CN108990059A - A kind of verification method and device - Google Patents

A kind of verification method and device Download PDF

Info

Publication number
CN108990059A
CN108990059A CN201710409372.3A CN201710409372A CN108990059A CN 108990059 A CN108990059 A CN 108990059A CN 201710409372 A CN201710409372 A CN 201710409372A CN 108990059 A CN108990059 A CN 108990059A
Authority
CN
China
Prior art keywords
gateway
authentication information
verified
mobile phones
cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710409372.3A
Other languages
Chinese (zh)
Other versions
CN108990059B (en
Inventor
张天宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710409372.3A priority Critical patent/CN108990059B/en
Publication of CN108990059A publication Critical patent/CN108990059A/en
Application granted granted Critical
Publication of CN108990059B publication Critical patent/CN108990059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of verification methods, and user's operation step is more when solving to verify cell-phone number in the prior art, the lower problem of convenience.This method comprises: terminal sends gateway authentication request to the gateway of telecom operators, it include the international mobile subscriber identity of the terminal in the gateway authentication request;The gateway is requested according to the gateway authentication, determines target mobile phones number corresponding with the international mobile subscriber identity, determines authentication information corresponding with the target mobile phones number, the authentication information is sent to the terminal;The terminal to server sends checking request, and the checking request includes cell-phone number to be verified and the authentication information;The server obtains target mobile phones number corresponding with the authentication information according to the checking request, from the gateway, is verified according to the target mobile phones number of acquisition to the cell-phone number to be verified.Disclosed herein as well is a kind of verifying devices.

