a service handling number and an identity of the terminal; the communication information comprises an IP address, a domain name and an MAC address of the service terminal;
acquiring a communication number of a verification terminal, and sending an identity verification request to the verification terminal through a short message according to the communication number of the verification terminal, wherein the identity verification request comprises communication information of the service terminal, the service handling number and an identity of the terminal, and the communication number is a communication number corresponding to an identity identification card of the terminal;
and receiving a service request execution result returned by the service terminal after the service request is processed by the service terminal according to the verification result of the verification terminal.
2. The method for processing service request according to claim 1, wherein before the obtaining the communication number of the verification terminal and sending the authentication request to the verification terminal by short message according to the communication number of the verification terminal, the method further comprises:
and encrypting the service handling number through a preset security encryption algorithm, and generating an authentication request according to the encrypted service handling number, the communication information of the service terminal and the identifier of the terminal, wherein the service handling number included in the authentication request is the encrypted service handling number.
3. A method for verifying a service handling number is characterized by comprising the following steps:
receiving an identity verification request sent by a terminal through a short message when the terminal sends a service request to a service terminal, wherein the service request comprises a service handling number and an identity of the terminal, the identity verification request comprises communication information of the service terminal, the service handling number and the identity of the terminal, and the communication information comprises an IP address, a domain name and an MAC address of the service terminal;
reading a communication number of a short message which sends the identity verification request, verifying whether a service handling number in the identity verification request is consistent with the communication number of the short message, wherein the communication number is a communication number corresponding to an identity identification card of the terminal;
and sending a verification result to the service terminal according to the communication information of the service terminal, wherein the verification result carries the identity of the terminal, so that the service terminal determines whether to execute the service request according to the verification result and returns a service request execution result to the terminal.
4. The method for verifying the service transaction number according to claim 3, wherein the service transaction number in the authentication request is processed by a preset security encryption algorithm, and the verifying whether the service transaction number in the authentication request is consistent with the communication number of the short message comprises:
and carrying out encryption calculation on the communication number of the short message through the preset security encryption algorithm, and verifying whether the service handling number after encryption calculation is consistent with the communication number of the short message after encryption calculation.
5. The method for validating a service handling number according to claim 3, wherein the sending a validation result to the service terminal according to the communication information of the service terminal, the validation result carrying an identity of the terminal, so that the service terminal determines whether to execute the service request according to the validation result and returns a service request execution result to the terminal further comprises:
and if the verification result is verification failure, establishing a binding relationship between the communication number of the short message and the identity of the terminal, and sending the binding relationship to the service terminal.
6. A service request processing method is characterized by comprising the following steps:
receiving a service request sent by a terminal, wherein the service request comprises a service handling number and an identity of the terminal;
receiving a verification result of identity verification of the service handling number sent by a verification terminal, determining whether to execute the service request according to the verification result, and returning a service request execution result to the terminal;
the verification result is obtained by the verification terminal based on an identity verification request sent by the terminal, and the verification result carries an identity identifier of the terminal; the identity authentication request comprises communication information of the service terminal, the service handling number and an identity of the terminal, and the communication number is a communication number corresponding to an identity identification card of the terminal.
7. The service request processing method of claim 6, wherein the receiving the service request sent by the terminal further comprises:
and if the verification result which is sent by the verification terminal and carries the identity identifier of the terminal is not received within the preset time, returning a prompt message of service request failure to the terminal.
8. A terminal, comprising:
a service request sending unit, configured to obtain communication information of the service terminal, and send a service request to the service terminal according to the communication information of the service terminal, where the service request includes a service handling number and an identity of the terminal; the communication information comprises an IP address, a domain name and an MAC address of the service terminal;
the authentication request sending unit is used for acquiring a communication number of an authentication terminal and sending an identity authentication request to the authentication terminal through a short message according to the communication number of the authentication terminal, wherein the identity authentication request comprises communication information of the service terminal, the service handling number and an identity of the terminal, and the communication number is a communication number corresponding to an identity identification card of the terminal;
and the service request result acquisition unit is used for receiving a service request execution result returned by the service terminal after the service request is processed according to the verification result of the verification terminal.
9. The terminal of claim 8, further comprising:
and the first encryption calculation unit is used for encrypting the service handling number through a preset security encryption algorithm and generating an identity verification request according to the encrypted service handling number, the communication information of the service terminal and the identifier of the terminal, wherein the service handling number included in the identity verification request is the encrypted service handling number.
10. An authentication terminal, comprising:
the authentication request receiving unit is used for receiving an authentication request sent by a terminal through a short message when the terminal sends a service request to a service terminal, wherein the service request comprises a service handling number and an identity of the terminal, the authentication request comprises communication information of the service terminal, the service handling number and the identity of the terminal, and the communication information comprises an IP address, a domain name and an MAC address of the service terminal;
a verification request processing unit, configured to read a communication number of a short message that sends the authentication request, and verify whether a service transaction number in the authentication request is consistent with the communication number of the short message, where the communication number is a communication number corresponding to an identification card of the terminal;
and the verification result returning unit is used for sending a verification result to the service terminal according to the communication information of the service terminal, wherein the verification result carries the identity of the terminal, so that the service terminal determines whether to execute the service request according to the verification result and returns a service request execution result to the terminal.
11. The authentication terminal according to claim 10, wherein the authentication request processing unit includes:
the second encryption calculation unit is used for carrying out encryption calculation on the communication number of the short message through a preset security encryption algorithm, and the service handling number in the identity authentication request is processed through the preset security encryption algorithm;
and the comparison unit is used for verifying whether the service handling number after the encryption calculation is consistent with the communication number of the short message after the encryption calculation.
12. The authentication terminal of claim 10, further comprising:
and the binding relationship establishing unit is used for establishing the binding relationship between the communication number of the short message and the identity of the terminal if the verification fails, and sending the binding relationship to the service terminal.
13. A service terminal, comprising:
a service request receiving unit, configured to receive a service request sent by a terminal, where the service request includes a service handling number and an identity of the terminal;
the verification request receiving unit is used for receiving a verification result of identity verification of the service handling number sent by a verification terminal, and the verification result carries an identity of the terminal;
a service request execution unit, configured to determine whether to execute the service request according to the verification result, and return a service request execution result to the terminal;
the verification result is obtained by the verification terminal based on an identity verification request sent by the terminal, and the verification result carries an identity identifier of the terminal; the identity authentication request comprises communication information of the service terminal, the service handling number and an identity of the terminal, and the communication number is a communication number corresponding to an identity identification card of the terminal.
14. The service terminal of claim 13, further comprising:
and the service request failure prompting unit is used for returning service request failure prompting information to the terminal if the verification result which is sent by the verification terminal and carries the identity identifier of the terminal is not received within the preset time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611195081.0A CN106685945B (en) | 2016-12-21 | 2016-12-21 | Service request processing method, service handling number verification method and terminal thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611195081.0A CN106685945B (en) | 2016-12-21 | 2016-12-21 | Service request processing method, service handling number verification method and terminal thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106685945A CN106685945A (en) | 2017-05-17 |
CN106685945B true CN106685945B (en) | 2020-12-22 |
Family
ID=58870908
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611195081.0A Active CN106685945B (en) | 2016-12-21 | 2016-12-21 | Service request processing method, service handling number verification method and terminal thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106685945B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109345186B (en) * | 2018-08-15 | 2023-04-18 | 中国平安人寿保险股份有限公司 | Service handling method based on Internet of things and terminal equipment |
CN110996272B (en) * | 2019-11-05 | 2021-10-22 | 武汉普斯顿网络科技有限公司 | Game service verification method, device, equipment and medium |
CN111209546A (en) * | 2020-01-03 | 2020-05-29 | 数字广东网络建设有限公司 | Online multi-person identity authentication method, system and device and identity authentication equipment |
CN111538981A (en) * | 2020-04-24 | 2020-08-14 | 北京思特奇信息技术股份有限公司 | Certificate reading method and system for business hall |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882853A (en) * | 2012-09-05 | 2013-01-16 | 孙银海 | System and method for internet user authentication |
CN103812836A (en) * | 2012-11-12 | 2014-05-21 | 孙银海 | System and method for website to send user reserved information |
CN105721413A (en) * | 2015-09-08 | 2016-06-29 | 腾讯科技(深圳)有限公司 | Service processing method and apparatus |
CN105743650A (en) * | 2014-12-11 | 2016-07-06 | 卓望数码技术(深圳)有限公司 | Mobile office identity authentication method, platform and system, and mobile terminal |
CN105869082A (en) * | 2016-03-28 | 2016-08-17 | 上海易能信息技术有限公司 | Data processing method and apparatus |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101686581B (en) * | 2008-09-22 | 2012-06-27 | 中国移动通信集团北京有限公司 | Mobile communication business service system and business processing method thereof |
CN101482962A (en) * | 2009-02-26 | 2009-07-15 | 北控易码通(北京)科技有限公司 | Service data processing terminal and service data processing method |
CN102082994B (en) * | 2009-11-27 | 2013-10-09 | 中国移动通信集团辽宁有限公司 | Authentication method and system as well as position application service manager and terminal access gateway (AG) |
US9532222B2 (en) * | 2010-03-03 | 2016-12-27 | Duo Security, Inc. | System and method of notifying mobile devices to complete transactions after additional agent verification |
CN104426846A (en) * | 2013-08-22 | 2015-03-18 | 阿里巴巴集团控股有限公司 | Service security verifying method and apparatus |
CN104640114B (en) * | 2015-01-04 | 2018-09-11 | 中国联合网络通信集团有限公司 | A kind of verification method and device of access request |
-
2016
- 2016-12-21 CN CN201611195081.0A patent/CN106685945B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102882853A (en) * | 2012-09-05 | 2013-01-16 | 孙银海 | System and method for internet user authentication |
CN103812836A (en) * | 2012-11-12 | 2014-05-21 | 孙银海 | System and method for website to send user reserved information |
CN105743650A (en) * | 2014-12-11 | 2016-07-06 | 卓望数码技术(深圳)有限公司 | Mobile office identity authentication method, platform and system, and mobile terminal |
CN105721413A (en) * | 2015-09-08 | 2016-06-29 | 腾讯科技(深圳)有限公司 | Service processing method and apparatus |
CN105869082A (en) * | 2016-03-28 | 2016-08-17 | 上海易能信息技术有限公司 | Data processing method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106685945A (en) | 2017-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111917773B (en) | Service data processing method and device and server | |
US20200213129A1 (en) | Authenticating a user and registering a wearable device | |
US8387119B2 (en) | Secure application network | |
US20160307194A1 (en) | System and method for point of sale payment data credentials management using out-of-band authentication | |
US10212151B2 (en) | Method for operating a designated service, service unlocking method, and terminal | |
CN106921799A (en) | A kind of mobile terminal safety means of defence and mobile terminal | |
CN108683667B (en) | Account protection method, device, system and storage medium | |
KR20190014124A (en) | Two factor authentication | |
EP2690840B1 (en) | Internet based security information interaction apparatus and method | |
CN104378343A (en) | Network account password regain method, device and system | |
US10733594B1 (en) | Data security measures for mobile devices | |
CN106685945B (en) | Service request processing method, service handling number verification method and terminal thereof | |
CN108335105B (en) | Data processing method and related equipment | |
CN109597727B (en) | Detection method, detection device, server and detection system of electronic equipment | |
CN110909340B (en) | Login processing method, system, device, electronic equipment and storage medium | |
CN105721425B (en) | information processing method and electronic equipment | |
CA3122376A1 (en) | Systems and methods for securing login access | |
CN115943376A (en) | Authenticating interface element interactions | |
CN115277143A (en) | Data secure transmission method, device, equipment and storage medium | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN113709115A (en) | Authentication method and device | |
CN108769059B (en) | Verification method, device, medium and computing equipment | |
CN106533685B (en) | Identity authentication method, device and system | |
US20140215592A1 (en) | Method, apparatus and system for user authentication | |
US20180341402A1 (en) | Method for executing of security keyboard, apparatus and system for executing the method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210125 Address after: No. 1702-1703, 17 / F (natural floor, 15 / F), Desai technology building, 9789 Shennan Avenue, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Patentee after: Shenzhen Microphone Holdings Co.,Ltd. Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong. Patentee before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |