CN111984754A - Terminal position auditing method and system - Google Patents

Terminal position auditing method and system Download PDF

Info

Publication number
CN111984754A
CN111984754A CN202010842062.2A CN202010842062A CN111984754A CN 111984754 A CN111984754 A CN 111984754A CN 202010842062 A CN202010842062 A CN 202010842062A CN 111984754 A CN111984754 A CN 111984754A
Authority
CN
China
Prior art keywords
party
deployment
terminal
detection
area information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010842062.2A
Other languages
Chinese (zh)
Inventor
林立
陈琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202010842062.2A priority Critical patent/CN111984754A/en
Publication of CN111984754A publication Critical patent/CN111984754A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Remote Sensing (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present specification provides a method and a system for checking a terminal position, wherein the method for checking the terminal position includes: a first detection party acquires a first deployment position of a terminal, maps the first deployment position to an electronic map, and determines first deployment area information of the terminal in the electronic map; a second detection party acquires a second deployment position of the terminal, maps the second deployment position to the electronic map, and determines second deployment area information of the terminal in the electronic map; the first detection party and/or the second detection party detect whether the first deployment area information and the second deployment area information have an overlapping area or not, and send the overlapping result obtained by detection to an auditing party; and the auditor determines the audit result of the terminal position according to the overlapping result. By the method, the private data of both parties are protected, the compliance detection of the deployment position of the terminal is completed, the cost is reduced, and resources are saved.

Description

Terminal position auditing method and system
Technical Field
The present disclosure relates to the field of compliance data management, and in particular, to a method and a system for auditing a terminal location.
Background
With the development of the society, more and more payment acceptance terminals are used for executing money collection business, the payment acceptance terminals relate to reading and collecting of payment information and generation of payment instructions, the safety and the legality of the payment acceptance terminals have important significance for guaranteeing the legal rights and interests of consumers and maintaining order of receipt market, the payment acceptance terminals are actually deployed by a terminal deployment party, a supervision party needs to supervise whether the specific deployment position of the payment acceptance terminals is in compliance, and a detection party can obtain the payment position of a user when the payment acceptance terminals pay.
In practical applications, the terminal deployment party does not notify the actual deployment position of the payment acceptance terminal to the detection party, the detection party cannot obtain the specific deployment position of the payment acceptance terminal, but the detection party can obtain the payment position of the payment behavior generated by the payment acceptance terminal and further estimate the predicted position of the payment acceptance terminal, but because the payment behavior relates to user privacy, the detection party cannot notify the terminal deployment party of the predicted position obtained by the payment behavior, and in this case, if a third party institution approved by both parties is introduced, the cost of manpower and material resources is increased, and the cost is high, and the operation is very inconvenient.
Therefore, it is an urgent need for the skilled person to detect whether or not the specific deployment position of the payment acceptance terminal is in compliance without introducing a third party organization and without revealing the position information obtained by the detecting party and the terminating party.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide a method and a system for auditing a terminal location, so as to solve technical defects in the prior art.
According to a first aspect of embodiments of the present specification, there is provided a terminal location auditing method, including:
a first detection party acquires a first deployment position of a terminal, maps the first deployment position to an electronic map, and determines first deployment area information of the terminal in the electronic map;
a second detection party acquires a second deployment position of the terminal, maps the second deployment position to the electronic map, and determines second deployment area information of the terminal in the electronic map;
the first detection party and/or the second detection party detect whether the first deployment area information and the second deployment area information have an overlapping area or not, and send the overlapping result obtained by detection to an auditing party;
and the auditor determines the audit result of the terminal position according to the overlapping result.
Optionally, the detecting, by the first detector and/or the second detector, whether the first deployment area information and the second deployment area information have an overlapping area, and sending an overlapping result obtained by the detecting to an auditing party, includes:
the first detection party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set, and sends the first encrypted data set to the second detection party;
and the second detection party encrypts the second deployment area information through the preset encryption algorithm to obtain a second encrypted data set, detects whether the first encrypted data set and the second encrypted data set have coincident data, and sends the detected overlapping result to an auditing party.
Optionally, the detecting, by the first detector and/or the second detector, whether the first deployment area information and the second deployment area information have an overlapping area, and sending an overlapping result obtained by the detecting to an auditing party, includes:
the second detection party encrypts the second deployment area information through a preset encryption algorithm to obtain a second encrypted data set, and sends the second encrypted data set to the first detection party;
the first detection party encrypts the first deployment area information through the preset encryption algorithm to obtain a first encrypted data set, detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends an overlapping result obtained through detection to an auditing party.
Optionally, the detecting, by the first detector and/or the second detector, whether the first deployment area information and the second deployment area information have an overlapping area, and sending an overlapping result obtained by the detecting to an auditing party, includes:
the first detection party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set, and sends the first encrypted data set to the second detection party;
the second detection party encrypts the second deployment area information through a preset encryption algorithm to obtain a second encrypted data set, and sends the second encrypted data set to the first detection party;
the first detection party detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends a detected first overlapping result to an auditing party;
and the second detector detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends a detected second overlapping result to an auditor.
Optionally, the determining, by the auditor, an audit result of the terminal position according to the overlapping result includes:
and the auditor determines the audit result of the terminal position according to the first overlapping result, the first overlapping result weight, the second overlapping result and the second overlapping result weight.
Optionally, the obtaining, by the second detecting party, the second deployment position of the terminal includes:
and the second detection party receives a payment position returned by the user under the condition that the terminal executes payment operation, and the payment position is used as a second deployment position of the terminal.
Optionally, the receiving, by the second detection party, the payment position returned by the user in the case that the terminal executes the payment operation includes:
the second detection party receives a plurality of initial payment positions returned by a plurality of users when the terminal performs a payment operation, and determines a payment position in the plurality of initial payment positions.
Optionally, the determining, by the first detecting party, the first deployment area information of the terminal in the electronic map includes:
the method comprises the steps that a first detection party determines a first grid set in an electronic map according to a preset area radius, and determines first deployment area information corresponding to the first grid set, wherein the electronic map is divided into a plurality of grids in advance, and each grid is provided with a corresponding grid identifier.
Optionally, the determining, by the second detecting party, second deployment area information of the terminal in the electronic map includes:
and the second detection party determines a second grid set in the electronic map according to the area radius and determines second deployment area information corresponding to the second grid set.
Optionally, the mapping, by the first detector, the first deployment location into the electronic map includes:
the first detection party converts the first deployment position into first longitude and latitude information corresponding to the first deployment position, and maps the first longitude and latitude information into an electronic map.
According to a second aspect of embodiments of the present specification, there is provided a terminal position auditing system including: the system comprises a first detector, a second detector and an auditor;
the first detection party is configured to acquire a first deployment position of a terminal, map the first deployment position to an electronic map, and determine first deployment area information of the terminal in the electronic map;
the second detection party is configured to acquire a second deployment position of the terminal, map the second deployment position to the electronic map, and determine second deployment area information of the terminal in the electronic map;
the first detection party and/or the second detection party are further configured to detect whether the first deployment area information and the second deployment area information have an overlapping area, and send the detected overlapping result to an auditing party;
the auditor is configured to determine an audit result of the terminal position according to the overlapping result.
In the embodiment of the specification, a first deployment position of a terminal is acquired by a first detection party, the first deployment position is mapped to an electronic map, and first deployment area information of the terminal is determined in the electronic map;
a second detection party acquires a second deployment position of the terminal, maps the second deployment position to the electronic map, and determines second deployment area information of the terminal in the electronic map;
the first detection party and/or the second detection party detect whether the first deployment area information and the second deployment area information have an overlapping area or not, and send the overlapping result obtained by detection to an auditing party;
and the auditor determines the audit result of the terminal position according to the overlapping result.
According to the terminal position detection method provided by the specification, a first deployment position of a terminal is obtained through a first detection party, the first deployment position is mapped to an electronic map, and first deployment area information of the terminal is determined in the electronic map; a first detection party includes a first deployment position of a terminal in first deployment area information, a second detection party acquires a second deployment position of the terminal, maps the second deployment position to the electronic map, and determines second deployment area information of the terminal in the electronic map; a second detection party includes a second detection position in a second deployment area, and the first detection party and/or the second detection party detect whether the first deployment area information and the second deployment area information have an overlapping area or not and send the detected overlapping result to an auditor; the first detection party and/or the second detection party perform detection according to the first deployment area information and the second deployment area information, whether the first detection party and/or the second detection party have overlapping information or not is detected, whether the overlapping result is obtained or not is sent to the auditing party, the auditing party determines the auditing result of the terminal position according to the overlapping result, if the first deployment area information and the second deployment area information are overlapped, the deployment position of the terminal is determined to be in compliance, and if the first deployment area information and the second deployment area information are not overlapped, the deployment position of the terminal is determined to be not in compliance.
According to the method, the supervisor and the first detector do not need to know the second deployment position of the second detector, and the supervisor and the second detector do not need to know the first deployment position of the first detector, and the supervisor can judge whether the deployment position of the terminal is in compliance only by acquiring whether the first deployment area information and the second deployment area information are overlapped, so that the position information of the first detector and the second detector is protected, the compliance detection of the deployment position of the terminal is completed, and meanwhile, a third party mechanism is not introduced, so that manpower and material resources are saved, and the efficiency and the safety of the compliance detection are improved.
Drawings
Fig. 1 is a flowchart of a terminal location auditing method provided in an embodiment of the present specification;
fig. 2 is a schematic electronic map of a first detection party in a terminal location auditing method provided in an embodiment of the present specification;
fig. 3 is a schematic electronic map of a second detection party in the terminal location auditing method provided in the embodiments of the present specification;
FIG. 4 is an interaction diagram of a terminal location detection method applied to mobile POS location compliance detection provided by an embodiment of the present specification;
fig. 5 is a schematic structural diagram of a terminal location auditing system provided in an embodiment of this specification.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present description. This description may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, as those skilled in the art will be able to make and use the present disclosure without departing from the spirit and scope of the present disclosure.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, etc. may be used herein in one or more embodiments to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first can also be referred to as a second and, similarly, a second can also be referred to as a first without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In this specification, a method and a system for auditing a terminal location are provided, and details are described in the following embodiments one by one.
Fig. 1 shows a flowchart of a terminal location auditing method according to an embodiment of the present specification, which specifically includes the following steps:
step 102: the method comprises the steps that a first detection party obtains a first deployment position of a terminal, the first deployment position is mapped to an electronic map, and first deployment area information of the terminal is determined in the electronic map.
The terminal is a payment acceptance terminal, such as a POS machine, a code scanning gun, and the like, and the payment acceptance terminal may be a terminal having a code scanning function, and may also be a terminal for providing a two-dimensional code for a user to use, which is not limited in this specification.
In practical application, the terminal deployment party can be an acquirer, namely the terminal is deployed by the acquirer, the actual deployment position of the terminal is privacy information of the terminal deployment party and is inconvenient to provide to other organizations such as a supervisor and a detector, and the first deployment position is the actual deployment position of the terminal, namely the first detector can accurately acquire the first deployment position.
An electronic map, i.e., a digital map, is a map that is stored and referred to digitally using computer technology, and any position on the earth can be mapped to a corresponding position on the electronic map.
Optionally, the mapping, by the first detector, the first deployment location into the electronic map includes:
the first detection party converts the first deployment position into first longitude and latitude information corresponding to the first deployment position, and maps the first longitude and latitude information into an electronic map.
Specifically, since the first detection party has the first deployment position of the terminal, the first deployment position is correspondingly marked in the electronic map, latitude and longitude information of the first deployment position can also be acquired, and the latitude and longitude information is input into the electronic map, so that the first deployment position is mapped into the electronic map.
Optionally, the determining, by the first detecting party, the first deployment area information of the terminal in the electronic map includes:
the method comprises the steps that a first detection party determines a first grid set in an electronic map according to a preset area radius, and determines first deployment area information corresponding to the first grid set, wherein the electronic map is divided into a plurality of grids in advance, and each grid is provided with a corresponding grid identifier.
Specifically, the preset area radius can be 50 meters, can be 100 meters, can be 200 meters, the actual condition is the standard for the setting of the preset area radius, in order to facilitate the use in the electronic map, a plurality of grids can be divided into in advance for the electronic map, each grid has a corresponding grid mark, the side length of each grid can be 1 meter, also can be 10 meters, also can be 100 meters, the specific side length is also the standard with practical application, the side length of each grid is not limited in the application.
In the embodiment provided in this specification, taking as an example the detection of whether the deployment position of a certain mobile POS is compliant, as shown in fig. 2, fig. 2 shows a schematic diagram of an electronic map in a first detection party, where point a is a terminal deployment party, maps an actual deployment position of the POS to a position in the electronic map, and a circle is drawn on the electronic map with a radius of 50 meters with point a as a center, an area within the circle is a first deployment area, a grid related to the first deployment area is a first grid set, and grid information corresponding to the first grid set is first deployment area information {54, 64, 45, 55, 65, 75, 46, 56, 66, 76, 57, 67}, where the first deployment area information represents a grid number.
Step 104: and a second detection party acquires a second deployment position of the terminal, maps the second deployment position to the electronic map, and determines second deployment area information of the terminal in the electronic map.
The second detection party may be a payment platform, and when the user performs payment operation on the terminal through the payment platform, the payment platform may receive a payment position of the user during the payment operation on the terminal, where the second deployment position is the payment position.
In practical application, in order to ensure the accuracy of the second deployment position, the payment positions returned by a plurality of users when the terminal performs payment operation may be obtained, and an average position may be determined as the payment position according to the payment positions, for example, a plurality of payment positions may be clustered to obtain an average position, or a center position may be obtained by calculation, so that drawing a circle with the center position as a center of the circle may include most payment positions, and the specific calculation method is based on practical application.
After the second deployment position is obtained, the second deployment position is mapped to the electronic map, in order to unify standards, the setting parameters of the electronic map on the second detection side need to be the same as the setting parameters of the electronic map on the first detection side, the electronic maps with the same specification are used, and the lengths of the electronic grids in the electronic map are the same. The method has the advantages that errors caused by inconsistent scales are avoided, subsequent detection errors are further caused, similarly, in the process that the second deployment position is mapped to the electronic map, random disturbance information is added to the longitude and/or the latitude corresponding to the second deployment position, the information interferes with the longitude and latitude information of the second deployment position, certain deviation exists between the second deployment position and the actual position when the second deployment position is mapped to the electronic map, but the deviation range is small, and the second deployment position can be received within the range.
Optionally, the determining, by the second detecting party, second deployment area information of the terminal in the electronic map includes:
and the second detection party determines a second grid set in the electronic map according to the area radius and determines second deployment area information corresponding to the second grid set.
After the second deployment position is mapped into the electronic map, a second deployment area is determined in the electronic map by taking the mapping position of the second deployment position in the electronic map as the center of a circle and a preset area radius, a grid related to the second deployment area is a second grid set, and grid information corresponding to the second grid set is second deployment area information.
In the embodiment provided in this specification, following the above example, the second detecting party receives the payment position uploaded by the user when the mobile POS performs a payment action, as shown in fig. 3, fig. 3 shows a schematic diagram of an electronic map in the second detecting party, point B is a position in the electronic map, where the payment position uploaded by the user when the user performs a payment operation in the mobile POS and received by the second detecting party is mapped, and a circle is drawn in the electronic map with a radius of 50 meters by using point B as a center, where the area in the circle is a second deployment area, a grid involved in the second deployment area is a second grid set, and grid information corresponding to the second grid set is second deployment area information {44, 54, 64, 34, 44, 54, 64, 35, 45, 55, 65, 46, 56, 66}, where the second deployment area information is represented by a grid number.
Step 106: and the first detection party and/or the second detection party detect whether the first deployment area information and the second deployment area information have an overlapping area or not, and send the detected overlapping result to an auditing party.
In practical applications, there are various ways to detect whether there is an overlapping area between the first deployment area information and the second deployment area information, for example, the second detection party may send the second deployment area information to the first detection party, the first detection party performs detection, and sends the detected overlapping result to the auditing party, or the first detection party may send the first deployment area information to the second detection party, the second detection party performs detection, and sends the detected overlapping result to the auditing party, or the first detection party may send the first deployment area to the second detection party, the second detection party sends the second deployment area to the first detection party, and then the first detection party and the second detection party respectively detect the overlapping result, and send the respective overlapping result to the auditing party, and the following explains the concentration conditions one by one.
Optionally, the detecting, by the first detector and/or the second detector, whether the first deployment area information and the second deployment area information have an overlapping area, and sending an overlapping result obtained by the detecting to an auditing party, includes:
the first detection party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set, and sends the first encrypted data set to the second detection party;
and the second detection party encrypts the second deployment area information through the preset encryption algorithm to obtain a second encrypted data set, detects whether the first encrypted data set and the second encrypted data set have coincident data, and sends the detected overlapping result to an auditing party.
The detection overlapping area can be detected by a second detection party, specifically, the first detection party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set, the actual first deployment area information can be hidden by using the encryption algorithm to protect a first deployment position of the first detection party from being leaked, and then the first encrypted data set is sent to the second detection party.
The second detection party encrypts the second deployment area information through the same encryption algorithm to obtain a second encrypted data set, so that the second deployment area information obtained by the second detection party can be hidden, and the second deployment position of the second detection party is protected from being revealed.
The second detecting party obtains the first encrypted data Set and the second encrypted data Set, and the Intersection of the two encrypted data sets can be obtained based on a privacy Protection Set Intersection (PSI) protocol, and the privacy protection Set Intersection protocol allows two parties holding the respective sets to jointly calculate the Intersection operation of the two sets. At the end of protocol interaction, one party or two parties should obtain correct intersection, and any information in the other party set except the intersection cannot be obtained, so that the privacy information of the two parties can be effectively protected.
In one embodiment provided herein, the first detection party encrypts the first deployment region information {54, 64, 45, 55, 65, 75, 46, 56, 66, 76, 57, 67} to obtain the first encrypted data set S1And collecting S the first encrypted data1Sending the information to a second detection party, and encrypting second deployment region information {44, 54, 64, 34, 44, 54, 64, 35, 45, 55, 65, 46, 56 and 66} by the second detection party by using the same encryption algorithm to obtain a second encrypted data set S2The second detection party can obtain the S based on the PIS protocol under the condition that the specific content of the first deployment area information does not need to be obtained1And S2Whether an intersection exists and the size of the intersection are detected to determine S1And S2And an intersection exists, namely the first deployment area information and the second deployment area information have an overlapping area, and the second detector sends a result of the overlapping area to the auditor.
In another possible embodiment provided by this specification, optionally, the detecting, by the first detecting party and/or the second detecting party, whether there is an overlapping area in the first deployment area information and the second deployment area information, and sending an overlapping result obtained by the detecting to an auditing party includes:
the second detection party encrypts the second deployment area information through a preset encryption algorithm to obtain a second encrypted data set, and sends the second encrypted data set to the first detection party;
the first detection party encrypts the first deployment area information through the preset encryption algorithm to obtain a first encrypted data set, detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends an overlapping result obtained through detection to an auditing party.
The detection overlapping area can be detected by a first detection party, specifically, a second detection party encrypts second deployment area information through a preset encryption algorithm to obtain a second encrypted data set, the actual second deployment area information can be hidden by using the encryption algorithm, a second deployment position of the second detection party is protected from being revealed, and then the second encrypted data set is sent to the first detection party.
The first detection party encrypts the first deployment area information through the same encryption algorithm to obtain a first encrypted data set, so that the second deployment area information obtained by the first detection party can be hidden, and the first deployment position of the first detection party is protected from being leaked.
The first detection party obtains the second encrypted data Set and the first encrypted data Set, and the Intersection of the two encrypted data sets can be obtained based on a privacy Protection Set Intersection (PSI) protocol, so that the privacy information of the two parties can be effectively protected.
In a specific embodiment provided in this specification, the second detection party encrypts the second deployment region information {44, 54, 64, 34, 44, 54, 64, 35, 45, 55, 65, 46, 56, 66} along with the above example to obtain a second encrypted data set S2And the second encrypted data set S2To the first detector, theA detection party encrypts the first deployment region information {54, 64, 45, 55, 65, 75, 46, 56, 66, 76, 57, 67} by using the same encryption algorithm to obtain a first encrypted data set S1The first detection party can obtain the S based on the PIS protocol under the condition that the specific content of the second deployment area information is not required to be obtained1And S2Whether an intersection exists and the size of the intersection are detected to determine S1And S2And if no intersection exists, namely the first deployment area information and the second deployment area information do not have an overlapping area, the first detector sends the result of the absence of the overlapping area to the auditor.
In practical application, the PSI protocol may enable both sides to know whether the sets of both sides have the size of the intersection and the size of the intersection, and may not enable the other side to know the specific value in the set of the both sides at the same time, and for the sake of fairness, both sides may send the overlapping result obtained by the detection to the auditing party, specifically, the first detecting party and/or the second detecting party detects whether the first deployment area information and the second deployment area information have the overlapping area, and sends the overlapping result obtained by the detection to the auditing party, including:
the first detection party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set, and sends the first encrypted data set to the second detection party;
the second detection party encrypts the second deployment area information through a preset encryption algorithm to obtain a second encrypted data set, and sends the second encrypted data set to the first detection party;
the first detection party detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends a detected first overlapping result to an auditing party;
and the second detector detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends a detected second overlapping result to an auditor.
The first detection party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set, and sends the first encrypted data set to the second detection party, the second detection party encrypts the second deployment area information through the same encryption algorithm to obtain a second encrypted data set, and sends the second encrypted data set to the first detection party, through a PSI protocol, the first detection party and the second detection party can both obtain whether the first encrypted data and the second encrypted data have intersection and intersection size, meanwhile, the first detection party can not know the specific information of the second deployment area information, the second detection party can not know the specific information of the first deployment area information, through the method, whether the first deployment area information and the second deployment area information overlap can be detected, and the specific information content of the opposite party can not be known, privacy is protected.
In a specific embodiment provided in the present specification, the first detection party encrypts the first deployment region information {54, 64, 45, 55, 65, 75, 46, 56, 66, 76, 57, 67} with a preset encryption algorithm along with the above example to obtain a first encrypted data set S1And collecting S the first encrypted data1Sending the information to a first detection party, and encrypting second deployment region information {44, 54, 64, 34, 44, 54, 64, 35, 45, 55, 65, 46, 56 and 66} by a second detection party by using the same encryption algorithm to obtain a second encrypted data set S2And the second encrypted data set S2And sending the data to the first detector.
The first detection party can obtain S based on the PIS protocol under the condition that the specific content of the second deployment area information is not required to be obtained1And S2And whether an intersection exists and the size of the intersection is detected, the first overlapping result is detected to be that the first deployment area information and the second deployment area information have an overlapping area, and the first overlapping result is sent to the auditing party.
The second detection party can obtain S based on the PIS protocol under the condition that the specific content of the first deployment area information does not need to be obtained1And S2Whether an intersection exists and the size of the intersection, and detecting that the second overlapping result is the first deployment area informationAnd an overlapping area exists between the first deployment area information and the second deployment area information, and a second overlapping result is sent to the auditor.
Step 108: and the auditor determines the audit result of the terminal position according to the overlapping result.
The auditing party is a third party for auditing whether the related business of the payment acceptance terminal is in compliance, the auditing party specifies the compliance deployment position of the terminal, and the actual deployment position of the terminal is specifically deployed by the terminal deployment party, so that the auditing party needs to perform compliance audit on whether the actual deployment position of the terminal is the specified compliance deployment position.
Specifically, the auditing party determines an auditing result of the terminal position according to an overlapping result sent by the first detecting party and/or the second detecting party, that is, when the overlapping result is that the first deployment area information and the second deployment area information are overlapped, the deployment position compliance of the terminal is determined; and determining that the deployment position of the terminal is not in compliance when the overlapping result is that the first deployment region information and the second deployment region information are not overlapped.
In practical application, the auditing party further receives overlapping results sent by the first detecting party and the second detecting party respectively, and determines an auditing result of the terminal position according to the respective overlapping results, specifically, the auditing party determines the auditing result of the terminal position according to the first overlapping result, the first overlapping result weight, the second overlapping result and the second overlapping result weight.
The first overlap weight and the second overlap weight are preset weights, for example, the first overlap weight is 30% and the second overlap weight is 70%, and in practical applications, the values of the first overlap weight and the second overlap weight may be determined by practical situations.
In a specific embodiment provided in this specification, along with the above example, when the auditor receives the first overlapping result sent by the first detector, the first overlapping result is that there is an overlapping area between the first deployment area information and the second deployment area information, and meanwhile, when the second overlapping result sent by the second detector is also that there is an overlapping area between the first deployment area information and the second deployment area information, it may be determined that the actual deployment position of the terminal meets the requirement.
According to the terminal position detection method provided by the specification, the supervisor and the first detector do not need to know the second deployment position of the second detector, meanwhile, the supervisor and the second detector do not need to know the first deployment position of the first detector, the supervisor can judge whether the deployment positions of the terminal are in compliance only by acquiring whether the first deployment region information and the second deployment region information are overlapped, namely, the position information of the first detector and the second detector is protected, compliance detection of the terminal deployment positions is completed, meanwhile, a third party mechanism is not introduced, manpower and material resources are saved, and the efficiency and safety of the compliance detection are improved.
The following description will further describe the terminal position detection method provided in this specification with reference to fig. 4 by taking an example of an application of the terminal position detection method in the location compliance detection of the mobile POS machine. Fig. 4 shows an interaction diagram of a terminal location detection method applied to mobile POS location compliance detection provided in an embodiment of the present specification, which specifically includes the following steps:
step 402: the terminal deployment party acquires the actual deployment position of the mobile POS as a first deployment position.
In the embodiments provided in the present description, the terminal deployment party acquires the latitude and longitude coordinates P of the actual deployment position of the mobile POS machine1(113.601 x, 22.354 x), wherein 113.601 x represents longitude and 22.354 x represents latitude.
Step 404: and the terminal deployment party maps the values of the longitude and latitude of the first deployment position to an electronic map after adding a random disturbance value respectively, and determines first deployment area information in the electronic map.
In the examples provided in this specification, in P1The longitude and the latitude of the computer are respectively added with a random disturbance value to obtain a processed longitude and latitude coordinate P2(113.602, 22.357), adding P2Mapping in an electronic map, wherein a plurality of grids are distributed in the electronic map in advance, and the grids are at the radius of 100 meters and at the radius of P2Drawing a circle in the electronic map for the center according to the grid mark in the circleFirst deployment region information 11, 12, 13, 22, 25, 27, 29, 65, 42, 89, 35, 15 is identified.
Step 406: the terminal deployment party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set.
In the embodiments provided herein, the first deployment region information {11, 12, 13, 22, 25, 27, 29, 65, 42, 89, 35, 15} is encrypted according to a preset encryption algorithm to obtain a first encrypted data set S1
Step 408: the terminating signing party sends the first set of encrypted data to a payment platform.
In the embodiments provided in the present specification, the terminal deployment part arranges the first encrypted data set S1And sending the information to a payment platform.
Step 410: and the payment platform acquires the payment position uploaded by the user when the mobile POS machine scans the code for payment as a second deployment position of the mobile POS machine.
In the embodiments provided in this specification, the payment platform obtains the payment position P uploaded by the user when the mobile POS machine scans the code for payment3(113.611, 22.344), and adding P3As a second deployed position for the mobile POS.
Step 412: and the payment platform adds a random disturbance value to each latitude and longitude value of the second deployment position, then maps the values to the electronic map, and determines second deployment area information in the electronic map.
In the examples provided in this specification, in P3The longitude and the latitude of the computer are respectively added with a random disturbance value to obtain a processed longitude and latitude coordinate P4(113.672, 22.399), adding P4The map is mapped on an electronic map, and the electronic map is also distributed with a plurality of grids in advance, takes 100 meters as a radius and takes P as4The second deployment region information {33, 32, 34, 56, 25, 27, 29, 54, 42, 89, 35, 14} is determined from the grid identification within the circle for drawing the circle in the electronic map for the center.
Step 414: and the payment platform encrypts the second deployment area information through the same encryption algorithm as the terminal deployment party to obtain a second encrypted data set.
In the embodiments provided herein, the second deployment region information {33, 32, 34, 56, 25, 27, 29, 54, 42, 89, 35, 14} is encrypted according to a preset encryption algorithm to obtain a second encrypted data set S2