Description

A kind of verification method and device
Technical field
This application involves field of computer technology more particularly to a kind of verification methods and device.
Background technique
It in internet, when handling some business based on cell-phone number, generally requires to verify cell-phone number, to protect Demonstrate,prove user's input cell-phone number is correct and the practical right to use for possessing this cell-phone number of user.For example, user is passing through mobile phone When number register account number, server often verifies the cell-phone number of user's input.
In the prior art, when verifying cell-phone number, server can telecom operators in the form of short message or voice, to The corresponding terminal of cell-phone number to be verified issues identifying code, and the identifying code received is sent to server by terminal by user, takes Business device just determines that cell-phone number is verified after determining that the identifying code received is consistent with the identifying code issued.
During existing verifying cell-phone number, the operation for needing user to carry out is more, and convenience is lower.To pass through short message Mode verified for, referring to Fig. 1, user after verifying interface input handset number, need to click send identifying code by Then button goes to short message interface to check the identifying code received, return verifying interface the identifying code received filling is corresponding In input frame, finally click determine, complete the operating process of client, should during user's operation step it is more, convenience compared with It is low.
Summary of the invention
The embodiment of the present application provides a kind of verification method, and user's operation walks when solving to verify cell-phone number in the prior art Rapid more, the lower problem of convenience.
The embodiment of the present application adopts the following technical solutions:
A kind of verification method, comprising:
Terminal sends gateway authentication request to the gateway of telecom operators, includes the terminal in the gateway authentication request International mobile subscriber identity;
The gateway is requested according to the gateway authentication, determines target hand corresponding with the international mobile subscriber identity Machine number determines authentication information corresponding with the target mobile phones number, the authentication information is sent to the terminal;
The terminal to server sends checking request, and the checking request includes that cell-phone number to be verified and the certification are believed Breath;
The server obtains target mobile phones corresponding with the authentication information according to the checking request, from the gateway Number, the cell-phone number to be verified is verified according to the target mobile phones number of acquisition.
The embodiment of the present application also provides a kind of verification method, user's operation when solving to verify cell-phone number in the prior art Step is more, the lower problem of convenience.
The embodiment of the present application adopts the following technical solutions:
A kind of verification method, comprising:
According to the international mobile subscriber identity of terminal, authentication information is obtained by the gateway of telecom operators, it is described to recognize Card information is information corresponding with the target mobile phones number of the terminal;
Checking request is sent to server, includes cell-phone number to be verified and the authentication information, institute in the checking request Checking request is stated for requesting the server according to the authentication information, by the gateway to the cell-phone number to be verified into Row verifying.
The embodiment of the present application also provides a kind of verification method, user's operation when solving to verify cell-phone number in the prior art Step is more, the lower problem of convenience.
The embodiment of the present application adopts the following technical solutions:
The checking request that server receiving terminal is sent includes cell-phone number to be verified and certification letter in the checking request Breath, the authentication information are target mobile phones number that the terminal is got by the gateway of telecom operators, with the terminal Corresponding information;
The server is in response to the checking request, according to the authentication information, by the gateway to described to be tested Card cell-phone number is verified.
The embodiment of the present application also provides a kind of verifying device, user's operation when solving to verify cell-phone number in the prior art Step is more, the lower problem of convenience.
The embodiment of the present application adopts the following technical solutions:
A kind of verifying device, comprising:
Authentication information acquiring unit is obtained according to the international mobile subscriber identity of terminal by the gateway of telecom operators Authentication information is taken, the authentication information is information corresponding with target mobile phones number, and the target mobile phones number are the world with terminal The corresponding cell-phone number of mobile identification number;
Checking request transmission unit sends checking request to server, includes cell-phone number to be verified in the checking request With the authentication information, the checking request passes through the gateway pair for requesting the server according to the authentication information The cell-phone number to be verified is verified.
The embodiment of the present application also provides a kind of verifying device, user's operation when solving to verify cell-phone number in the prior art Step is more, the lower problem of convenience.
The embodiment of the present application adopts the following technical solutions:
Checking request receiving unit receives the checking request that terminal is sent, and includes mobile phone to be verified in the checking request Number and authentication information, the authentication information be that the terminal is got by the gateway of telecom operators;
Authentication unit, in response to the checking request, according to the authentication information, by the gateway to described to be verified Cell-phone number is verified.
The embodiment of the present application use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
Terminal obtains authentication information by the gateway of telecom operators, which is right with the target mobile phones number of terminal The information answered, in this way, terminal is after sending checking request to server, authentication information can be sent to gateway by server, by Gateway returns to server target mobile phones number corresponding with authentication information, and server can be according to target mobile phones number, to verifying Cell-phone number to be verified in request is verified.Entire verification process only needs user to input cell-phone number to be verified, is not necessarily to Check other operations such as short message, input identifying code, compared with the existing technology for, convenience is higher.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the operating process schematic diagram of user when verifying cell-phone number in the prior art;
Fig. 2 is a kind of implementation process schematic diagram of verification method provided by the present application;
Fig. 3 is a kind of implementation process schematic diagram of verification method provided by the present application;
Fig. 4 is a kind of realization schematic diagram of a scenario of verification method provided by the present application;
Fig. 5 is a kind of concrete structure schematic diagram of verification method provided by the present application;
Fig. 6 is a kind of implementation process schematic diagram of verification method provided by the present application;
The operating process schematic diagram of user when Fig. 7 is verifying cell-phone number provided by the present application;
Fig. 8 is a kind of concrete structure schematic diagram for verifying device provided by the present application;
Fig. 9 is a kind of concrete structure schematic diagram for verifying device provided by the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
Currently, verifying cell-phone number scene it is more and more, due to cell-phone number be it is corresponding with communication equipment, this In field, verifying cell-phone number alternatively referred to as verifies equipment.
Cell-phone number described in the embodiment of the present application can be terminal device and be used for when being communicated by mobile network The Subscriber Number of identity user identity, such as mobile directory number, MDN (Mobile Directory Number, MDN), calling subscriber The required group of number is MDN code when calling called subscriber, that is, our usually said cell-phone numbers.
With the development of computer technology, described terminal device is not limited in cell phone in the embodiment of the present application, It can also be the equipment that tablet computer, smartwatch, vehicle-mounted mobile platform etc. can be communicated by mobile network.
As described in the background art, in the prior art, during verifying cell-phone number, the behaviour of user's progress is needed Make more, convenience is lower.User just needs to be implemented the more operation unrelated with ongoing business in this way, excuse me user Originally the business carried out influences the experience of user.For example, user, which carries out account using cell-phone number, registers business, registering When account, the information such as some accounts, password, identity information are often filled in, then to the verification process of cell-phone number, it is clear that beat The progress for having disturbed user's registration account business, affects the experience of user.
In addition, in the prior art, the process time-consuming for verifying cell-phone number is also longer.Specifically, equally to pass through short message Mode verified for, after user clicks and sends short message button, often expending more than ten seconds, even longer time is whole End can just receive short message, and after receiving short message, user will also switch application program, remember (or duplication) identifying code, then Input (or stickup) identifying code.Whole operation process often wants 30 seconds or so time-consuming.
In addition, in the prior art, the failure rate for verifying cell-phone number is higher.Specifically, unskilled for some operations User, be easier to the case where maloperation occur, and remember and input identifying code when be easy to appear mistake, cause cell-phone number to be tested Card failure.In addition, the arrival rate of short message is relatively low under weak net environment, it is easy to cause cell-phone number authentication failed.
In addition, in the prior art, the mode of the verifying cell-phone number such as automatic short message reading is not sufficiently stable.Automatic short message reading When, application program needs the short message received by preset interface reading terminals, the identifying code in short message is then extracted, with Complete cell-phone number verifying.But short message reading needs to obtain equipment permission, and equipment permission can be got often by multi-party The influence of face factor, for example, will not provide short message in Apple Macintosh operating system reads permission, the major part in Android operation system is set Lead to automatic short message reading function for short message reading permission will not be provided in addition, the permission is relatively easy to be limited by security software The realization of energy is impacted, therefore the mode of the verifying cell-phone number such as automatic short message reading is not sufficiently stable.
Verification method provided by the present application is described more fully below, the executing subject of this method can be calculating equipment, example Such as smart phone, tablet computer terminal device.In addition, the executing subject of this method, which can also be, realizes provided by the present application test The application program of card method.For ease of description, hereafter executing subject in this way be terminal for, to the embodiment party of this method Formula is introduced.It is appreciated that it is a kind of illustrative explanation that the executing subject of this method, which is terminal, it is not construed as pair The restriction of this method.
The implementation process schematic diagram of verification method provided by the present application is as shown in Fig. 2, include the following steps:
Step S101: according to the international mobile subscriber identity of terminal, certification letter is obtained by the gateway of telecom operators Breath;
Wherein, which is information corresponding with the cell-phone number of terminal, and the cell-phone number of terminal is the world with terminal Mobile identification number (IMSI:International Mobile Subscriber Identification Number) is right The information answered hereinafter will for ease of description, cell-phone number corresponding with the IMSI of terminal is known as target mobile phones number in the application Corresponding relationship of the target mobile phones number with IMSI is discussed in detail, which is stored in gateway.The terminal can be from gateway The terminal of authentication information is obtained, in addition, if when the executing subject of step S101 is software (client), which can be with It is the corresponding information of international mobile subscriber identity for the terminal that the software is run.
IMSI is used to distinguish the different user in cellular network, has uniqueness in all cellular networks.Mobile network User communication when, will use IMSI as mark.In global system for mobile communications (Global System for Mobile Communication, GSM) network, Universal Mobile Communication System (Universal Mobile Telecommunications System, UMTS) in network and long term evolution (Long Term Evolution, LTE) network, IMSI identifies mould from client Block (Subscriber Identification Module, SIM) card, is then directly from mobile phone in the cdma 2000 network, Or Removable User Identity Module (Removable User Identity Module, RUIM) card.For SIM card and RUIM For card, due to that can be removed from terminal, the IMSI of terminal device is often variable.
The corresponding relationship of IMSI and phone number, can be by the gateway of telecom operators in home location register (Home Location Register, HLR) in definition, comprising being responsible for the data of telecom operators' user management in home location register The gateway in library, telecom operators can be by inquiring the database, to determine phone number corresponding with IMSI.
The gateway of telecom operators is the gateway system for having phone number and obtaining function by telecom operators' setting.Electricity Believe operator when user passes through terminal access mobile data network, can all be obtained by interface the phone number of user to Charging.The interface has been opened to the outside world as gateway authentication interface at present, is allowed partner to use the interface, is obtained the mobile phone of user Number.So, terminal by obtaining itself IMSI, can then request the gateway of telecom operators to obtain corresponding with IMSI The corresponding cell-phone number of terminal can be obtained in cell-phone number.
It should be noted that when being verified to cell-phone number, it for the sake of security, often can't be directly by basis The target mobile phones number that IMSI is determined return to terminal, but authentication information corresponding with target mobile phones number is returned to terminal, by It is corresponding with target mobile phones number in IMSI, then and the corresponding authentication information of target mobile phones number is certification letter corresponding with IMSI Breath.It may include the encryption information encrypted to target mobile phones number in authentication information, also may include and target mobile phones Number corresponding identification information, the application are not construed as limiting this.
The gateway of telecom operators can return the authentication information after the corresponding authentication information of IMSI for getting terminal Back to the terminal.Terminal after receiving authentication information, can request server cell-phone number to be verified is verified.
Step S102: checking request is sent to server.
It wherein, include cell-phone number to be verified and authentication information in the checking request, which is used for request server Cell-phone number to be verified is verified according to authentication information.
Cell-phone number to be verified can be the cell-phone number to be verified that terminal receives user's input, and user can be by preset defeated Enter frame and input cell-phone number to be verified, alternatively, cell-phone number to be verified can also be terminal according to the information of terminal local determine to Cell-phone number is verified, the information of terminal local here such as can be the loCal number for being pre-stored within terminal local, so just Without the cell-phone number of the manual input terminal of user, convenience is higher.That is, before sending checking request to server, eventually End can also receive the cell-phone number to be verified of input, or cell-phone number to be verified can also be determined according to terminal local information.
It should be noted that terminal can pass through the shifting of terminal when sending gateway authentication request to the gateway of operator Dynamic data network sends gateway authentication request to gateway, and mobile data network can be to be used to carry out by what telecom operators provided The cellular network of network data transmission.
Before sending gateway authentication request, first it can determine whether mobile data network can be used, if it is available, can lead to Cross mobile data network transmission;If unavailable, it can inform that user carries out cell-phone number by other verification modes Verifying.Other verification modes mentioned here such as can be the verification mode of the forms such as short message, voice.
In the embodiment of the present application, terminal obtains authentication information by the gateway of telecom operators, which is and end The corresponding information of the target mobile phones number at end, in this way, terminal, after sending checking request to server, server can believe certification Breath is sent to gateway, returns to server target mobile phones number corresponding with authentication information by gateway, server can be according to mesh Cell-phone number is marked, the cell-phone number to be verified in checking request is verified.It is to be verified that entire verification process only needs user to input Cell-phone number, without check other operations such as short message, input identifying code, compared with the existing technology for, convenience compared with It is high.
For terminal after checking request is sent to server, server can determine that authentication information is corresponding by gateway Then target mobile phones number are verified cell-phone number to be verified according to target mobile phones number.
The process verified below to server is described in detail, implementation process schematic diagram such as Fig. 3 institute of the process Show, includes the following steps:
Step S201: the checking request that terminal is sent is received;
It wherein, include cell-phone number to be verified and authentication information in the checking request, which is that terminal passes through telecommunications What the gateway of operator was got.
Step S202: in response to the checking request, the cell-phone number to be verified is tested according to the authentication information Card.
The checking request that server can be sent according to client, obtains and authentication information pair from the gateway of telecom operators The target mobile phones number answered.Since, comprising authentication information, which can be sent to gateway by server, so in checking request Request gateway returns to cell-phone number corresponding with the authentication information afterwards.
As it was noted above, terminal phone number may be illegal if target mobile phones number are directly returned to terminal User obtains.In addition, meaning that any place will be possibly not added in terminal if target mobile phones number are directly returned to terminal The target mobile phones number of reason and cell-phone number to be verified issue server confirmation, then illegal user may crack, directly will Target mobile phones number are set as number identical with cell-phone number to be verified, then issue server requests authentication again, just can not in this way The cell-phone number of terminal is correctly verified.
Based on above-mentioned consideration, in the embodiment of the present application, authentication information may include being encrypted to obtain to target mobile phones number Encryption information, also may include identification information corresponding with target mobile phones number.
So, when in authentication information including encryption information, gateway can be decrypted the encryption information, can be obtained Then target mobile phones number are returned to server by target mobile phones number;When in authentication information include the corresponding mark of target mobile phones number When information, then gateway can determine authentication information according to the corresponding relationship of the target mobile phones number pre-established and identification information In the corresponding target mobile phones number of identification information, target mobile phones number are then returned into server.
Server, can be according to target mobile phones number to mobile phone to be verified after the target mobile phones number for receiving gateway transmission It number is verified.Specifically in verifying, server may determine that whether target mobile phones number are consistent with cell-phone number to be verified, if target Cell-phone number is consistent with cell-phone number to be verified, then is proved to be successful, if target mobile phones number and cell-phone number to be verified are inconsistent, verifies mistake It loses.
If being proved to be successful, server can execute the related service logic after being proved to be successful, then by service logic Processing result returns to terminal.For example, user, which carries out account by cell-phone number, registers business, then in user's input handset number After clicking verifying button, in the case where being proved to be successful, then directly prompt subscriber phone number is proved to be successful.
If authentication failed, the terminal phone authentication failed is notified.User can choose other cell-phone number authentications Formula is verified.
It should be noted that terminal can include the device identification of the terminal into the gateway authentication request that gateway is sent (Token), device identification is used to identify the identity information of the equipment, also referred to as token.It is got in gateway according to IMSI After authentication information, authentication information can be associated with device identification, associated authentication information and device identification are then sent to this The corresponding terminal of device identification.
Equally, terminal also can include the device identification of the terminal, service when sending checking request to server, in request Device can be according to the device identification to terminal return authentication result.Server, also can will be with when requesting gateway decrypted authentication information The associated device identification of authentication information is sent to gateway, and the target mobile phones number that decryption obtains can be associated with by gateway with device identification, And server is returned to, so that server verifies target mobile phones number and cell-phone number to be verified according to device identification.
Verification method provided by the embodiments of the present application, terminal obtain authentication information by the gateway of telecom operators, this is recognized Demonstrate,prove information be information corresponding with the target mobile phones number of terminal, in this way, terminal to server send checking request after, server Authentication information can be sent to gateway, server target mobile phones number corresponding with authentication information, server are returned to by gateway The cell-phone number to be verified in checking request can be verified according to target mobile phones number.Entire verification process only needs user Cell-phone number to be verified is inputted, other operations such as short message, input identifying code is checked without carrying out, comes compared with the existing technology It says, convenience is higher.
In addition, verification method provided by the embodiments of the present application, complicated operation is carried out without user, and short without sending Letter, etc. the processes such as short message to be received, can be by the mobile data network having built up when verifying, entire verification process can be It is completed in 1 second, for the prior art, the time of consuming is shorter.
In addition, verification method provided by the embodiments of the present application, complicated operation is carried out without user, can be grasped to avoid user Various faults in work, the case where avoiding due to user's fault bring authentication failed.And in weak net (the short message function of terminal Can be unavailable, but mobile data network is available) when, the verifying of cell-phone number still may be implemented, as long as mobile data network is available , compared with the existing technology for, the success rate of verifying is higher.
In addition, verification method provided by the embodiments of the present application, mentions without applying for mobile device permission, and with mobile device The interface of confession is unrelated, compared with the existing technology for, verification process is reliable and stable.
Foregoing invention design based on the application, for the ease of better understanding technical characteristic, means and the effect of the application Fruit is cooked furtherly the verification method of the application below with reference to a kind of realization schematic diagram of a scenario of verification method shown in Fig. 4 It is bright.The process of following cell-phone numbers verifying is similar to the process that cell-phone number described previously is verified, do not make referrals to hereinafter other Some steps may refer to associated description above, and details are not described herein again.
The implementation process schematic diagram of the process is as shown in figure 5, include the following steps:
Step S301: terminal sends gateway authentication request to the gateway of telecom operators, wraps in the gateway authentication request International mobile subscriber identity containing the terminal;
Step S302: the gateway is requested according to the gateway authentication, the determining and international mobile subscriber identity pair The target mobile phones number answered determine authentication information corresponding with the target mobile phones number, the authentication information are sent to the end End;
Step S303: the terminal to server sends checking request, the checking request include cell-phone number to be verified and The authentication information;
Step S304: the server obtains corresponding with the authentication information according to the checking request from the gateway Target mobile phones number, the cell-phone number to be verified is verified according to the target mobile phones number of acquisition.
Foregoing invention design based on the application, for the ease of better understanding technical characteristic, means and the effect of the application Fruit is below described further above-mentioned steps S301-S304.The process of following cell-phone number verifyings is tested with cell-phone number described previously The process of card is similar, and some other step not made referrals to hereinafter may refer to associated description above, herein no longer It repeats.
The implementation process schematic diagram of the process is as shown in fig. 6, include the following steps:
Step S401: terminal determines the number to be verified of user's input;
Terminal can receive the number to be verified of user's input by the preset input frame of client.
Step S402: terminal judges whether mobile data network can be with;
Described mobile data network is available in the application, and the mobile data network that can be in terminal is in the open state When.It should be noted that the networking mode of present terminal equipment can be mobile number when mobile data network is in the open state According to network, it is also possible to other networks, other networks mentioned here such as can be WLAN (Wireless Fidelity, Wi-Fi).
Step S403: if available, terminal sends gateway authentication to the gateway of telecom operators by mobile data network Request;
It wherein, include the international mobile subscriber identity of terminal in gateway authentication request.
Step S404: if unavailable, other verification modes be switched to, number to be verified is verified;
Step S405: gateway is requested according to the gateway authentication received, determining mobile with the world in gateway authentication request The corresponding target mobile phones number of CUSTOMER ID;
Gateway can be by inquiring HLR, and acquisition target mobile phones number corresponding with international mobile subscriber identity.
Step S406: gateway determines authentication information corresponding with the target mobile phones number, which is sent to end End;
Gateway can encrypt target mobile phones number, obtain encryption information, and encryption information is then contained in certification letter In breath, in addition, gateway can also directly encrypt the authentication information comprising target mobile phones number, encrypted certification letter is obtained Breath.
Step S407: authentication information is issued into terminal;
Step S408: terminal receives the authentication information, then sends checking request to server, includes in the checking request The authentication information and cell-phone number to be verified;
Step S409: the authentication information in the checking request received is sent to gateway by server;
Step S410: the authentication information received is decrypted in gateway, obtains the target mobile phones for including in authentication information Number;
Gateway is decrypted the encryption information in authentication information, obtains mesh according to the cipher mode to target mobile phones number Mark cell-phone number;Or according to before, to the cipher mode of authentication information, authentication information can be decrypted, target mobile phones are obtained Number.
Step S411: the target mobile phones number that decryption obtains are sent to server by gateway;
Step S412: whether the target mobile phones number and cell-phone number to be verified that server judgement receives are identical;
Step S413: if it is different, then server notifies the terminal authentication to fail, and S415 is entered step;
Step S414: if they are the same, then server executes the related service logic after being proved to be successful, by the processing of service logic As a result the terminal is returned to, and enters step S415;
Step S415: terminal receive server return as a result, and processing result is shown, to inform user mobile phone Number verification result.
In the entire verification process of step S401-S415, user is defeated by cell-phone number to be verified when executing step S401 After entering, only need to click verifying button, inform that terminal starts to verify cell-phone number to be verified, terminal, gateway and Server will verify cell-phone number to be verified.
The operating process schematic diagram for please referring to user when Fig. 7 is verifying cell-phone number provided by the present application, relative to existing skill For art, user need to only click verifying button after inputting cell-phone number to be verified, and terminal can be according to the IMSI of terminal realization pair The verifying of cell-phone number to be verified carries out other operations without user, and convenience is higher.
The above are verification methods provided by the embodiments of the present application, are based on same thinking, and the embodiment of the present application also provides phase The verifying device answered, as shown in figure 8, the device specifically includes:
Authentication information acquiring unit 501 passes through the gateway of telecom operators according to the international mobile subscriber identity of terminal Authentication information is obtained, the authentication information is information corresponding with target mobile phones number, and the target mobile phones number are the state with terminal The corresponding cell-phone number of border mobile identification number;
Checking request transmission unit 502 sends checking request to server, includes mobile phone to be verified in the checking request Number and the authentication information, the checking request pass through the gateway for requesting the server according to the authentication information The cell-phone number to be verified is verified.
In the embodiment of the present application, the specific embodiment of cell-phone number verifying is in one embodiment, described there are also very much Authentication information acquiring unit 501 sends gateway authentication request to gateway, includes the state of the terminal in the gateway authentication request Border mobile identification number;Receive the authentication information corresponding with the international mobile subscriber identity that the gateway is sent.
In one embodiment, authentication information acquiring unit 501 sends net to the gateway by mobile data network Certification request is closed, the mobile data network is provided by the mobile operator.
In one embodiment, described device further includes cell-phone number determination unit 503 to be verified, is obtained in authentication information Before unit 501 obtains authentication information by the gateway of telecom operators, the cell-phone number to be verified of input is received or according to terminal sheet Ground information determines cell-phone number to be verified.
The above are verification methods provided by the embodiments of the present application, are based on same thinking, and the embodiment of the present application also provides phase The verifying device answered, as shown in figure 9, the device specifically includes:
Checking request receiving unit 601 receives the checking request that terminal is sent, and includes hand to be verified in the checking request Machine number and authentication information, the authentication information are what the terminal was got by the gateway of telecom operators;
Authentication unit 602, in response to the checking request, according to the authentication information, by the gateway to it is described to Verifying cell-phone number is verified.
In the embodiment of the present application, the specific embodiment of cell-phone number verifying is there are also very much, in one embodiment, one In kind embodiment, the authentication unit 602 is obtained and the authentication information pair according to the checking request from the gateway The target mobile phones number answered;The cell-phone number to be verified is verified according to the target mobile phones number.
In one embodiment, the authentication information includes following at least one:
To the encryption information that target mobile phones number are encrypted, the target mobile phones number are and the international mobile subscriber The corresponding cell-phone number of identification code;Identification information corresponding with the target mobile phones number.
In one embodiment, authentication unit 602 are to be encrypted to obtain to target mobile phones number in the authentication information Encryption information when, the authentication information is sent to the gateway, so that the gateway is to the encryption in the authentication information Information is decrypted, and obtains the target mobile phones number;The server receives the target mobile phones number that the gateway is sent;
In one embodiment, authentication unit 602 are mark corresponding with the target mobile phones number in the authentication information When knowing information, the authentication information is sent to the gateway, so as to the determining mark with the authentication information of the gateway Corresponding target mobile phones number;The server receives the target mobile phones number that the gateway is sent.
In one embodiment, authentication unit 602 judge whether are the target mobile phones number and the cell-phone number to be verified Unanimously;When the target mobile phones number are consistent with the cell-phone number to be verified, determination is proved to be successful;The target mobile phones number with When the cell-phone number to be verified is inconsistent, authentication failed is determined.
In one embodiment, described device further includes Service Processing Unit 603 and notification unit 604, wherein institute Service Processing Unit 603 is stated when being proved to be successful, the related service logic after being proved to be successful is executed, by the processing knot of service logic Fruit returns to the terminal;
The notification unit 604 notifies the terminal phone authentication failed in authentication failed.
At least one above-mentioned technical solution provided by the embodiments of the present application can reach it is following the utility model has the advantages that
Terminal obtains authentication information by the gateway of telecom operators, which is right with the target mobile phones number of terminal The information answered, in this way, terminal is after sending checking request to server, authentication information can be sent to gateway by server, by Gateway returns to server target mobile phones number corresponding with authentication information, and server can be according to target mobile phones number, to verifying Cell-phone number to be verified in request is verified.Entire verification process only needs user to input cell-phone number to be verified, is not necessarily to Check other operations such as short message, input identifying code, compared with the existing technology for, convenience is higher.
In addition, verification method provided by the embodiments of the present application, complicated operation is carried out without user, and short without sending Letter, etc. short message to be received, by the mobile data network having built up when verifying, entire verification process can be completed in 1 second, For the prior art, the time of consuming is shorter.
In addition, verification method provided by the embodiments of the present application, complicated operation is carried out without user, can be grasped to avoid user Various faults in work, the case where avoiding due to user's fault bring authentication failed.And in weak net (the short message function of terminal Can be unavailable, but mobile data network is available) when, the verifying of cell-phone number still may be implemented, only mobile data network is available , compared with the existing technology for, the success rate of verifying is higher.
In addition, verification method provided by the embodiments of the present application, mentions without applying for mobile device permission, and with mobile device The interface of confession is unrelated, compared with the existing technology for, verification process is reliable and stable.
It should be noted that in the 1990s, it is hardware that the improvement of a technology, which can be distinguished clearly, On improvement (for example, improvement to circuit structures such as diode, transistor, switches) or software on improvement (for method The improvement of process).However, with the development of technology, the improvement of current many method flows can be considered as hardware circuit Structure directly improves.Designer is nearly all obtained by the way that improved method flow to be programmed into hardware circuit accordingly Hardware circuit.Therefore, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, can Programmed logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function is by user to device programming To determine.Voluntarily programmed by designer come a digital display circuit " integrated " on a piece of PLD, without asking chip manufacturing Manufacturer designs and makes dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this Programming uses " logic compiler (logic compiler) " software instead mostly also to realize, it and program development are used when writing Software compiler is similar, and the source code before compiling also write by handy specific programming language, this is referred to as hard Part description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many Kind, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、 PALASM, RHDL (Ruby Hardware Description Language) etc., most generally use VHDL at present (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. Those skilled in the art, which also will be apparent to the skilled artisan that, only needs that slightly programming in logic is simultaneously with above-mentioned several hardware description languages by method flow It is programmed into integrated circuit, so that it may be readily available the hardware circuit for realizing the logical method process.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (13)

1. a kind of verification method, comprising:
Terminal sends gateway authentication request to the gateway of telecom operators, includes the state of the terminal in the gateway authentication request Border mobile identification number;
The gateway is requested according to the gateway authentication, determines target mobile phones corresponding with the international mobile subscriber identity Number, it determines authentication information corresponding with the target mobile phones number, the authentication information is sent to the terminal;
The terminal to server sends checking request, and the checking request includes cell-phone number to be verified and the authentication information;
The server obtains target mobile phones number corresponding with the authentication information according to the checking request, from the gateway, The cell-phone number to be verified is verified according to the target mobile phones number of acquisition.
2. a kind of verification method, comprising:
According to the international mobile subscriber identity of terminal, authentication information, the certification letter are obtained by the gateway of telecom operators Breath is information corresponding with the target mobile phones number of the terminal;
Checking request is sent to server, includes cell-phone number to be verified and the authentication information in the checking request, it is described to test Card request tests the cell-phone number to be verified by the gateway for requesting the server according to the authentication information Card.
3. method as claimed in claim 2 is obtained according to the international mobile subscriber identity of terminal by the gateway of telecom operators Authentication information is taken, is specifically included:
Gateway authentication request is sent to gateway, the international mobile subscriber comprising the terminal identifies in the gateway authentication request Code;
Receive the authentication information corresponding with the international mobile subscriber identity that the gateway is sent.
4. method as claimed in claim 3 sends gateway authentication request to gateway, specifically includes:
Gateway authentication request is sent to the gateway by mobile data network, the mobile data network is by the mobile fortune Seek what quotient provided.
5. such as any the method for claim 2-4, before obtaining authentication information by the gateway of telecom operators, the method Further include:
Receive the cell-phone number to be verified of input;Or,
Cell-phone number to be verified is determined according to terminal local information.
6. a kind of verification method, comprising:
The checking request that server receiving terminal is sent includes cell-phone number to be verified and authentication information, institute in the checking request It is that the terminal is got by the gateway of telecom operators, corresponding with the target mobile phones number of the terminal for stating authentication information Information;
The server is in response to the checking request, according to the authentication information, by the gateway to the hand to be verified Machine number is verified.
7. method as claimed in claim 6, the server passes through in response to the checking request according to the authentication information The gateway verifies the cell-phone number to be verified, specifically includes:
The server obtains target mobile phones number corresponding with the authentication information according to the checking request, from the gateway;
The server verifies the cell-phone number to be verified according to the target mobile phones number.
8. method as claimed in claim 7, the authentication information includes following at least one:
To the encryption information that target mobile phones number are encrypted, the target mobile phones number are to identify with the international mobile subscriber The corresponding cell-phone number of code;
Identification information corresponding with the target mobile phones number.
9. method as claimed in claim 8:
If the authentication information is the encryption information encrypted to target mobile phones number, from the gateway obtain with it is described The corresponding target mobile phones number of authentication information, specifically include:
The authentication information is sent to the gateway by the server, so that the gateway is to the encryption in the authentication information Information is decrypted, and obtains the target mobile phones number;
The server receives the target mobile phones number that the gateway is sent;
If the authentication information is identification information corresponding with the target mobile phones number, obtained and the certification from the gateway The corresponding target mobile phones number of information, specifically include:
The authentication information is sent to the gateway by the server, so as in gateway determination and the authentication information Identify corresponding target mobile phones number;
The server receives the target mobile phones number that the gateway is sent.
10. being tested according to the target mobile phones number the cell-phone number to be verified such as any the method for claim 6-9 Card, specifically includes:
Judge whether the target mobile phones number and the cell-phone number to be verified are consistent;
If the target mobile phones number are consistent with the cell-phone number to be verified, it is proved to be successful;
If the target mobile phones number and the cell-phone number to be verified are inconsistent, authentication failed.
11. method as claimed in claim 10, which is characterized in that according to the target mobile phones number to the cell-phone number to be verified After being verified, the method also includes:
If being proved to be successful, the related service logic after being proved to be successful is executed, the processing result of service logic is returned to described Terminal;
If authentication failed, the terminal phone authentication failed is notified.
12. a kind of verifying device, comprising:
Authentication information acquiring unit is recognized according to the international mobile subscriber identity of terminal by the gateway acquisition of telecom operators Information is demonstrate,proved, the authentication information is information corresponding with target mobile phones number, and the target mobile phones number are mobile with the world of terminal The corresponding cell-phone number of CUSTOMER ID;
Checking request transmission unit sends checking request to server, includes cell-phone number to be verified and institute in the checking request Authentication information is stated, the checking request is for requesting the server according to the authentication information, by the gateway to described Cell-phone number to be verified is verified.
13. a kind of verifying device, comprising:
Checking request receiving unit receives the checking request that terminal is sent, in the checking request comprising cell-phone number to be verified and Authentication information, the authentication information are what the terminal was got by the gateway of telecom operators;
Authentication unit, in response to the checking request, according to the authentication information, by the gateway to the mobile phone to be verified It number is verified.
CN201710409372.3A 2017-06-02 2017-06-02 Verification method and device Active CN108990059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710409372.3A CN108990059B (en) 2017-06-02 2017-06-02 Verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710409372.3A CN108990059B (en) 2017-06-02 2017-06-02 Verification method and device

Publications (2)

Publication Number Publication Date
CN108990059A true CN108990059A (en) 2018-12-11
CN108990059B CN108990059B (en) 2021-06-29

Family

ID=64502320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710409372.3A Active CN108990059B (en) 2017-06-02 2017-06-02 Verification method and device

Country Status (1)

Country Link
CN (1) CN108990059B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587683A (en) * 2019-01-04 2019-04-05 中国联合网络通信集团有限公司 Method and system, application program and the terminal information database of the anti-monitoring of short message
CN110248356A (en) * 2019-06-06 2019-09-17 北京达佳互联信息技术有限公司 Information acquisition method and device
CN111404965A (en) * 2020-04-02 2020-07-10 苏州众信至诚科技有限公司 Method for realizing mobile terminal application safety verification
CN111709007A (en) * 2020-06-10 2020-09-25 中国建设银行股份有限公司 User authentication method, device and equipment
CN112714108A (en) * 2020-12-21 2021-04-27 中国移动通信集团江苏有限公司 Method, device and equipment for verifying terminal communication number and computer storage medium
CN113115310A (en) * 2021-04-08 2021-07-13 武汉极意网络科技有限公司 Method for calling non-inductive authentication gateway
CN113132317A (en) * 2019-12-31 2021-07-16 中移互联网有限公司 Identity authentication method, system and device
WO2021188081A1 (en) * 2020-03-20 2021-09-23 Crenno Bi̇li̇şi̇m Hi̇zmetleri̇ Ar-Ge San. Ti̇c. Ltd. Şti̇ Method and system of verifying mobile phone information of users who are connected to the internet with a wired/wireless gateway other than the gsm mobile network with a mobile device in the gsm mobile network area
CN114051243A (en) * 2021-10-16 2022-02-15 北京达佳互联信息技术有限公司 Verification method, verification device, electronic equipment and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902730A (en) * 2010-06-10 2010-12-01 候万春 Multi-number supporting mobile phone terminal and multi-number addressing system and method
CN102143482A (en) * 2011-04-13 2011-08-03 中国工商银行股份有限公司 Method and system for authenticating mobile banking client information, and mobile terminal
CN102143457A (en) * 2010-11-11 2011-08-03 华为软件技术有限公司 Method for logging on by using own telephone number, mobile terminal and communication system
CN102437914A (en) * 2010-12-08 2012-05-02 袁永亮 Method by utilizing telecommunication network to supply user identity label and user identity authentication to Internet service
US20120275444A1 (en) * 2011-04-28 2012-11-01 Salah Shahsavari Push-to-multimedia method and system for sharing multimedia information
CN103198428A (en) * 2013-03-14 2013-07-10 中国农业银行股份有限公司四川省分行 System and method for air depositing and withdrawing of bank
CN103701758A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Method and system for using various businesses through mobile terminal client, and user authentication gateway
CN103812874A (en) * 2014-03-04 2014-05-21 世纪龙信息网络有限责任公司 Method and system for logging in mobile terminal quickly
CN103812653A (en) * 2012-11-15 2014-05-21 中国电信股份有限公司 Method and system for automatically acquiring account information accessed into wireless network
US20150079961A1 (en) * 2013-09-13 2015-03-19 Facebook, Inc. Techniques for phone number and data management
CN104918245A (en) * 2014-03-11 2015-09-16 中国移动通信集团广东有限公司 Identity authentication method, device, server and client
CN105450416A (en) * 2014-09-01 2016-03-30 阿里巴巴集团控股有限公司 Security authentication method and apparatus
CN105791262A (en) * 2015-12-30 2016-07-20 广东亿迅科技有限公司 APP real name authentication secure login system and method based on mobile phone IMSI
CN105992204A (en) * 2015-02-03 2016-10-05 北京神州泰岳信息安全技术有限公司 Access authentication method of applications of mobile intelligent terminal and device

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902730A (en) * 2010-06-10 2010-12-01 候万春 Multi-number supporting mobile phone terminal and multi-number addressing system and method
CN102143457A (en) * 2010-11-11 2011-08-03 华为软件技术有限公司 Method for logging on by using own telephone number, mobile terminal and communication system
CN102437914A (en) * 2010-12-08 2012-05-02 袁永亮 Method by utilizing telecommunication network to supply user identity label and user identity authentication to Internet service
CN102143482A (en) * 2011-04-13 2011-08-03 中国工商银行股份有限公司 Method and system for authenticating mobile banking client information, and mobile terminal
US20120275444A1 (en) * 2011-04-28 2012-11-01 Salah Shahsavari Push-to-multimedia method and system for sharing multimedia information
CN103701758A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Method and system for using various businesses through mobile terminal client, and user authentication gateway
CN103812653A (en) * 2012-11-15 2014-05-21 中国电信股份有限公司 Method and system for automatically acquiring account information accessed into wireless network
CN103198428A (en) * 2013-03-14 2013-07-10 中国农业银行股份有限公司四川省分行 System and method for air depositing and withdrawing of bank
US20150079961A1 (en) * 2013-09-13 2015-03-19 Facebook, Inc. Techniques for phone number and data management
CN103812874A (en) * 2014-03-04 2014-05-21 世纪龙信息网络有限责任公司 Method and system for logging in mobile terminal quickly
CN104918245A (en) * 2014-03-11 2015-09-16 中国移动通信集团广东有限公司 Identity authentication method, device, server and client
CN105450416A (en) * 2014-09-01 2016-03-30 阿里巴巴集团控股有限公司 Security authentication method and apparatus
CN105992204A (en) * 2015-02-03 2016-10-05 北京神州泰岳信息安全技术有限公司 Access authentication method of applications of mobile intelligent terminal and device
CN105791262A (en) * 2015-12-30 2016-07-20 广东亿迅科技有限公司 APP real name authentication secure login system and method based on mobile phone IMSI

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LALLA MARIALAURA MANTOVANI: ""Federated identity management from University to digital school, and one login to resources and services"", 《• TEACH D IFFERENT! PROCEEDINGS DELLA MULTICONFERENZA EMEMITALIA2015 GENOVA》 *
刘子茂: ""基于移动终端的账号安全管理"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
黄红桃许宪成: ""一键登录在网络身份认证中的风险以及改进"", 《科技视界》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587683A (en) * 2019-01-04 2019-04-05 中国联合网络通信集团有限公司 Method and system, application program and the terminal information database of the anti-monitoring of short message
CN110248356A (en) * 2019-06-06 2019-09-17 北京达佳互联信息技术有限公司 Information acquisition method and device
CN110248356B (en) * 2019-06-06 2022-03-25 北京达佳互联信息技术有限公司 Information acquisition method and device
CN113132317A (en) * 2019-12-31 2021-07-16 中移互联网有限公司 Identity authentication method, system and device
WO2021188081A1 (en) * 2020-03-20 2021-09-23 Crenno Bi̇li̇şi̇m Hi̇zmetleri̇ Ar-Ge San. Ti̇c. Ltd. Şti̇ Method and system of verifying mobile phone information of users who are connected to the internet with a wired/wireless gateway other than the gsm mobile network with a mobile device in the gsm mobile network area
CN111404965A (en) * 2020-04-02 2020-07-10 苏州众信至诚科技有限公司 Method for realizing mobile terminal application safety verification
CN111404965B (en) * 2020-04-02 2023-11-10 苏州众信至诚科技有限公司 Method for realizing mobile terminal application safety verification
CN111709007A (en) * 2020-06-10 2020-09-25 中国建设银行股份有限公司 User authentication method, device and equipment
CN112714108A (en) * 2020-12-21 2021-04-27 中国移动通信集团江苏有限公司 Method, device and equipment for verifying terminal communication number and computer storage medium
CN113115310A (en) * 2021-04-08 2021-07-13 武汉极意网络科技有限公司 Method for calling non-inductive authentication gateway
CN114051243A (en) * 2021-10-16 2022-02-15 北京达佳互联信息技术有限公司 Verification method, verification device, electronic equipment and storage medium
CN114051243B (en) * 2021-10-16 2023-09-26 北京达佳互联信息技术有限公司 Verification method, verification device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN108990059B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN108990059A (en) A kind of verification method and device
CN107592292B (en) A kind of block chain communication method between nodes and device
CN107196989B (en) A kind of processing method and processing device of service request
CN107241688A (en) Signature, verification method, device and the storage medium of application installation package
EP2903389A1 (en) Method for keeping subscriber identity module cards on standby and terminal equipment
CN110175828A (en) User's verification method and device based on the signing of bank card quick payment
KR20170015462A (en) Methods and apparatus for establishing a secure communication channel
CN108055132A (en) The method, apparatus and equipment of a kind of service authorization
CN107026832A (en) Account logon method, equipment and server
CN106792637B (en) International mobile equipment identification number wiring method, device and mobile terminal
CN106384042B (en) A kind of electronic equipment and security system
CN105678192A (en) Smart card based secret key application method and application apparatus
CN103581154A (en) Authentication method and device in system of Internet of Things
CN109274684A (en) The internet-of-things terminal system and its implementation being integrated based on eSIM communication with navigation Service
US11758404B2 (en) System and process for locking a subscriber identity module (SIM) card to a wireless device
CN108400902A (en) A kind of method, apparatus and equipment of gray scale test
CN104104650B (en) data file access method and terminal device
Stach How to assure privacy on android phones and devices?
CN108616361A (en) A kind of method and device of identification equipment uniqueness
CN107678834A (en) A kind of Android simulator detection method and device based on hardware configuration
CN105391714A (en) Automatic signature and verification method and apparatus for mobile application
CN111600882A (en) Block chain-based account password management method and device and electronic equipment
CN109039676A (en) A kind of network fault diagnosis method, device and computer readable storage medium
CN106203016B (en) A kind of terminal processing method and equipment
CN111355583B (en) Service providing system, method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40001436

Country of ref document: HK

TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant