CN110503756A - A kind of information processing method, device, storage medium and mobile terminal - Google Patents

A kind of information processing method, device, storage medium and mobile terminal Download PDF

Info

Publication number
CN110503756A
CN110503756A CN201910784880.9A CN201910784880A CN110503756A CN 110503756 A CN110503756 A CN 110503756A CN 201910784880 A CN201910784880 A CN 201910784880A CN 110503756 A CN110503756 A CN 110503756A
Authority
CN
China
Prior art keywords
information
identity
user
registration
background system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910784880.9A
Other languages
Chinese (zh)
Inventor
马文超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910784880.9A priority Critical patent/CN110503756A/en
Publication of CN110503756A publication Critical patent/CN110503756A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

This application involves a kind of information processing methods, device, storage medium and mobile terminal, first identity information of this method in acquisition user, and it is based on first identity information, after carrying out customer identity registration to the target background system by the registration entrance of target background system, and gate inhibition is opened not directly to user, but further obtain the location information of customer mobile terminal, and the location information target background system is sent to by the registration entrance, in this way, it may make that being based on the location information in target background system verifies user location, and access control is carried out according to verification result.On the basis of user completes identity registration, the application combination customer position information carries out access control, it is clear that can be avoided opening gate in the case where remote login, to improve the safety in unmanned shop etc..

Description

A kind of information processing method, device, storage medium and mobile terminal
Technical field
The application belongs to the super user identity authentication of quotient and rights management techniques field more particularly to a kind of information processing side Method, device, storage medium and mobile terminal.
Background technique
With gradualling mature for the emerging technologies such as artificial intelligence, machine vision and mobile payment, with unmanned retail for generation The new retail of table receives the concern of major electric business platform and famous brand name, this accordingly makes unmanned shop be increasingly becoming the whole world zero A kind of new trend of industry is sold, unmanned shop has barcode scanning and opens the door, freely chooses, can save the features such as payment queuing time, phase Than for conventional store more conveniently and quickly.
Unmanned shop is in practical applications, it usually needs client carry out identity registration, in order to the information based on registration into User tracking under the certification identification of row client identity and customer action unusual condition.Currently, when carrying out client identity registration, Registration is usually realized by the two dimensional code in customer scans shop, and opens gate inhibition, but the peace of which to client after the registration is finished Full property is poor, in shop two dimensional code be photographed, remote login in the case where open gate inhibition to registration user and not can guarantee unmanned quotient The safety in shop.
Summary of the invention
In view of this, the application be designed to provide a kind of information processing method, device, storage medium and it is mobile eventually End, it is intended to for the application scenarios such as unmanned shop, realize the place of a kind of higher customer identity registration of safety and access control Reason scheme.
For this purpose, the application is disclosed directly below technical solution:
A kind of information processing method is applied to mobile terminal, this method comprises:
Obtain the registration entrance of target background system;
The instruction of the first identity information acquisition is obtained, and acquires the first identity information of user;
Based on first identity information, user identity note is carried out to the target background system by the registration entrance Volume;
After the registration is finished, the location information of the mobile terminal is obtained;
The location information is sent to the target background system by the registration entrance, so that after the target Platform system is based on the location information and carries out access control.
The above method, it is preferred that this method is applied in the system of real name terminal applies on the mobile terminal, described to adopt Collect the first identity information of user, comprising:
Acquire at least portion in the system of real name terminal applies of the mobile terminal in registered subscriber identity information Divide subscriber identity information;
It is described to be based on first identity information, identity note is carried out to the target background system by the registration entrance Volume, comprising:
Generate the first identity for corresponding at least partly user's identity information;
First identity is sent to the target background system by the registration entrance, so that being based on institute It states the first identity and carries out identity registration in the target background system.
The above method, it is preferred that this method it is described by the registration entrance location information is sent to it is described After target background system, further includes:
The target background system is obtained to the feedback information of the location information;
If the feedback information indicates that the location information by verifying, is transferred and shows an access control control, and control It makes the access control control and is in operable state.
The above method, it is preferred that this method is after the control access control control is in operable state, also Include:
An open command is generated if receiving to the operation information of the access control control, and sends the unlatching and refers to It enables to the target background system, so that the target background system access control is opened;
If not receiving the operation information to the access control control beyond the first scheduled duration, the gate inhibition is controlled Control control is in non-operable state.
The above method, it is preferred that this method further include:
The number of operations of the access control control of the detection in operable state, if the number of operations reaches predetermined Number then controls the access control control and is in non-operable state;
And/or
In the case where the access control control is in non-operable state, if in the second scheduled duration again by The access control control is transferred and shown to the registration entrance of the target background system, then controls at the access control control In non-operable state, the access control control is controlled when until reaching second scheduled duration and is in operable state.
The above method, it is preferred that this method instructs and acquire the first of user in the first identity information acquisition of the acquisition Before identity information, further includes:
It generates and shows an authority request for being used to request to obtain subscriber identity information acquisition permission;
The response message for corresponding to the authority request is obtained, if response message characterization allows to obtain user identity letter The step of breath acquisition permission, triggering the first identity information acquisition of the acquisition instructs and acquires the first identity information of user.
The above method, it is preferred that first identity information is non-biometric information;
This method is after the registration entrance for obtaining target background system, further includes:
Display one includes at least the prompting interface of the first acquisition mode, the second acquisition mode;
If detecting the operation information for selecting first acquisition mode, the first identity information acquisition of the acquisition is triggered The step of instructing and acquiring the first identity information of user;
If detecting the operation information for selecting second acquisition mode, the instruction of the second identity information acquisition is obtained, and The second identity information of user is acquired, second identity information includes the biological information of user;It generates described in corresponding to Second identity and the biological information are sent to the target by the second identity of the second identity information Background system, so that carrying out body in the target background system based on second identity and the biological information Part registration.
A kind of information processing unit, is applied to mobile terminal, which includes:
First acquisition unit, for obtaining the registration entrance of target background system;
Acquisition unit for obtaining the instruction of the first identity information acquisition, and acquires the first identity information of user;
Registering unit, for being based on first identity information, by the registration entrance to the target background system Carry out customer identity registration;
Second acquisition unit, for after the registration is finished, obtaining the location information of the mobile terminal;
Transmission unit, for the location information to be sent to the target background system by the registration entrance, with So that the target background system is based on the location information and carries out access control.
A kind of storage medium is at least stored with one group of instruction set in the storage medium;The instruction set is being called and is executing When, it can be used to execute method as described above.
A kind of mobile terminal, comprising:
Memory, at least storing one group of instruction set;
Processor is executed for calling and executing the described instruction collection in the memory by executing described instruction collection Method as described above.
As it can be seen from the above scheme information processing method provided by the present application, device, storage medium and mobile terminal, are being adopted Collect the first identity information of user, and be based on first identity information, by the registration entrance of target background system to described After target background system carries out customer identity registration, and not directly to the open gate inhibition of user, but further obtain user The location information of mobile terminal, and the location information has been sent to target background system by the registration entrance, in this way, can User location is verified so that being based on the location information in target background system, and gate inhibition's control is carried out according to verification result System.On the basis of user completes identity registration, the application combination customer position information carries out access control, it is clear that can be avoided Opening gate in the case where remote login, to improve the safety in unmanned shop etc..
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 2 be one alternative embodiment of the application provide based on interacting progress between mobile terminal and target background system A kind of processing logical schematic of customer identity registration and access control;
Fig. 3 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 4 be one alternative embodiment of the application provide based on interacting progress between mobile terminal and target background system Another processing logical schematic of customer identity registration and access control;
Fig. 5 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 6 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 7 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 8 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 9 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Figure 10 be one alternative embodiment of the application provide based on the interaction between mobile terminal and target background system into Another of row customer identity registration and access control handle logical schematic;
Figure 11 is a kind of structural schematic diagram for the information processing unit that one alternative embodiment of the application provides;
Figure 12 is another structural schematic diagram for the information processing unit that one alternative embodiment of the application provides;
Figure 13 is another structural schematic diagram for the information processing unit that one alternative embodiment of the application provides;
Figure 14 is the yet another construction schematic diagram for the information processing unit that one alternative embodiment of the application provides;
Figure 15 is a kind of structural schematic diagram for the mobile terminal that one alternative embodiment of the application provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
This application provides a kind of information processing method, device, storage medium and mobile terminals, for being directed to unmanned quotient The application scenarios such as shop realize the processing scheme of a kind of higher customer identity registration of safety and access control.It will pass through below The information processing method of the application, device, storage medium and mobile terminal is described in detail in multiple embodiments.
In one alternative embodiment of the application, a kind of information processing method is disclosed, which can apply In mobile terminal, the mobile terminal that this method is applicable in can include but is not limited to smart phone, tablet computer, Intelligent wearable The terminal devices such as equipment (such as Intelligent bracelet/foot ring), number assistant.More specifically, can using terminal applies, Any one form such as web application, applet/application plug-in or terminal local function, on mobile terminals to the application The information processing method carry out function realization.
The flow diagram of the information processing method shown refering to fig. 1, the information processing method may include following place Reason process:
Step 101, the registration entrance for obtaining target background system.
The scene that the application is faced is mainly the customer identity registration and access control field of unmanned shop, unmanned supermarket etc. Scape, the target background system are then unmanned shop, unmanned supermarket etc. at least providing customer identity registration function and door Prohibit the background system of control function, in addition to these functions, usually, which can also provide user information and test Card (user information verifying when such as progress commodity payment and settlement), merchandise news record are (such as record type of merchandize, quantity, quotient Product state (for sale/to have sold), commodity transaction information), the functions such as payment and settlement.The system can be by unmanned shop, nobody surpasses The system that city is safeguarded in local server, be also possible to by unmanned shop, unmanned supermarket's trustship beyond the clouds for providing The service system of above-mentioned function.
The registration entrance, usually, what can be provided for the target background system has customer identity registration function The register interface of energy, the registration entrance can specifically be transferred by accordingly registering access information provided by target background system. The registration access information, illustratively, such as can be but not limited to the offer of target background system for connecting or recall institute State a URL (Uniform Resource Locator, the uniform resource locator) network address or two dimension of customer identity registration function Code etc., versatility in view of two dimensional code and operation convenience feature, in the present embodiment, it is preferable that it is described register access information as For recalling the two dimensional code of the customer identity registration function provided by the target background system.
To which its movement can be utilized when user has for a certain unmanned shop/unmanned supermarket identity registration demand Terminal is scanned for recalling the two dimensional code of information registering function provided by unmanned shop/unmanned supermarket, and mobile terminal is obtaining After code scaning information, the information can be parsed, accordingly obtains the address information of unmanned shop/unmanned supermarket registration entrance, Jin Erji Customer identity registration function interface provided by unmanned shop/unmanned supermarket background system is recalled in the address information.
It should be noted that user can scan displaying in unmanned shop/unmanned supermarket doorway two dimension in practical application Code carries out identity registration, it is of course also possible to first pass through the two dimensional code photo for taking pictures or receiving forwarding or reception flyer in advance Etc. forms, obtain unmanned shop/unmanned supermarket two-dimensional barcode information, it is subsequent then can be using remote mode by scanning unmanned quotient Shop/unmanned supermarket two dimensional code photo or leaflet carry out customer identity registration to recall the customer identity registration function interface.
Step 102 obtains the instruction of the first identity information acquisition, and acquires the first identity information of user.
In the registration entrance for obtaining target background system, unmanned shop/unmanned supermarket customer identity registration function is such as recalled Behind energy interface, registration entrance acquisition subscriber identity information (i.e. described first identity of such as interface form can be based further on Information), in order to carry out customer identity registration.
Wherein, acquire the first identity information of user specific implementation form can be it is diversified, as a kind of possibility Implementation, can by user manually mobile terminal present customer identity registration function interface on input its user's surname The personal information such as name, contact method, the means of payment and/or payment account, and further interface behaviour is carried out after completing input Make, such as press " registration " or " confirmation " function button on interface, mobile terminal is after detecting the operation information of the operation The first identity information acquisition instruction, and the every terms of information based on instruction acquisition user input can be triggered.
It, can also be automatic to touch by mobile terminal when recalling the registration entrance as alternatively possible implementation Instruction of sending out the first identity information acquisition described, and in response to the instruction, automatic collection user for carrying out the phase of identity registration Information is closed, which will be described in detail below.
Step 103 is based on first identity information, is used by the registration entrance to the target background system Family identity registration.
After collecting the first identity information of user, be based further on first identity information, by it is described register into Mouth carries out customer identity registration to the target background system.More specifically, for example, referring to Fig.2, can be entered by the registration Mouthful, the personal information such as the address name of acquisition, contact method, the means of payment and/or payment account are sent to by institute based on network Target background system is stated, the customer identity registration in target background system is realized with this.
Step 104, after the registration is finished, obtains the location information of the mobile terminal.
In the present embodiment, " registration should be completed " and refer to the customer identity registration success on the target background system.
In being different from the prior art, unmanned shop/unmanned supermarket background system is just straight after user completes identity registration Connect this implementation that gate inhibition's (directly automatically controlling unmanned shop/unmanned supermarket gate inhibition to open) is opened to user, this Shen Please in, after the registration is finished, and opened not directly to the open gate inhibition of user, access control, but it is mobile further to obtain user The location information of terminal, and accordingly carry out the access control on the basis of location information verification.
Correspondingly, for the mobile terminal of user, after the registration is finished, can further acquisition terminal it is current Location information can such as use but be not limited to GPS (Global Positioning System, global positioning system) positioning skill Art or base station location technology etc. carry out the current location information of acquisition terminal, higher in view of current GPS positioning technology precision, can be excellent First use the position acquisition based on GPS.
Certainly, if registration failure, such as required registration information is not collected, then will not trigger the acquisition mobile terminal Location information the step of.
The location information is sent to the target background system by the registration entrance by step 105, so that institute It states target background system and is based on location information progress access control.
After acquisition obtains the current location information of the mobile terminal, as shown in Fig. 2, can continue through it is described register into The location information is sent to the target background system by mouth, so that the target background system is based on the location information Carry out access control.
The position of customer mobile terminal is equivalent to be position that user is presently in, and target background system is obtaining the position Confidence breath after, can the location information based on acquisition to user carry out location verification, wherein can specifically will acquire the position letter Breath be compared with location information (unmanned shop/unmanned supermarket position) preset in system, if the two unanimously or two kinds of positions Confidence ceases the deviation of characterized position in permitted deviation range, then determines that the location information of user passes through verifying, That is, can show that user does not carry out remote login, it is thus possible to open gate inhibition to user, such as by the target background system The unmanned shop corresponding to it/nobody gate inhibition for exceeding the time limit is directly controlled to open etc..
Conversely, if the deviation for the position that the two is inconsistent or two kinds of location informations are characterized is beyond permitted deviation model It encloses, then determines that the location information of user is unverified, caused by which has usually carried out remote login because of user, this Kind in the case of, then not to user open gate inhibition, do not control unmanned shop/nobody exceed the time limit gate inhibition unlatching, unmanned quotient is ensured with this The safety of shop/unmanned supermarket.
As it can be seen from the above scheme information processing method provided by the present application, in the first identity information of acquisition user, and base In first identity information, user identity note is carried out to the target background system by the registration entrance of target background system After volume, and not directly to the open gate inhibition of user, but the location information of customer mobile terminal is further obtained, and by the position Confidence breath has been sent to target background system by the registration entrance, is based on the position in target background system in this way, may make Confidence breath verifies user location, and carries out access control according to verification result.The basis of identity registration is completed in user On, the application combination customer position information carries out access control, it is clear that it can be avoided opening gate in the case where remote login, To improve the safety in unmanned shop etc..
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 3, at the information Reason method can be realized further by following treatment process:
Step 301, the registration entrance for obtaining target background system.
As described above, the registration entrance of the target background system, can be in unmanned public safety, and unmanned shop/ With the register interface of customer identity registration function provided by the background system of unmanned supermarket.Wherein it is possible to using but it is unlimited In the address the URL instruction for requesting the interface content of pages or scan the side of its two dimensional code (such as short range scanning or remote scanning) Formula, to recall the interface.
Step 302 obtains the instruction of the first identity information acquisition, acquires in the system of real name terminal applies of the mobile terminal At least partly user identity information in the subscriber identity information of registration.
Based on user's right, transaction security, management all various aspects such as convenience consideration, currently, having been introduced more The system of real name terminal applies of kind facing moving terminal (certain end PC also can be used), such as wechat, Alipay, these applications are logical The real name identity information for often acquiring and storing user when user carries out identity registration or in use process, as system of real name is answered With account, address name, user mobile phone number, and/or associated bank card account number etc..
In consideration of it, for the convenience used, when the application is embodied, it is preferable that applet, application can be used The processing function of the application method is embodied as one in the systems of real name terminal applies such as wechat, Alipay by the form of plug-in unit A small routine or plug-in unit thus can carry out nothing by the subscriber identity information acquired in these system of real name terminal applies Relevant treatment needed for the scenes such as people's retail, such as backstage identity registration, authentication, automatic payment.Certain practical application In, unmanned shop/unmanned supermarket side and corresponding system of real name may be related to using the agreement and cooperation between operator, here No longer this is described in detail.
For the implementation, substantially, mobile terminal is by the application platform by corresponding system of real name terminal applies (such as wechat platform, Alipay platform) is interacted with unmanned shop/unmanned supermarket background system, Lai Shixian user identity The relevant treatments such as registration.Wherein, user can be first in the small routine of corresponding system of real name terminal applies by scanning unmanned quotient Shop/unmanned supermarket two dimensional code recalls it and registers entrance (function interface for being provided with registering functional), due to the real name at place Usually there is subscriber identity information in terminal applies processed, it, can be first described in automatic trigger thus after recalling the registration entrance Identity information acquisition instruction, and the instruction is responded, the relative users body having had in system of real name terminal applies described in automatic collection Part information is as first identity information, without being manually entered one by one by user again, to promote the convenience of user's operation And the information collection efficiency of terminal.
First identity information of the automatic collection can be the user identity having had in the system of real name terminal applies of user At least part of the information in information can specifically include but be not limited to system of real name terminal applies account, user mobile phone number and/or institute Associated bank card account etc., certainly, if the subscriber identity information acquired from system of real name terminal applies is not comprehensive enough or is not inconsistent It closes and requires (not collecting any effective payment account such as), this can also be not added by the manual amended record of user, the present embodiment It limits.
Step 303 generates the first identity for corresponding at least partly user's identity information.
In system of real name application account, user mobile phone number and/or the associated bank card account etc. for collecting user After first identity information, as a kind of possible embodiment, directly these information can be sent to by the registration entrance The target background system of current unmanned shop/unmanned supermarket, to carry out subscriber identity information registration.
In practical application, certain unmanned shops/unmanned supermarket may be not fully credible, for a user, if user Identity information is obtained by various unmanned shop/unmanned supermarket background system, and if lacking effectively supervision, user identity There is the risk being compromised in information, be based on this consideration, and the present embodiment provides be on unmanned shop/unmanned supermarket target backstage System carries out another implementation of customer identity registration, which believes specific to first identity collected Breath generates unique first identity for it, which can be User ID, subscriber-coded, Or first identity information is carried out using corresponding message digest algorithm (Message-Digest Algorithm, MDA) Calculate a resulting digest value.By generating corresponding first identity for the subscriber identity information of acquisition, come Hide user sensitive information.It is subsequent based on first identity rather than actual subscriber identity information is on the target backstage System carries out customer identity registration.
First identity is sent to the target background system by the registration entrance by step 304, so that It obtains and identity registration is carried out in the target background system based on first identity.
It, can be by the first body of user of acquisition after the first identity corresponding to its first identity information is generated for user Part information and the first identity of generation are bound, and refering to Fig. 4, by the registration entrance by the first identity mark Knowledge is sent to the target background system, in this manner it is possible to be based on the first identity (such as User ID, user identity The digest value etc. of information), user identity is carried out in unmanned shop/unmanned supermarket background system namely the target background system Registration, thus, for the target background system, first identity of only user is visible, and user System of real name application account, contact method, the actual identities information such as payment account, rdativery sensitive is then invisible, accordingly also just advises It has kept away and has been compromised risk.
But, it should be noted that the system of real name application end due to first identity in mobile terminal is and user What these true subscriber identity informations such as system of real name application account, contact method, payment account were mutually bound, hence for subsequent Payment and settlement, user's connection is (such as to some favor informations in limited time of user's push, when settling accounts abnormal to user feedback exception Information or user tracking) etc., unmanned shop/unmanned supermarket background system still is able to by the system of real name terminal applies Application platform (the application backstage of these terminal applies is comparatively more credible) obtains effective connection with user and can carry out just The processing such as normal payment and settlement, user tracking.
Step 305, after the registration is finished, obtains the location information of the mobile terminal.
As described above, after customer identity registration success, the directly not open gate inhibition of the target background system, control Gate inhibition opens, but further obtains the location information of customer mobile terminal, and carry out the gate inhibition on the basis of location information verification Control.
Correspondingly, for the mobile terminal of user, after the registration is finished, can further acquisition terminal it is current Location information.Certainly, if registration failure, such as required registration information is not collected, then it is mobile eventually will not to trigger the acquisition The step of location information at end.
The location information is sent to the target background system by the registration entrance by step 306.
After acquisition obtains the current location information of the mobile terminal, the registration entrance can be continued through by institute's rheme Confidence breath is sent to the target background system so that the target background system based on the location information of acquisition to user into Row location verification.
Wherein, as described above, target background system can pass through the location information for transmitting mobile terminal and preset position Confidence breath (unmanned shop/unmanned supermarket position) is compared, and verifies to realize to user location, wherein if the two The deviation for the position that consistent or two kinds of location informations are characterized then determines the location information of user in permitted deviation range By verifying, that is, can show that user does not carry out remote login, it is thus possible to gate inhibition be opened to user, conversely, then determining The location information of user is unverified, and such situation is often as caused by user carried out remote login, in order to true The safety of unmanned shop/unmanned supermarket is protected, accordingly access control is not opened.
Step 307 obtains the target background system to the feedback information of the location information.
After the location information of user passes through verifying, as a kind of possible implementation, can be by the target backstage System directly controls unmanned shop/unmanned supermarket gate inhibition unlatching, to allow user to enter in shop.
It, can also be from the target background system to user's in the present embodiment as alternatively possible implementation Mobile terminal sends one for characterizing user location by the feedback information of verifying, which can be form of message or refer to Enable form.
If step 308, the feedback information indicate that the location information by verifying, is transferred and shows an access control control Part, and control the access control control and be in operable state.
Mobile terminal is receiving the described anti-of the target background system such as the system of real name terminal applies of mobile terminal After feedforward information, transfers and show an access control control (control such as specifically can be a virtual door open button), and control The access control control is in operable state, is supported by user with this by operating the control come opening gate, that is, will The trigger action that gate inhibition opens is arranged in user terminal.
Step 309 generates an open command if receiving to the operation information of the access control control, and sends institute Open command is stated to the target background system, so that the target background system access control is opened.
If mobile terminal receives user to the operation information of the access control control, it is such as clicking or press on the gate inhibition The operation information etc. for controlling control, then generate an open command, and sends the instruction to the target background system, target backstage System can trigger the control to gate inhibition because responding the instruction, and control unmanned shop/unmanned supermarket gate inhibition unlatching, to allow User enters.
It should be noted that in user into behind shop, generally automatically controlling gate inhibition's closing by target background system, it is exemplary Ground, target background system can specifically be carried out based on timing (timing duration reaches the setting duration for being sufficient to make user to enter in shop) Gate inhibition closes control, or is also based on monitoring (detect user into shop behavior) and carries out gate inhibition and close to control etc..
The present embodiment carries out access control on the basis of completing customer identity registration, in conjunction with customer position information, can Opening gate in the case where remote login is avoided, the safety in unmanned shop is improved.In addition, the present embodiment is by mobile whole System of real name terminal applies on end are implemented the application method, improve the application method application when convenience, and Identity note is carried out with the user real identification information of the identification informations replacement acquisition such as User ID in system of real name terminal applies Volume, can effectively hide user sensitive information, avoid user sensitive information after the low unmanned shop of trusting degree/unmanned supermarket Leakage of information risk in platform system.
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 5, at the information Reason method can also include following processing:
If step 310 does not receive the operation information to the access control control beyond the first scheduled duration, control The access control control is in non-operable state.
In the present embodiment, if exceeding the first scheduled duration, such as 30s or 60s, user is not received to the access control The operation information of control then controls the access control control and is in non-operable state, that is, controls the access control control Failure.
User can be effectively prevented in this way due to offhand decision does not enter shop/supermarket far from the case where, to gate inhibition's It opens by mistake and opens, further ensure the safety of unmanned shop/unmanned supermarket.It is subsequent, if user determines into unmanned shop/nothing again People supermarket does shopping, then the access control control of operable state can be recalled again by the registration entrance, that is, quite The access control control is activated in the two dimensional code by scanning target background system again.
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 6, at the information Reason method can also include following processing:
The number of operations of the access control control of step 311, detection in operable state, if the number of operations Reach pre-determined number, then controls the access control control and be in non-operable state.
For in principle, unmanned shop/unmanned supermarket is people registration, a people into shop, it is contemplated that in practical application, Often there is kinsfolk or companion together into the situation in shop, can also suitably relax the limitation, for example, people registration, a few people into Shop etc., but in order to avoid people registration, excessive people are chaotic into personnel caused by shop, are difficult to manage (this also just further increasing Add security risk) the case where, in specific implementation, the maximum of the access control control in operable state can be limited Number of operations, wherein if the number of operations of access control control reaches preset maximum number of operations, such as 3 times, then described in control Access control control is in non-operable state, that is, the activation each time of access control control is all to have number of operations limitation , access control control fails if the maximum number of operations for reaching preset.
The numerical value of the maximum number of operations can according to demand be configured it by the administrative staff of target background system.
Through this process, it can effectively prevent the phenomenon that people registration, excessive people are into shop generation, e.g., avoid people note After volume success, the operation access control control (operating outdoors or in door) of no maximum carrys out continuous opening gate, allow it is excessive not Accredited personnel can accordingly reduce unmanned shop/unmanned supermarket security risk into shop etc..
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 7, at the information Reason method can also include following processing:
Step 312, in the case where the access control control is in non-operable state, if in the second scheduled duration The access control control is transferred and shown again by the registration entrance of the target background system, then controls gate inhibition's control Control processed is in non-operable state, and the access control control is controlled when until reaching second scheduled duration and is in and can grasp Make state.
As described above, in the failure of access control control, (such as user does not operate access control control because temporarily busy, causes Its time-out failure) after, it, can be again by the registration entrance if user still has into unmanned shop/unmanned supermarket demand The access control control of operable state is recalled, that is, can be by being scanned described in the two dimensional code activation of target background system again Access control control.Wherein, which may is that scan the two-dimensional code after, when will be registered by mobile terminal Generated first identity and terminal positional information are sent to target background system, after the location information is by target After the verifying of platform system, mobile terminal can receive the feedback information that the expression of target background system transmission is verified, in turn The access control control can be activated again, controlled it and be in operable state.
For this function of activating access control control again, multiple barcode scanning in people's short time, is let off in order to prevent The phenomenon that more people are into shop occurs and (and then causes personnel chaotic, it is difficult to manage, accordingly also increase security risk), and the present embodiment is The function is provided with minimum interval when access control control repeatedly activates, such as 5 minutes, 10 minutes, thus, described Access control control is in non-operable state namely failed situation, if in the corresponding second pre- timing of the time interval Registration entrance in long again by the target background system is transferred and shows the access control control, that is, leading to again It crosses barcode scanning and activates the access control control, then control the access control control and be in non-operable state, until reaching institute The access control control is just controlled when stating the second scheduled duration is in operable state.It can avoid a people to a certain extent in this way Multiple barcode scanning in short time, the phenomenon that letting off more people into shop generation.
In specific implementation, duration, base are effectively operated based on control in combination with using above-mentioned provided by the embodiment of the present application In number, the control strategy based on the time interval etc. between adjacent activation twice, unmanned shop/unmanned supermarket gate inhibition is controlled Control processed carries out state control, on the basis of ensuring user's legitimate rights and interests, while guaranteeing unmanned shop/nobody is super as far as possible The operation security in city.
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 8, at the information Reason method can also include following processing between the step 101 and the step 102:
Step 801 generates and shows an authority request for being used to request to obtain subscriber identity information acquisition permission.
Step 802 obtains the response message for corresponding to the authority request, if response message characterization allows to be used Family identity information acquisition permission triggers first identity information acquisition that obtains and instructs and the first identity information for acquiring user Step.
In specific implementation, after the registration entrance for obtaining target background system, and the system of real name for acquiring user is answered Before first identity informations such as account, contact method and/or associated bank card account, user can also be requested to weigh first Limit, and specifically on customer mobile terminal, show that one is used on such as small routine interface of the system of real name terminal applies The solicited message of family permission, later, can by detection user response corresponding operating performed by the request (such as user presses " permission " button, or press " refusal " button) operation information, to determine whether to get the power of acquisition subscriber identity information Limit just continues to acquire subscriber identity information, and execute use only in the case where getting the permission of acquisition subscriber identity information Otherwise family identity registration process then terminates user identity in the register flow path of target background system.
The present embodiment requests user right before acquiring subscriber identity information first, it is ensured that under the premise of user's authorization The acquisition for carrying out user's related identification information, can further promote the safety of user information, in addition, also improving user's participation Degree, can at least improve the use feeling to the more sensitive user of self-identity information.
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 9, at the information Reason method can also include following processing after the registration entrance that the step 101 obtains target background system:
Step 901, display one include at least the prompting interface of the first acquisition mode, the second acquisition mode.
The unmanned public safety of unmanned shop/unmanned supermarket etc., will necessarily be related to the payment and settlement of commodity, tie in payment In calculation field, effective, the convenient and fast means of payment of one kind is the payment and settlement based on biological information (face, fingerprint), such as brush face branch Pay etc..Which is associated with payment account by user biological information in advance, such as by user's human face data and Alipay account or Bank card account is associated etc., subsequent to trigger payment and settlement process by biological informations such as acquisition faces, has convenient, fast Prompt advantage.
The payment and settlement based on biological information, need on it is registered in advance have the biological information of user premised on, this is just needed User biological information is acquired in advance when user carries out identity registration to target background system.In practical application, it is contemplated that one The quick payment demand of certain customers and another part user, can be in unmanned shop/nothings to the sensitive feature of its biological information On the registration entrance of the background system of people supermarket, while providing and corresponding to conventional payment clearing form (payment of brush bank card, scanning Two dimensional code payment) the first acquisition mode, and corresponding to the of the above-mentioned quick payment clearing form based on biological information Two acquisition modes, for selection by the user.
Wherein, first acquisition mode, it is only necessary to acquire system of real name terminal applies account, contact method and/or the pass of user The non-biometrics information such as bank card account of connection, and these the abiotic spies of second acquisition mode in addition to user need to be acquired Reference breath, it is also necessary at least one of user of acquisition biological information, such as face information, finger print information.
To after recalling its registration entrance, show first in the unmanned shop of scanning input/unmanned supermarket two dimensional code One includes at least the prompting interface of first acquisition mode, the second acquisition mode, to prompt user to select a certain kind therein Mode carries out identity information acquisition.
If step 902 detects the operation information for selecting first acquisition mode, the first identity of the acquisition is triggered The step of information collection instructs and acquires the first identity information of user.
Wherein, if detecting, user selects the operation information of first acquisition mode (to correspond to described first as clicked The operation button of acquisition mode), then mobile terminal is triggered, as triggered the little Cheng in a certain system of real name terminal applies of mobile terminal Sequence acquires registered system of real name terminal applies account, contact method and/or associated bank in the system of real name terminal applies The non-biometrics information such as card account.
It is subsequent to carry out customer identity registration based on these non-biometric information, it such as generates and corresponds to these abiotic spies First identity is simultaneously registered to target background system etc. by the first identity of reference breath;In this mode, work as user After shopping, by brush bank card or it the payment and settlement that modes carry out commodity such as can scan the two-dimensional code.
If step 903 detects the operation information for selecting second acquisition mode, the second identity information acquisition is obtained Instruction, and the second identity information of user is acquired, second identity information includes the biological information of user;It generates and corresponds to In the second identity of second identity information, second identity and the biological information are sent to institute Target background system is stated, so that based on second identity and the biological information in the target background system Carry out identity registration.
If detecting, user selects the operation information of second acquisition mode (to correspond to the second acquisition side as clicked The operation button of formula), then as shown in Figure 10, in addition to triggering mobile terminal acquires registered reality in the system of real name terminal applies The non-biometrics information such as name terminal applies account, contact method and/or associated bank card account processed, while also triggering shifting The physical characteristics collectings devices such as the camera or fingerprint sensor of dynamic terminal are opened, and face or fingerprint for acquiring user etc. is raw Object characteristic information.
After acquisition obtains these non-biometrics and biological information, to hide user sensitive information, mobile terminal The second identity corresponding to these information can be generated, which equally can be User ID, a user Coding calculates resulting digest value to the identity information of acquisition based on corresponding message digest algorithm, and refering to fig. 10, and can will Second identity generated and the biological information are transmitted to target background system together, thus, in this case, Specifically customer identity registration can be carried out based on the biological information of second identity and user.In the base for completing registration It is subsequent to trigger the payment and settlement process to purchased commodity by acquiring the biological information of user on plinth, specifically, than Such as, can be in the one or more settlement systems with camera of payment region setting in shop, or can also only be arranged one Or multiple cameras, and these cameras are connected with backstage settlement system, so as to trigger payment by acquisition face Settlement information (such as payment amount) is transmitted to pair by settlement process, settlement system after collecting the biological informations such as face It should be in the system of real name terminal applies of the mobile terminal of the human face data, in this way, can be in the system of real name terminal applies of mobile terminal In (being substantially to be executed the processing by means of the application platform of system of real name terminal applies), the biological characteristic that gets and specify The payment account of information binding, and then payment and settlement is carried out based on the payment account.Compared to brush bank card or scan the two-dimensional code Equal payment and settlements mode, which are apparently more convenient, fast.
In addition, it is necessary to explanation, if user, which has been based on above-mentioned first acquisition mode, has registered it to target background system Non-biometric information, at subsequent any moment, if user is based on the considerations of convenient payment, (such as user continually accesses a certain nothing People does shopping in shop or user is after accessing a certain unfamiliar shop, generates interest to it, consequently, it is possible to consider to The background system renewal of registration in the shop its biological information), it needs further register its biological information to target background system, then uses Family (can scan the two-dimensional code such as in shop or outside shop by entering the registration entrance of the target background system and transfer target background system Registration entrance etc.), to biological informations such as target background system amended record its human face datas, in order to support its subsequent base It is settled accounts in the quick payment of biological information.
The present embodiment is provided simultaneously by the registration entrance in target background system and is only used for acquisition user's non-biometric Second acquisition side of the first acquisition mode of information and non-biometric information and biological information for acquiring user Formula, not only can satisfy the identity registration demand of the acquisition more user of sensitivity to its biological information, but also can satisfy tool There is the identity registration demand of the user of quick payment demand, may make user that there is preferably experience.
Corresponding to above-mentioned information processing method, the embodiment of the present application also discloses a kind of information processing unit, refering to figure The structural schematic diagram of information processing unit shown in 11, in one alternative embodiment of the application, the apparatus may include:
First acquisition unit 1101, for obtaining the registration entrance of target background system.
The registration entrance, usually, what can be provided for the target background system has customer identity registration function The register interface of energy, the registration entrance can specifically be transferred by accordingly registering access information provided by target background system. The registration access information, illustratively, such as can be but not limited to the offer of target background system for connecting or recall institute A URL network address or the two dimensional code etc. for stating customer identity registration function, versatility and operation convenience feature in view of two dimensional code, this In embodiment, it is preferable that described to register access information to be used to recall user's body provided by the target background system The two dimensional code of part registering functional.
To which its movement can be utilized when user has for a certain unmanned shop/unmanned supermarket identity registration demand Terminal is scanned for recalling the two dimensional code of information registering function provided by unmanned shop/unmanned supermarket, and mobile terminal is obtaining After code scaning information, the information can be parsed, accordingly obtains the address information of unmanned shop/unmanned supermarket registration entrance, Jin Erji Customer identity registration function interface provided by unmanned shop/unmanned supermarket background system is recalled in the address information.
Acquisition unit 1102 for obtaining the instruction of the first identity information acquisition, and acquires the first identity information of user.
In the registration entrance for obtaining target background system, unmanned shop/unmanned supermarket customer identity registration function is such as recalled Behind energy interface, registration entrance acquisition subscriber identity information (i.e. described first identity of such as interface form can be based further on Information), in order to carry out customer identity registration.
Wherein, acquire the first identity information of user specific implementation form can be it is diversified, as a kind of possibility Implementation, can by user manually mobile terminal present customer identity registration function interface on input its user's surname The personal information such as name, contact method, the means of payment and/or payment account, and further interface behaviour is carried out after completing input Make, such as press " registration " or " confirmation " function button on interface, mobile terminal is after detecting the operation information of the operation The first identity information acquisition instruction, and the every terms of information based on instruction acquisition user input can be triggered.
It, can also be automatic to touch by mobile terminal when recalling the registration entrance as alternatively possible implementation Instruction of sending out the first identity information acquisition described, and in response to the instruction, automatic collection user for carrying out the phase of identity registration Information is closed, which will be described in detail below.
Registering unit 1103, for being based on first identity information, by the registration entrance to the target from the background System carries out customer identity registration.
After collecting the first identity information of user, be based further on first identity information, by it is described register into Mouth carries out customer identity registration to the target background system.More specifically, for example, referring to Fig.2, can be entered by the registration Mouthful, the personal information such as the address name of acquisition, contact method, the means of payment and/or payment account are sent to by institute based on network Target background system is stated, the customer identity registration in target background system is realized with this.
Second acquisition unit 1104, for after the registration is finished, obtaining the location information of the mobile terminal.
In the application, after the registration is finished, and opened not directly to the open gate inhibition of user, access control, but further The location information of customer mobile terminal is obtained, and accordingly carries out the access control on the basis of location information verification.
Correspondingly, for the mobile terminal of user, after the registration is finished, can further acquisition terminal it is current Location information, such as GPS positioning technology or base station location technology can be used but be not limited to, carry out the current position letter of acquisition terminal Breath, it is higher in view of current GPS positioning technology precision, it can preferentially use the position acquisition based on GPS.
Certainly, if registration failure, such as required registration information is not collected, then will not trigger the acquisition mobile terminal Location information treatment process.
Transmission unit 1105, for the location information to be sent to the target backstage system by the registration entrance System, so that the target background system, which is based on the location information, carries out access control.
After acquisition obtains the current location information of the mobile terminal, as shown in Fig. 2, can continue through it is described register into The location information is sent to the target background system by mouth, so that the target background system is based on the location information Carry out access control.
The position of customer mobile terminal is equivalent to be position that user is presently in, and target background system is obtaining the position Confidence breath after, can the location information based on acquisition to user carry out location verification, wherein can specifically will acquire the position letter Breath be compared with location information (unmanned shop/unmanned supermarket position) preset in system, if the two unanimously or two kinds of positions Confidence ceases the deviation of characterized position in permitted deviation range, then determines that the location information of user passes through verifying, That is, can show that user does not carry out remote login, it is thus possible to open gate inhibition to user, such as by the target background system The unmanned shop corresponding to it/nobody gate inhibition for exceeding the time limit is directly controlled to open etc..
Conversely, if the deviation for the position that the two is inconsistent or two kinds of location informations are characterized is beyond permitted deviation model It encloses, then determines that the location information of user is unverified, caused by which has usually carried out remote login because of user, this Kind in the case of, then not to user open gate inhibition, do not control unmanned shop/nobody exceed the time limit gate inhibition unlatching, unmanned quotient is ensured with this The safety of shop/unmanned supermarket.
As it can be seen from the above scheme information processing unit provided by the present application, in the first identity information of acquisition user, and base In first identity information, user identity note is carried out to the target background system by the registration entrance of target background system After volume, and not directly to the open gate inhibition of user, but the location information of customer mobile terminal is further obtained, and by the position Confidence breath has been sent to target background system by the registration entrance, is based on the position in target background system in this way, may make Confidence breath verifies user location, and carries out access control according to verification result.The basis of identity registration is completed in user On, the application combination customer position information carries out access control, it is clear that it can be avoided opening gate in the case where remote login, To improve the safety in unmanned shop etc..
The function of respective handling unit realizes process in the information processing unit elaborated further below, in this Shen Please be in an optional embodiment of embodiment, the acquisition unit 1102 is specifically used for: acquiring the reality of the mobile terminal At least partly user identity information in name terminal applies processed in registered subscriber identity information.
For the convenience used, when the application is embodied, it is preferable that applet, application plug-in can be used Form, the little Cheng processing function of the application method being embodied as in the systems of real name terminal applies such as wechat, Alipay Sequence or plug-in unit thus can carry out unmanned retail by the subscriber identity information acquired in these system of real name terminal applies Etc. relevant treatment needed for scenes, such as backstage identity registration, authentication, automatic payment.It, may in certain practical application It can be related to unmanned shop/unmanned supermarket side and corresponding system of real name using the agreement and cooperation between operator, it is no longer right here This is described in detail.
For the implementation, substantially, mobile terminal is by the application platform by corresponding system of real name terminal applies (such as wechat platform, Alipay platform) is interacted with unmanned shop/unmanned supermarket background system, Lai Shixian user identity The relevant treatments such as registration.Wherein, user can be first in the small routine of corresponding system of real name terminal applies by scanning unmanned quotient Shop/unmanned supermarket two dimensional code recalls it and registers entrance (function interface for being provided with registering functional), due to the real name at place Usually there is subscriber identity information in terminal applies processed, it, can be first described in automatic trigger thus after recalling the registration entrance Identity information acquisition instruction, and the instruction is responded, the relative users body having had in system of real name terminal applies described in automatic collection Part information is as first identity information, without being manually entered one by one by user again, to promote the convenience of user's operation And the information collection efficiency of terminal.
First identity information of the automatic collection can be the user identity having had in the system of real name terminal applies of user At least part of the information in information can specifically include but be not limited to system of real name terminal applies account, user mobile phone number and/or institute Associated bank card account etc., certainly, if the subscriber identity information acquired from system of real name terminal applies is not comprehensive enough or is not inconsistent It closes and requires (not collecting any effective payment account such as), this can also be not added by the manual amended record of user, the present embodiment It limits.
The registering unit 1103, is specifically used for: generating the first body for corresponding at least partly user's identity information Part mark;First identity is sent to the target background system by the registration entrance, so that being based on institute It states the first identity and carries out identity registration in the target background system.
In practical application, certain unmanned shops/unmanned supermarket may be not fully credible, for a user, if user Identity information is obtained by various unmanned shop/unmanned supermarket background system, and if lacking effectively supervision, user identity There is the risk being compromised in information, be based on this consideration, and the present embodiment provides be on unmanned shop/unmanned supermarket target backstage System carries out another implementation of customer identity registration, which believes specific to first identity collected Breath generates unique first identity for it, which can be User ID, subscriber-coded, Or first identity information is carried out using corresponding message digest algorithm to calculate a resulting digest value.By for acquisition Subscriber identity information generate corresponding first identity, Lai Yinzang user sensitive information.It is subsequent based on this One identity rather than actual subscriber identity information carry out customer identity registration in the target background system.
It, can be by the first body of user of acquisition after the first identity corresponding to its first identity information is generated for user Part information and the first identity of generation are bound, and refering to Fig. 4, by the registration entrance by the first identity mark Knowledge is sent to the target background system, in this manner it is possible to be based on the first identity (such as User ID, user identity The digest value etc. of information), user identity is carried out in unmanned shop/unmanned supermarket background system namely the target background system Registration, thus, for the target background system, first identity of only user is visible, and user System of real name application account, contact method, the actual identities information such as payment account, rdativery sensitive is then invisible, accordingly also just advises It has kept away and has been compromised risk.
But, it should be noted that the system of real name application end due to first identity in mobile terminal is and user What these true subscriber identity informations such as system of real name application account, contact method, payment account were mutually bound, hence for subsequent Payment and settlement, user's connection is (such as to some favor informations in limited time of user's push, when settling accounts abnormal to user feedback exception Information or user tracking) etc., unmanned shop/unmanned supermarket background system still is able to by the system of real name terminal applies Application platform (the application backstage of these terminal applies is comparatively more credible) obtains effective connection with user and can carry out just The processing such as normal payment and settlement, user tracking.
On this basis, as shown in figure 12, the information processing unit can also include:
Third acquiring unit 1106, for obtaining the target background system to the feedback information of the location information.
Movement after the location information of user passes through verifying, in the present embodiment, from from the target background system to user Terminal sends one for characterizing user location by the feedback information of verifying, which can be form of message or instruction shape Formula.
Control control unit 1107, if indicating that the location information by verifying, is transferred and shown for the feedback information Show an access control control, and controls the access control control and be in operable state.
Mobile terminal is receiving the described anti-of the target background system such as the system of real name terminal applies of mobile terminal After feedforward information, transfers and show an access control control (control such as specifically can be a virtual door open button), and control The access control control is in operable state, is supported by user with this by operating the control come opening gate, that is, will The trigger action that gate inhibition opens is arranged in user terminal.
The transmission unit 1105 can be also used for the case where receiving the operation information to the access control control Under, an open command is generated, and send the open command to the target background system, so that the target background system Access control is opened.
If mobile terminal receives user to the operation information of the access control control, it is such as clicking or press on the gate inhibition The operation information etc. for controlling control, then generate an open command, and sends the instruction to the target background system, target backstage System can trigger the control to gate inhibition because responding the instruction, and control unmanned shop/unmanned supermarket gate inhibition unlatching, to allow User enters.
It should be noted that in user into behind shop, generally automatically controlling gate inhibition's closing by target background system, it is exemplary Ground, target background system can specifically be carried out based on timing (timing duration reaches the setting duration for being sufficient to make user to enter in shop) Gate inhibition closes control, or is also based on monitoring (detect user into shop behavior) and carries out gate inhibition and close to control etc..
The present embodiment carries out access control on the basis of completing customer identity registration, in conjunction with customer position information, can Opening gate in the case where remote login is avoided, the safety in unmanned shop is improved.In addition, the present embodiment is by mobile whole System of real name terminal applies on end are implemented the application method, improve the application method application when convenience, and Identity note is carried out with the user real identification information of the identification informations replacement acquisition such as User ID in system of real name terminal applies Volume, can effectively hide user sensitive information, avoid user sensitive information after the low unmanned shop of trusting degree/unmanned supermarket Leakage of information risk in platform system.
In one alternative embodiment of the application, the control control unit 1107 be can be also used for: predetermined beyond first In the case that duration does not receive the operation information to the access control control, control the access control control be in it is non-can Mode of operation.
In the present embodiment, if exceeding the first scheduled duration, such as 30s or 60s, user is not received to the access control The operation information of control then controls the access control control and is in non-operable state, that is, controls the access control control Failure.
User can be effectively prevented in this way due to offhand decision does not enter shop/supermarket far from the case where, to gate inhibition's It opens by mistake and opens, further ensure the safety of unmanned shop/unmanned supermarket.It is subsequent, if user determines into unmanned shop/nothing again People supermarket does shopping, then the access control control of operable state can be recalled again by the registration entrance, that is, quite The access control control is activated in the two dimensional code by scanning target background system again.
In one alternative embodiment of the application, the control control unit 1107 be can be also used for:
The number of operations of the access control control of the detection in operable state, if the number of operations reaches predetermined Number then controls the access control control and is in non-operable state.
For in principle, unmanned shop/unmanned supermarket is people registration, a people into shop, it is contemplated that in practical application, Often there is kinsfolk or companion together into the situation in shop, can also suitably relax the limitation, for example, people registration, a few people into Shop etc., but in order to avoid people registration, excessive people are chaotic into personnel caused by shop, are difficult to manage (this also just further increasing Add security risk) the case where, in specific implementation, the maximum of the access control control in operable state can be limited Number of operations, wherein if the number of operations of access control control reaches preset maximum number of operations, such as 3 times, then described in control Access control control is in non-operable state, that is, the activation each time of access control control is all to have number of operations limitation , access control control fails if the maximum number of operations for reaching preset.
The numerical value of the maximum number of operations can according to demand be configured it by the administrative staff of target background system.
Through this process, it can effectively prevent the phenomenon that people registration, excessive people are into shop generation, e.g., avoid people note After volume success, the operation access control control (operating outdoors or in door) of no maximum carrys out continuous opening gate, allow it is excessive not Accredited personnel can accordingly reduce unmanned shop/unmanned supermarket security risk into shop etc..
In one alternative embodiment of the application, the control control unit 1107 be can be also used for:
In the case where the access control control is in non-operable state, if in the second scheduled duration again by The access control control is transferred and shown to the registration entrance of the target background system, then controls at the access control control In non-operable state, the access control control is controlled when until reaching second scheduled duration and is in operable state.
As described above, in the failure of access control control, (such as user does not operate access control control because temporarily busy, causes Its time-out failure) after, it, can be again by the registration entrance if user still has into unmanned shop/unmanned supermarket demand The access control control of operable state is recalled, that is, can be by being scanned described in the two dimensional code activation of target background system again Access control control.Wherein, which may is that scan the two-dimensional code after, when will be registered by mobile terminal Generated first identity and terminal positional information are sent to target background system, after the location information is by target After the verifying of platform system, mobile terminal can receive the feedback information that the expression of target background system transmission is verified, in turn The access control control can be activated again, controlled it and be in operable state.
For this function of activating access control control again, multiple barcode scanning in people's short time, is let off in order to prevent The phenomenon that more people are into shop occurs and (and then causes personnel chaotic, it is difficult to manage, accordingly also increase security risk), and the present embodiment is The function is provided with minimum interval when access control control repeatedly activates, such as 5 minutes, 10 minutes, thus, described Access control control is in non-operable state namely failed situation, if in the corresponding second pre- timing of the time interval Registration entrance in long again by the target background system is transferred and shows the access control control, that is, leading to again It crosses barcode scanning and activates the access control control, then control the access control control and be in non-operable state, until reaching institute The access control control is just controlled when stating the second scheduled duration is in operable state.It can avoid a people to a certain extent in this way Multiple barcode scanning in short time, the phenomenon that letting off more people into shop generation.
In specific implementation, duration, base are effectively operated based on control in combination with using above-mentioned provided by the embodiment of the present application In number, the control strategy based on the time interval etc. between adjacent activation twice, unmanned shop/unmanned supermarket gate inhibition is controlled Control processed carries out state control, on the basis of ensuring user's legitimate rights and interests, while guaranteeing unmanned shop/nobody is super as far as possible The operation security in city.
In one alternative embodiment of the application, refering to fig. 1 shown in 3, which can also include:
Authority request unit 1108, is used for: generating and shows that one obtains subscriber identity information acquisition permission for requesting Authority request;The response message for corresponding to the authority request is obtained, if response message characterization allows to obtain user identity The step of information collection permission, triggering the first identity information acquisition of the acquisition instructs and acquires the first identity information of user.
In specific implementation, after the registration entrance for obtaining target background system, and the system of real name for acquiring user is answered Before first identity informations such as account, contact method and/or associated bank card account, user can also be requested to weigh first Limit, and specifically on customer mobile terminal, show that one is used on such as small routine interface of the system of real name terminal applies The solicited message of family permission, later, can by detection user response corresponding operating performed by the request (such as user presses " permission " button, or press " refusal " button) operation information, to determine whether to get the power of acquisition subscriber identity information Limit just continues to acquire subscriber identity information, and execute use only in the case where getting the permission of acquisition subscriber identity information Otherwise family identity registration process then terminates user identity in the register flow path of target background system.
The present embodiment requests user right before acquiring subscriber identity information first, it is ensured that under the premise of user's authorization The acquisition for carrying out user's related identification information, can further promote the safety of user information, in addition, also improving user's participation Degree, can at least improve the use feeling to the more sensitive user of self-identity information.
In one alternative embodiment of the application, refering to fig. 1 shown in 4, which can also include:
Acquisition mode selecting unit 1109, is used for: display one includes at least the first acquisition mode, second acquisition mode mentions Show interface;If detecting the operation information for selecting first acquisition mode, the first identity information acquisition of the acquisition is triggered Instruct and acquire the treatment process of the first identity information of user;If detecting, the operation for selecting second acquisition mode is believed Breath then obtains the instruction of the second identity information acquisition, and acquires the second identity information of user, and second identity information includes using The biological information at family;The second identity for corresponding to second identity information is generated, by second identity It is sent to the target background system with the biological information, so that based on second identity and the biology Characteristic information carries out identity registration in the target background system.
The unmanned public safety of unmanned shop/unmanned supermarket etc., will necessarily be related to the payment and settlement of commodity, tie in payment In calculation field, effective, the convenient and fast means of payment of one kind is the payment and settlement based on biological information (face, fingerprint), such as brush face branch Pay etc..Which is associated with payment account by user biological information in advance, such as by user's human face data and Alipay account or Bank card account is associated etc., subsequent to trigger payment and settlement process by biological informations such as acquisition faces, has convenient, fast Prompt advantage.
The payment and settlement based on biological information, need on it is registered in advance have the biological information of user premised on, this is just needed User biological information is acquired in advance when user carries out identity registration to target background system.In practical application, it is contemplated that one The quick payment demand of certain customers and another part user, can be in unmanned shop/nothings to the sensitive feature of its biological information On the registration entrance of the background system of people supermarket, while providing and corresponding to conventional payment clearing form (payment of brush bank card, scanning Two dimensional code payment) the first acquisition mode, and corresponding to the of the above-mentioned quick payment clearing form based on biological information Two acquisition modes, for selection by the user.
Wherein, first acquisition mode, it is only necessary to acquire system of real name terminal applies account, contact method and/or the pass of user The non-biometrics information such as bank card account of connection, and these the abiotic spies of second acquisition mode in addition to user need to be acquired Reference breath, it is also necessary at least one of user of acquisition biological information, such as face information, finger print information.
To after recalling its registration entrance, show first in the unmanned shop of scanning input/unmanned supermarket two dimensional code One includes at least the prompting interface of first acquisition mode, the second acquisition mode, to prompt user to select a certain kind therein Mode carries out identity information acquisition.
Wherein, if detecting, user selects the operation information of first acquisition mode (to correspond to described first as clicked The operation button of acquisition mode), then mobile terminal is triggered, as triggered the little Cheng in a certain system of real name terminal applies of mobile terminal Sequence acquires registered system of real name terminal applies account, contact method and/or associated bank in the system of real name terminal applies The non-biometrics information such as card account.
It is subsequent to carry out customer identity registration based on these non-biometric information, it such as generates and corresponds to these abiotic spies First identity is simultaneously registered to target background system etc. by the first identity of reference breath;In this mode, work as user After shopping, by brush bank card or it the payment and settlement that modes carry out commodity such as can scan the two-dimensional code.
If detecting, user selects the operation information of second acquisition mode (to correspond to the second acquisition side as clicked The operation button of formula), then it is answered in addition to triggering mobile terminal acquires registered system of real name terminal in the system of real name terminal applies With non-biometrics information such as account, contact method and/or associated bank card accounts, while also triggering taking the photograph for mobile terminal The physical characteristics collectings devices such as picture head or fingerprint sensor are opened, and the biological informations such as face or fingerprint for acquiring user.
After acquisition obtains these non-biometrics and biological information, to hide user sensitive information, mobile terminal The second identity corresponding to these information can be generated, which equally can be User ID, a user Coding calculates resulting digest value based on identity information of the corresponding message digest algorithm to acquisition, and can be by generated second Identity and the biological information are transmitted to target background system together, thus, in this case, it can specifically be based on institute The biological information for stating the second identity and user carries out customer identity registration.Complete registration on the basis of, it is subsequent can The payment and settlement process to purchased commodity is triggered by acquiring the biological information of user, specifically, for example, can be in shop The one or more settlement systems with camera of payment region setting, or one or more camera shootings can also be only set Head, and these cameras are connected with backstage settlement system, so as to trigger payment and settlement process by acquisition face, tie Settlement information (such as payment amount) is transmitted to corresponding to the face number by calculation system after collecting the biological informations such as face According to mobile terminal system of real name terminal applies in, in this way, can mobile terminal system of real name terminal applies (be substantially by The processing is executed in the application platform of system of real name terminal applies) in, the branch for the biological information binding for getting and specifying It pays a bill family, and then payment and settlement is carried out based on the payment account.Compared to brush bank card or scan the two-dimensional code equal payment and settlements side Formula, which are apparently more convenient, fast.
In addition, it is necessary to explanation, if user, which has been based on above-mentioned first acquisition mode, has registered it to target background system Non-biometric information, at subsequent any moment, if user is based on the considerations of convenient payment, (such as user continually accesses a certain nothing People does shopping in shop or user is after accessing a certain unfamiliar shop, generates interest to it, consequently, it is possible to consider to The background system renewal of registration in the shop its biological information), it needs further register its biological information to target background system, then uses Family (can scan the two-dimensional code such as in shop or outside shop by entering the registration entrance of the target background system and transfer target background system Registration entrance etc.), to biological informations such as target background system amended record its human face datas, in order to support its subsequent base It is settled accounts in the quick payment of biological information.
The present embodiment is provided simultaneously by the registration entrance in target background system and is only used for acquisition user's non-biometric Second acquisition side of the first acquisition mode of information and non-biometric information and biological information for acquiring user Formula, not only can satisfy the identity registration demand of the acquisition more user of sensitivity to its biological information, but also can satisfy tool There is the identity registration demand of the user of quick payment demand, may make user that there is preferably experience.
In one alternative embodiment of the application, a kind of storage medium is also disclosed, is at least stored with one in the storage medium Group instruction set;The instruction set can be used to execute information processing side disclosed in any embodiment as above when being called and executing Method.
The storage medium can be but not limited to ROM (Read-Only Memory, read-only memory), RAM (Random Access Memory, random access memory), USB flash disk, magnetic disk, CD etc. is any form of can be used to carry out the hard of information storage Part equipment.
In one alternative embodiment of the application, a kind of mobile terminal is also disclosed, refering to fig. 1 the mobile terminal shown in 5 Structural schematic diagram, the mobile terminal include at least:
Memory 1501, at least storing one group of instruction set;
Processor 1502, for calling and executing the described instruction collection in the memory, by executing described instruction collection Execute information processing method disclosed in any embodiment as above.
The mobile terminal can specifically be but not limited to following any type of terminal device: smart phone, tablet computer, The terminal devices such as intelligent wearable equipment (such as Intelligent bracelet/foot ring), number assistant.More specifically, the movement is whole It end can be right using any one forms such as terminal applies, web application, applet/application plug-in or terminal local functions Information processing method disclosed in the application any embodiment as above carries out function realization.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For convenience of description, it describes to be divided into various modules when system above or device with function or unit describes respectively. Certainly, the function of each unit can be realized in the same or multiple software and or hardware when implementing the application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment Method described in part.
Finally, it is to be noted that, herein, such as first, second, third and fourth or the like relational terms It is only used to distinguish one entity or operation from another entity or operation, without necessarily requiring or implying these There are any actual relationship or orders between entity or operation.Moreover, the terms "include", "comprise" or its is any Other variants are intended to non-exclusive inclusion, so that including the process, method, article or equipment of a series of elements Include not only those elements, but also including other elements that are not explicitly listed, or further includes for this process, side Method, article or the intrinsic element of equipment.In the absence of more restrictions, limited by sentence "including a ..." Element, it is not excluded that there is also other identical elements in the process, method, article or apparatus that includes the element.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the art For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered It is considered as the protection scope of the application.

Claims (10)

1. a kind of information processing method is applied to mobile terminal, this method comprises:
Obtain the registration entrance of target background system;
The instruction of the first identity information acquisition is obtained, and acquires the first identity information of user;
Based on first identity information, customer identity registration is carried out to the target background system by the registration entrance;
After the registration is finished, the location information of the mobile terminal is obtained;
The location information is sent to the target background system by the registration entrance, so that target backstage is System carries out access control based on the location information.
2. according to the method described in claim 1, this method be applied to the mobile terminal on a system of real name terminal applies in, The first identity information of the acquisition user, comprising:
Acquire in the system of real name terminal applies of the mobile terminal in registered subscriber identity information at least partially by Family identity information;
It is described to be based on first identity information, identity registration is carried out to the target background system by the registration entrance, Include:
Generate the first identity for corresponding at least partly user's identity information;
First identity is sent to the target background system by the registration entrance, so that based on described the One identity carries out identity registration in the target background system.
3. according to the method described in claim 1, this method is sent the location information by the registration entrance described After to the target background system, further includes:
The target background system is obtained to the feedback information of the location information;
If the feedback information indicates that the location information by verifying, is transferred and shows an access control control, and control institute It states access control control and is in operable state.
4. according to the method described in claim 3, this method is in operable state in the control access control control Later, further includes:
An open command is generated if receiving to the operation information of the access control control, and sends the open command extremely The target background system, so that the target background system access control is opened;
If not receiving the operation information to the access control control beyond the first scheduled duration, the access control is controlled Control is in non-operable state.
5. according to the method described in claim 4, this method further include:
The number of operations of the access control control of the detection in operable state, if the number of operations reaches predetermined time Number, then control the access control control and be in non-operable state;
And/or
In the case where the access control control is in non-operable state, if again by described in the second scheduled duration The access control control is transferred and shown to the registration entrance of target background system, then controls the access control control and be in non- Operable state controls the access control control when until reaching second scheduled duration and is in operable state.
6. according to the method described in claim 1, this method instructs in the first identity information acquisition of the acquisition and acquires user The first identity information before, further includes:
It generates and shows an authority request for being used to request to obtain subscriber identity information acquisition permission;
The response message for corresponding to the authority request is obtained, if response message characterization allows to obtain subscriber identity information and adopts Collect permission, triggers the step of the first identity information acquisition of the acquisition instructs and acquires the first identity information of user.
7. according to the method described in claim 1, first identity information is non-biometric information;
This method is after the registration entrance for obtaining target background system, further includes:
Display one includes at least the prompting interface of the first acquisition mode, the second acquisition mode;
If detecting the operation information for selecting first acquisition mode, the instruction of the first identity information acquisition of the acquisition is triggered And the step of acquiring the first identity information of user;
If detecting the operation information for selecting second acquisition mode, the instruction of the second identity information acquisition is obtained, and acquire The second identity information of user, second identity information include the biological information of user;It generates and corresponds to described second Second identity and the biological information are sent to the target backstage by the second identity of identity information System, so that carrying out identity note in the target background system based on second identity and the biological information Volume.
8. a kind of information processing unit, is applied to mobile terminal, which includes:
First acquisition unit, for obtaining the registration entrance of target background system;
Acquisition unit for obtaining the instruction of the first identity information acquisition, and acquires the first identity information of user;
Registering unit is carried out by the registration entrance to the target background system for being based on first identity information Customer identity registration;
Second acquisition unit, for after the registration is finished, obtaining the location information of the mobile terminal;
Transmission unit, for the location information to be sent to the target background system by the registration entrance, so that The target background system is based on the location information and carries out access control.
9. a kind of storage medium, one group of instruction set is at least stored in the storage medium;The instruction set called and when executing, It can be used to execute the method according to claim 1 to 7.
10. a kind of mobile terminal, comprising:
Memory, at least storing one group of instruction set;
Processor is executed by executing described instruction collection as weighed for calling and executing the described instruction collection in the memory Benefit requires the described in any item methods of 1-7.
CN201910784880.9A 2019-08-23 2019-08-23 A kind of information processing method, device, storage medium and mobile terminal Pending CN110503756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910784880.9A CN110503756A (en) 2019-08-23 2019-08-23 A kind of information processing method, device, storage medium and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910784880.9A CN110503756A (en) 2019-08-23 2019-08-23 A kind of information processing method, device, storage medium and mobile terminal

Publications (1)

Publication Number Publication Date
CN110503756A true CN110503756A (en) 2019-11-26

Family

ID=68589195

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910784880.9A Pending CN110503756A (en) 2019-08-23 2019-08-23 A kind of information processing method, device, storage medium and mobile terminal

Country Status (1)

Country Link
CN (1) CN110503756A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117081874A (en) * 2023-07-07 2023-11-17 汉斯(上海)智能家居科技股份有限公司 Intelligent home personalized data analysis system and method based on big data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174948A (en) * 2006-11-02 2008-05-07 上海银晨智能识别科技有限公司 Network login system and method with face authentication
CN101894404A (en) * 2010-07-29 2010-11-24 深圳市戴文科技有限公司 Method for realizing access control, terminal, access control device and access control system
EP3200161A1 (en) * 2016-01-27 2017-08-02 Honeywell International Inc. Remote application for controlling access
CN108230508A (en) * 2018-01-09 2018-06-29 桑田智能技术(上海)有限公司 One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method
CN108734828A (en) * 2018-04-16 2018-11-02 氪空间(北京)信息技术有限公司 Yunmen prohibits Information Authentication method, terminal and server
CN109377623A (en) * 2018-11-20 2019-02-22 北京千丁互联科技有限公司 Gate inhibition's passing method, device and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101174948A (en) * 2006-11-02 2008-05-07 上海银晨智能识别科技有限公司 Network login system and method with face authentication
CN101894404A (en) * 2010-07-29 2010-11-24 深圳市戴文科技有限公司 Method for realizing access control, terminal, access control device and access control system
EP3200161A1 (en) * 2016-01-27 2017-08-02 Honeywell International Inc. Remote application for controlling access
CN108230508A (en) * 2018-01-09 2018-06-29 桑田智能技术(上海)有限公司 One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method
CN108734828A (en) * 2018-04-16 2018-11-02 氪空间(北京)信息技术有限公司 Yunmen prohibits Information Authentication method, terminal and server
CN109377623A (en) * 2018-11-20 2019-02-22 北京千丁互联科技有限公司 Gate inhibition's passing method, device and server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117081874A (en) * 2023-07-07 2023-11-17 汉斯(上海)智能家居科技股份有限公司 Intelligent home personalized data analysis system and method based on big data
CN117081874B (en) * 2023-07-07 2024-04-30 汉斯(上海)智能家居科技股份有限公司 Intelligent home personalized data analysis system and method based on big data

Similar Documents

Publication Publication Date Title
US10147076B2 (en) Digital currency (virtual payment cards) issued by central bank for mobile and wearable devices
CN104616132B (en) A kind of logistic information management system and method
CA2117440C (en) Integrated point-of-sale multiple application system
JP5867635B2 (en) Tag management system, tag management method, information providing system, information providing method, and devices used therefor
CN109840591A (en) Model training systems, method and storage medium
KR20190075070A (en) Settlement method, entrance control method and apparatus
CN105678872A (en) Entrance guard manage system, authorization method thereof and entrance guard terminal device
TW201837763A (en) Internet-of-things-based information processing method and apparatus
KR20120135041A (en) Access monitoring method, information processing apparatus, and computer-readable medium storing access monitoring program
EP3005639A1 (en) Method and system for verifying the identity of a user of an online service
CN107316395A (en) A kind of autonomous system for borrowing and returning of sports equipment and its method
TWI698821B (en) Payment processing method, device and server
CN109213310A (en) Information interaction equipment, data object information processing method and processing device
EP3702944B1 (en) System, method, and computer program product for authentication by augmented reality for fraud prevention
CN109859415B (en) Library system and method thereof
CN104537534A (en) Facial recognition based mobile phone secure payment system and payment method thereof
CN110503756A (en) A kind of information processing method, device, storage medium and mobile terminal
CN108337235A (en) A kind of method and system executing safety operation using safety equipment
US20210255688A1 (en) Information processing apparatus, information processing method, and program
JP2015082140A (en) Onetime password issuing device, program, and onetime password issuing method
CN109325333A (en) A kind of method, apparatus that double identifications are logged in, paid
CN107786349B (en) Security management method and device for user account
CN110766388B (en) Virtual card generation method and system and electronic equipment
JP6228416B2 (en) Shopping system
CN110378713A (en) Method for building up and device, storage medium, the electronic equipment of corresponding relationship

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191126