Step 416: the payment platform sends the second set of encrypted data to the terminating signing party.
In embodiments provided herein, the payment platform aggregates the second encrypted data set S2And sending the data to a terminal deployment party.
It should be noted that there is no necessary order of execution between steps 402 to 408 and steps 410 to 416, and steps 402 to 408 and steps 410 to 416 may be executed simultaneously.
Step 418: and the terminal deployment party obtains a first overlapping result through the PSI protocol according to the first encrypted data set and the second encrypted data set, and the first overlapping result is that the first deployment area information and the second deployment area information are overlapped.
Step 420: the terminal deployment party sends the first overlapping result to the supervisory party.
Step 422: and the payment platform obtains a second overlapping result according to the first encrypted data set and the second encrypted data set through the PSI protocol, wherein the second overlapping result is that the first deployment area information and the second deployment area information are overlapped.
Step 424: and the payment platform sends the second overlapping result to the monitoring party.
It should be noted that there is no necessary sequence between steps 418 to 420 and steps 422 to 424, and steps 418 to 420 and steps 422 to 424 may be performed simultaneously.
Step 426: and the monitoring party determines an auditing result as the compliance of the actual placement position of the mobile POS machine according to the first overlapping result and the second overlapping result.
In an embodiment provided in this specification, if both the first overlapping result and the second overlapping result received by the supervisor overlap with the first deployment area information and the second deployment area information, the compliance of the actual placement position of the mobile POS machine is determined.
According to the terminal position detection method provided by the specification, the supervisor and the first detector do not need to know the second deployment position of the second detector, meanwhile, the supervisor and the second detector do not need to know the first deployment position of the first detector, the supervisor can judge whether the deployment positions of the terminal are in compliance only by acquiring whether the first deployment region information and the second deployment region information are overlapped, namely, the position information of the first detector and the second detector is protected, compliance detection of the terminal deployment positions is completed, meanwhile, a third party mechanism is not introduced, manpower and material resources are saved, and the efficiency and safety of the compliance detection are improved.
Corresponding to the above method embodiment, the present specification further provides an embodiment of a terminal position detection system, and fig. 5 shows a schematic structural diagram of a terminal position detection system provided in an embodiment of the present specification. As shown in fig. 5, the apparatus includes: a first detector 502, a second detector 504, and a reviewer 506;
the first detection party 502 is configured to obtain a first deployment position of a terminal, map the first deployment position to an electronic map, and determine first deployment area information of the terminal in the electronic map;
the second detector 504 is configured to obtain a second deployment location of the terminal, map the second deployment location to the electronic map, and determine second deployment area information of the terminal in the electronic map;
the first detector 502 and/or the second detector 504 are further configured to detect whether there is an overlapping area in the first deployment area information and the second deployment area information, and send a detected overlapping result to an auditor 506;
the auditor 506 is configured to determine an audit result of the terminal position according to the overlapping result.
Alternatively to this, the first and second parts may,
the first detecting party 502 is further configured to encrypt the first deployment area information by a preset encryption algorithm, obtain a first encrypted data set, and send the first encrypted data set to the second detecting party 504;
the second detecting party 504 is further configured to encrypt the second deployment area information through the preset encryption algorithm, obtain a second encrypted data set, detect whether overlapping data exists between the first encrypted data set and the second encrypted data set, and send a detected overlapping result to an auditing party.
Alternatively to this, the first and second parts may,
the second detecting party 504 is further configured to encrypt the second deployment area information by using a preset encryption algorithm, obtain a second encrypted data set, and send the second encrypted data set to the first detecting party 502;
the first detecting party 502 is further configured to encrypt the first deployment area information through the preset encryption algorithm, obtain a first encrypted data set, detect whether overlapping data exists between the first encrypted data set and the second encrypted data set, and send a detected overlapping result to an auditing party.
Alternatively to this, the first and second parts may,
the first detecting party 502 is further configured to encrypt the first deployment area information by a preset encryption algorithm, obtain a first encrypted data set, and send the first encrypted data set to the second detecting party 504;
the second detecting party 504 is further configured to encrypt the second deployment area information by using a preset encryption algorithm, obtain a second encrypted data set, and send the second encrypted data set to the first detecting party 502;
the first detector 502 is further configured to detect whether overlapping data exists in the first encrypted data set and the second encrypted data set, and send a detected first overlapping result to the auditor 506;
the second detector 504 is further configured to detect whether there is overlapping data in the first encrypted data set and the second encrypted data set, and send a detected second overlapping result to the auditor 506.
Accordingly, the method can be used for solving the problems that,
the auditor 506 is further configured to determine an audit result of the terminal location according to the first overlapping result, the first overlapping result weight, the second overlapping result, and the second overlapping result weight.
Alternatively to this, the first and second parts may,
the second detector 504 is further configured to receive a payment location returned by the user when the terminal performs a payment operation, and use the payment location as a second deployment location of the terminal.
Alternatively to this, the first and second parts may,
the second detector 504 is further configured to receive a plurality of initial payment positions returned by a plurality of users when the terminal performs a payment operation, and determine a payment position in the plurality of initial payment positions.
Alternatively to this, the first and second parts may,
the first detecting party 502 is further configured to determine a first grid set in the electronic map according to a preset area radius, and determine first deployment area information corresponding to the first grid set, where the electronic map is divided into multiple grids in advance, and each grid has a corresponding grid identifier.
Alternatively to this, the first and second parts may,
the second detector 504 is further configured to determine a second grid set in the electronic map according to the area radius, and determine second deployment area information corresponding to the second grid set.
Alternatively to this, the first and second parts may,
the first detector 502 is further configured to convert the first deployment location into first latitudinal information corresponding to the first deployment location, and map the first latitudinal information into an electronic map.
According to the terminal position detection system provided by the specification, the supervisor and the first detector do not need to know the second deployment position of the second detector, meanwhile, the supervisor and the second detector do not need to know the first deployment position of the first detector, the supervisor can judge whether the deployment positions of the terminal are in compliance only by acquiring whether the first deployment region information and the second deployment region information are overlapped, namely, the position information of the first detector and the second detector is protected, compliance detection of the terminal deployment positions is completed, meanwhile, a third party mechanism is not introduced, manpower and material resources are saved, and the efficiency and safety of the compliance detection are improved.
The above is a schematic scheme of a terminal position detection system of this embodiment. It should be noted that the technical solution of the terminal position detecting system and the technical solution of the terminal position detecting method belong to the same concept, and details that are not described in detail in the technical solution of the terminal position detecting system can be referred to the description of the technical solution of the terminal position detecting method.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present disclosure is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present disclosure. Further, those skilled in the art should also appreciate that the embodiments described in this specification are preferred embodiments and that acts and modules referred to are not necessarily required for this description.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are intended only to aid in the description of the specification. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the specification and its practical application, to thereby enable others skilled in the art to best understand the specification and its practical application. The specification is limited only by the claims and their full scope and equivalents.

Claims (11)

1. A terminal position auditing method comprises the following steps:
a first detection party acquires a first deployment position of a terminal, maps the first deployment position to an electronic map, and determines first deployment area information of the terminal in the electronic map;
a second detection party acquires a second deployment position of the terminal, maps the second deployment position to the electronic map, and determines second deployment area information of the terminal in the electronic map;
the first detection party and/or the second detection party detect whether the first deployment area information and the second deployment area information have an overlapping area or not, and send the overlapping result obtained by detection to an auditing party;
and the auditor determines the audit result of the terminal position according to the overlapping result.
2. The method according to claim 1, wherein the detecting the first deployment area information and the second deployment area information by the first detecting party and/or the second detecting party detects whether there is an overlapping area, and sends an overlapping result obtained by the detecting to an auditing party, includes:
the first detection party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set, and sends the first encrypted data set to the second detection party;
and the second detection party encrypts the second deployment area information through the preset encryption algorithm to obtain a second encrypted data set, detects whether the first encrypted data set and the second encrypted data set have coincident data, and sends the detected overlapping result to an auditing party.
3. The method according to claim 1, wherein the detecting the first deployment area information and the second deployment area information by the first detecting party and/or the second detecting party detects whether there is an overlapping area, and sends an overlapping result obtained by the detecting to an auditing party, includes:
the second detection party encrypts the second deployment area information through a preset encryption algorithm to obtain a second encrypted data set, and sends the second encrypted data set to the first detection party;
the first detection party encrypts the first deployment area information through the preset encryption algorithm to obtain a first encrypted data set, detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends an overlapping result obtained through detection to an auditing party.
4. The method according to claim 1, wherein the detecting the first deployment area information and the second deployment area information by the first detecting party and/or the second detecting party detects whether there is an overlapping area, and sends an overlapping result obtained by the detecting to an auditing party, includes:
the first detection party encrypts the first deployment area information through a preset encryption algorithm to obtain a first encrypted data set, and sends the first encrypted data set to the second detection party;
the second detection party encrypts the second deployment area information through a preset encryption algorithm to obtain a second encrypted data set, and sends the second encrypted data set to the first detection party;
the first detection party detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends a detected first overlapping result to an auditing party;
and the second detector detects whether the first encrypted data set and the second encrypted data set have coincident data or not, and sends a detected second overlapping result to an auditor.
5. The method according to claim 4, wherein the auditor determines the audit result of the terminal location according to the overlapping result, and the method includes:
and the auditor determines the audit result of the terminal position according to the first overlapping result, the first overlapping result weight, the second overlapping result and the second overlapping result weight.
6. The method of claim 1, wherein the second detecting party obtains the second deployment location of the terminal, and the method comprises:
and the second detection party receives a payment position returned by the user under the condition that the terminal executes payment operation, and the payment position is used as a second deployment position of the terminal.
7. The terminal position detection method of claim 6, the second detector receiving a payment position returned by a user in a case where the terminal performs a payment operation, comprising:
the second detection party receives a plurality of initial payment positions returned by a plurality of users when the terminal performs a payment operation, and determines a payment position in the plurality of initial payment positions.
8. The terminal position detection method according to claim 1, wherein the first detection party determines first deployment area information of the terminal in the electronic map, and the method comprises the following steps:
the method comprises the steps that a first detection party determines a first grid set in an electronic map according to a preset area radius, and determines first deployment area information corresponding to the first grid set, wherein the electronic map is divided into a plurality of grids in advance, and each grid is provided with a corresponding grid identifier.
9. The terminal position detection method according to claim 8, wherein the second detection party determines second deployment area information of the terminal in the electronic map, including:
and the second detection party determines a second grid set in the electronic map according to the area radius and determines second deployment area information corresponding to the second grid set.
10. The terminal location detection method of claim 1, the first detector mapping the first deployment location into an electronic map, comprising:
the first detection party converts the first deployment position into first longitude and latitude information corresponding to the first deployment position, and maps the first longitude and latitude information into an electronic map.
11. A terminal location auditing system, comprising: the system comprises a first detector, a second detector and an auditor;
the first detection party is configured to acquire a first deployment position of a terminal, map the first deployment position to an electronic map, and determine first deployment area information of the terminal in the electronic map;
the second detection party is configured to acquire a second deployment position of the terminal, map the second deployment position to the electronic map, and determine second deployment area information of the terminal in the electronic map;
the first detection party and/or the second detection party are further configured to detect whether the first deployment area information and the second deployment area information have an overlapping area, and send the detected overlapping result to an auditing party;
the auditor is configured to determine an audit result of the terminal position according to the overlapping result.
CN202010842062.2A 2020-08-20 2020-08-20 Terminal position auditing method and system Pending CN111984754A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010842062.2A CN111984754A (en) 2020-08-20 2020-08-20 Terminal position auditing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010842062.2A CN111984754A (en) 2020-08-20 2020-08-20 Terminal position auditing method and system

Publications (1)

Publication Number Publication Date
CN111984754A true CN111984754A (en) 2020-11-24

Family

ID=73442337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010842062.2A Pending CN111984754A (en) 2020-08-20 2020-08-20 Terminal position auditing method and system

Country Status (1)

Country Link
CN (1) CN111984754A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115935439A (en) * 2023-02-27 2023-04-07 蓝象智联(杭州)科技有限公司 Geographic position verification method and device based on hiding intersection and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104933557A (en) * 2015-06-17 2015-09-23 福建联迪商用设备有限公司 Method and system for preventing POS machine from being transacted in different regions
CN107622607A (en) * 2017-06-28 2018-01-23 中国银联股份有限公司 The telephone-moving monitoring system and telephone-moving monitoring method of POS terminal
CN108229947A (en) * 2018-02-11 2018-06-29 中国联合网络通信集团有限公司 Quick Response Code uses the support method of position and system, barcode scanning equipment, platform end
CN109660949A (en) * 2019-02-01 2019-04-19 Oppo广东移动通信有限公司 Radio scan control method, device, mobile terminal and storage medium
CN110099140A (en) * 2019-05-05 2019-08-06 苏州阳野自动化系统有限公司 A kind of intelligent gateway distribution determination method
CN110851869A (en) * 2019-11-14 2020-02-28 深圳前海微众银行股份有限公司 Sensitive information processing method and device and readable storage medium
CN111510862A (en) * 2020-04-24 2020-08-07 支付宝(杭州)信息技术有限公司 Terminal area positioning method and device and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104933557A (en) * 2015-06-17 2015-09-23 福建联迪商用设备有限公司 Method and system for preventing POS machine from being transacted in different regions
CN107622607A (en) * 2017-06-28 2018-01-23 中国银联股份有限公司 The telephone-moving monitoring system and telephone-moving monitoring method of POS terminal
CN108229947A (en) * 2018-02-11 2018-06-29 中国联合网络通信集团有限公司 Quick Response Code uses the support method of position and system, barcode scanning equipment, platform end
CN109660949A (en) * 2019-02-01 2019-04-19 Oppo广东移动通信有限公司 Radio scan control method, device, mobile terminal and storage medium
CN110099140A (en) * 2019-05-05 2019-08-06 苏州阳野自动化系统有限公司 A kind of intelligent gateway distribution determination method
CN110851869A (en) * 2019-11-14 2020-02-28 深圳前海微众银行股份有限公司 Sensitive information processing method and device and readable storage medium
CN111510862A (en) * 2020-04-24 2020-08-07 支付宝(杭州)信息技术有限公司 Terminal area positioning method and device and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115935439A (en) * 2023-02-27 2023-04-07 蓝象智联(杭州)科技有限公司 Geographic position verification method and device based on hiding intersection and storage medium

Similar Documents

Publication Publication Date Title
US20180220278A1 (en) System and method for securing and verifying information from transportation monitors
CN106506146A (en) Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN110232749B (en) Block chain-based inspection and evidence storage method and device and electronic equipment
CN109753811B (en) Data probe design method and device for detecting sensitive information
CN106055936B (en) Executable program data packet encrypting/decrypting method and device
CN106604362B (en) A kind of Wireless Fidelity Wi-Fi scan method and mobile terminal
CN109587110A (en) A kind of weak passwurd detection method, device, computer equipment and service server
CN110458686B (en) Method and device for determining loan risk
Markantonakis et al. Errata to: Secure smart embedded devices, platforms and applications
CN104182681B (en) Hook-based iOS (iPhone operating system) key behavior detection device and detection method thereof
CN105653947A (en) Method and device for assessing application data security risk
CN104243474A (en) Electronic device authenticity verification method and device
CN111984754A (en) Terminal position auditing method and system
CN104239799A (en) Android application program privacy stealing detection method and system based on behavior chain
CN111460524A (en) Data integrity detection method and device and computer readable storage medium
CN111209577B (en) Method and device for adding watermark data, storage medium and electronic equipment
CN113852520B (en) Data processing method and device
CN114896313B (en) Data transmission method, device, equipment and medium
CN111191273A (en) Method and device for processing document, electronic equipment and readable storage medium
Mohamed et al. Protecting wireless data transmission in mobile application systems using digital watermarking technique
CN116699258B (en) Method, system and lightning protection equipment for lightning protection detection based on radio signal
CN105991284B (en) A kind of data transmission, data receiver verification method and device to be verified
CN103763382A (en) Safe and reliable locating chip remote anti-fake authentication system and method
CN114422113B (en) Method for obtaining proximity and electronic equipment
CN115766183A (en) Evaluation method, device, equipment and medium applied to bale plucking tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination