CN112950199B - Anti-theft method and server for communication identification - Google Patents

Anti-theft method and server for communication identification Download PDF

Info

Publication number
CN112950199B
CN112950199B CN202110155475.8A CN202110155475A CN112950199B CN 112950199 B CN112950199 B CN 112950199B CN 202110155475 A CN202110155475 A CN 202110155475A CN 112950199 B CN112950199 B CN 112950199B
Authority
CN
China
Prior art keywords
terminal
unhooking
information
verification
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110155475.8A
Other languages
Chinese (zh)
Other versions
CN112950199A (en
Inventor
肖征荣
白琳
邢建兵
田新雪
张丽云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202110155475.8A priority Critical patent/CN112950199B/en
Publication of CN112950199A publication Critical patent/CN112950199A/en
Application granted granted Critical
Publication of CN112950199B publication Critical patent/CN112950199B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses an anti-theft method and a server for communication identification, and relates to the technical field of communication. The anti-theft method for the mobile phone number comprises the following steps: acquiring management verification information of a first multi-terminal management node on a hanging terminal, social security verification information and financial verification information corresponding to the hanging terminal; determining whether the mobile phone number corresponding to the hanging terminal is stolen or not according to the management verification information, the social security verification information and the financial verification information; and limiting the use authority of the unhooking terminal under the condition that the communication identification is determined to be stolen. The leakage of the user information and the loss of the user property caused by the leakage of the identity information are avoided, the safety of the user information and the property is ensured, and the user experience is improved.

Description

Anti-theft method and server for communication identification
Technical Field
The application relates to the technical field of communication, in particular to an anti-theft method and a server for a communication identifier.
Background
At present, a smart terminal (for example, a smart phone, etc.) used by a user has a network payment function, and the user also binds own identity information with the smart terminal to verify identity verification under the condition of network payment.
However, if the smart phone of the user is stolen or lost, and the business hall of the telecom operator is in a shutdown state (for example, the business hall goes off duty), the user cannot timely repair the card; although the mobile phone number can be subjected to the loss reporting treatment in a telephone calling mode, a third party can still carry out the loss reporting treatment on the mobile phone number in a telephone calling mode, so that the mobile phone number of a user is still in a stolen state, the third party can obtain user information and funds for a long time, for example, the identity information of the stolen user is obtained through the mobile phone number, and the identity information of the user is revealed; or purchase goods through the network payment function of the mobile phone, resulting in property loss of the stolen user, etc.
Disclosure of Invention
Therefore, the application provides an anti-theft method and a server for communication identifiers, which can prevent the communication identifiers from being stolen and guarantee the safety of user information and property.
To achieve the above object, a first aspect of the present application provides an anti-theft method for a communication identifier, the method including: acquiring management verification information of a first multi-terminal management node on a hanging terminal, social security verification information and financial verification information corresponding to the hanging terminal; determining whether the communication identifier corresponding to the hanging terminal is stolen or not according to the management verification information, the social security verification information and the financial verification information; and limiting the use authority of the unhooking terminal under the condition that the communication identification is determined to be stolen.
In some embodiments, the management verification information includes a first verification result and a second verification result, where the first verification result is a verification result determined according to the registered cell information corresponding to the trusted terminal and the suspension cell information of the suspension terminal when the suspension operation is performed, and the second verification result is a verification result determined according to the call record of the suspension terminal and the identifier of the trusted terminal.
In some embodiments, determining whether the communication identifier corresponding to the hanging terminal is stolen according to the management verification information, the social security verification information and the financial verification information includes: judging whether a communication identifier corresponding to the unhooking terminal logs in a social security platform according to the social security verification information, and acquiring identity card information corresponding to the communication identifier to obtain a first judgment result; judging whether the communication identifier corresponding to the unhooking terminal carries out financial transaction according to the financial verification information, and obtaining a second judgment result; judging whether the unhooking terminal is communicated with the trust terminal or not according to the management verification information, judging whether the unhooking terminal and the trust terminal are located in the same cell when the unhooking terminal performs the unhooking operation, and obtaining a third judgment result; and determining whether the communication identifier corresponding to the unhooking terminal is stolen or not according to any one or more of the first judging result, the second judging result and the third judging result.
In some implementations, limiting usage rights of the unhooked terminal in the event that the communication identity is determined to be stolen includes: generating a stolen identifier of the communication identifier corresponding to the unhooking terminal; and generating and sending an alarm message to the blockchain network according to the stolen identifier, so that each financial node in the blockchain network freezes an account corresponding to the communication identifier.
In some specific implementations, after limiting the usage rights of the unhooking terminal in the case that the communication identifier is determined to be stolen, the method further includes: acquiring fingerprint information fed back by a unhooking terminal; and carrying out liveness experience on the user of the unhooking terminal according to the fingerprint information, and determining whether to recover the use authority of the unhooking terminal.
In order to achieve the above object, a second aspect of the present application provides an anti-theft method for a communication identifier, the method comprising: acquiring registration cell information corresponding to a trust terminal and unhooking cell information of a unhooking terminal when the unhooking operation is carried out; determining a first verification result according to the registered cell information and the suspension cell information; acquiring a call record of the unhooking terminal and an identification of the trust terminal; inquiring call records according to the identification of the trust terminal, determining whether the unhooking terminal is communicated with the trust terminal, and obtaining a second verification result; and generating and sending management verification information to the blockchain network according to the first verification result and the second verification result so that the user number security assurance node obtains the management verification information, determining whether the communication identifier corresponding to the unhooking terminal is stolen according to the management verification information, the social security verification information of the unhooking terminal and the financial verification information, and limiting the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen.
In some specific implementations, the registered cell information includes registration location information and registration time of the trusted terminal, and the de-hang cell information includes de-hang time of the de-hang location information of the de-hang terminal when performing the de-hang operation; determining a first verification result according to the registered cell information and the suspension cell information, including: under the condition that the unhooking time is the same as the registration time, comparing the registration position information with the unhooking position information to obtain a comparison result; and determining a first verification result according to the comparison result, wherein the first verification result comprises that the unhooking terminal and the trust terminal are positioned in the same cell when the unhooking operation is performed, or that the unhooking terminal and the trust terminal are not positioned in the same cell when the unhooking operation is performed.
In some implementations, the call record includes an identification of the unhooking terminal and an identification of a first terminal, the first terminal being a terminal in communication with the unhooking terminal; inquiring the call record according to the identification of the trust terminal, determining whether the unhooking terminal communicates with the trust terminal, and obtaining a second verification result, including: under the condition that the identification of the trust terminal is the same as the identification of the first terminal, determining that the second verification result is that the unhooking terminal is communicated with the trust terminal; otherwise, determining that the second verification result is that the unhooking terminal and the trust terminal do not communicate.
In some embodiments, the method further includes, after determining whether the unhooking terminal has communicated with the trusted terminal according to the identifier of the trusted terminal and obtaining the second verification result, generating and sending management verification information to the blockchain network according to the first verification result and the second verification result, and before: and verifying whether the unhooking terminal has a verification password preset by a user, and obtaining a password verification result.
To achieve the above object, a third aspect of the present application provides a user number security protection node server, including: the first acquisition module is used for acquiring management verification information of the first multi-terminal management node on the unhooking terminal, social security verification information and financial verification information corresponding to the unhooking terminal; the judging module is used for determining whether the communication identifier corresponding to the hanging terminal is stolen or not according to the management verification information, the social security verification information and the financial verification information; and the limiting module is used for limiting the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen.
In order to achieve the above object, a fourth aspect of the present application provides a one-number multi-terminal management node server, which includes: the second acquisition module is used for acquiring the registered cell information corresponding to the trust terminal and the information of the unhooking cell of the unhooking terminal when the unhooking operation is carried out; the first verification module is used for determining a first verification result according to the registered cell information and the disaggregated cell information; the third acquisition module is used for acquiring call records of the unhooking terminal and the identification of the trust terminal; the second verification module is used for inquiring the call record according to the identification of the trust terminal, determining whether the unhooking terminal is communicated with the trust terminal, and obtaining a second verification result; the processing module is used for generating and sending management verification information to the blockchain network according to the first verification result and the second verification result so that the user number security assurance node obtains the management verification information, determining whether the communication identifier corresponding to the unhooking terminal is stolen according to the management verification information, the social security verification information of the unhooking terminal and the financial verification information, and limiting the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen.
According to the anti-theft method and the server for the communication identifier, the information security of the unhooking terminal can be determined by acquiring the management verification information of the first-number multi-terminal management node on the unhooking terminal, the social security verification information and the financial verification information corresponding to the unhooking terminal; according to the management verification information, the social security verification information and the financial verification information, determining whether the corresponding communication identifier of the unhooking terminal is stolen or not, and judging whether the communication identifier is stolen by others or not so as to determine whether the unhooking terminal is in a safe state or not; under the condition that the communication identification is stolen, the use authority of the unhooking terminal is limited, the leakage of user information and the loss of user property caused by the leakage of identity information are avoided, the safety of the user information and the property is ensured, and the user experience is improved.
Drawings
The accompanying drawings are included to provide a further understanding of embodiments of the disclosure, and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure, without limitation to the disclosure. The above and other features and advantages will become more readily apparent to those skilled in the art by describing in detail exemplary embodiments with reference to the attached drawings, in which:
Fig. 1 shows a flow diagram of a method for theft protection for a communication identifier in an embodiment of the present application.
Fig. 2 shows a flow diagram of a method for theft protection for a communication tag in a further embodiment of the present application.
Fig. 3 shows a flow diagram of a method for theft protection for a communication tag in a further embodiment of the present application.
Fig. 4 shows a block diagram of the components of the subscriber number security protection node server in the embodiment of the present application.
Fig. 5 shows a block diagram of the components of the one-number multi-terminal management node server in the embodiment of the present application.
Fig. 6 shows a block diagram of the components of the anti-theft system for communication identification in the embodiment of the present application.
Fig. 7 shows a flow chart of a working method of the anti-theft system with communication identification in the embodiment of the application.
In the drawings:
401: the first acquisition module 402: judgment module
403: the restriction module 501: second acquisition module
502: the first verification module 503: third acquisition module
504: the second verification module 505: processing module
610: user number security assurance node server 620: unhooking terminal
640: social security node server
630: loss reporting terminal 650: bank supervision node server
660: the network credit platform supervision node server 670: operator node server
672: operator core network node server
671: operator short message node server 673: user behavior analysis node server
680: trust terminal
690: one-number multi-terminal management node server
Detailed Description
The following detailed description of specific embodiments of the present application refers to the accompanying drawings. It should be understood that the detailed description is presented herein for purposes of illustration and explanation only and is not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by showing examples of the present application.
In the technical solution according to the present application, the acquisition of the personal information data of the user complies with the relevant national laws and regulations (for example, information security technology personal information security standards). The information obtaining mode is to clearly inform the user and pass through legal way; the obtained information type is directly related to the business function of the product or service, and the obtained information is the lowest frequency and the least quantity of information is collected; collecting personal information without violating the autonomous willingness of the personal information body; obtaining authorization consent when personal information is collected; when obtaining the personal information indirectly, or disclosing a dataset for the network, or otherwise, and following the regulatory requirements for obtaining the indirect personal information.
In addition, the storage of the personal information data of the user in the technical proposal related to the application complies with the national relevant laws and regulations (for example, the information security technology personal information security standards and the like). If the technical solution involves the following specific operations, the following corresponding processing manner may be further selected: the personal information storage time is minimized; the personal information is subjected to de-identification treatment; encrypting and storing personal sensitive information; the personal biological information is stored separately from the personal identity information; the original personal bio-information is not stored, such as storing only summary information, or using only it, or deleting the original personal bio-information after use.
The use of user data in the technical scheme complies with national relevant laws and regulations (for example, information security technology personal information security standards, etc.). Such as: the personal information access control takes corresponding prescribed measures; presentation of personal information gives regulatory restrictions; the personal information is not used beyond the direct or reasonable association range; the definite identity directivity is eliminated when personal information is used, and accurate positioning to specific individuals is avoided.
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 shows a flow diagram of a method for theft protection for a communication identifier in an embodiment of the present application. The anti-theft method of the communication identifier can be applied to the user number security assurance node server. As shown in fig. 1, the anti-theft method of the communication identifier includes the following steps:
step S101, acquiring management verification information of a one-number multi-terminal management node on a hanging terminal, social security verification information and financial verification information corresponding to the hanging terminal.
The communication identifier may be an identifier that can characterize the communication of the unhooking terminal, such as a mobile phone number or a device identifier corresponding to the unhooking terminal. The management verification information comprises a first verification result and a second verification result, wherein the first verification result is determined according to the registered cell information corresponding to the trust terminal and the unhooking cell information of the unhooking terminal when the unhooking operation is carried out, and the second verification result is determined according to the call record of the unhooking terminal and the identification of the trust terminal.
The social security verification information is information determined by the social security node server searching the social security database through the communication identifier corresponding to the hanging terminal, and for example, the social security verification information includes information such as whether the communication identifier is logged in the social security node server, whether the communication identifier obtains user identity information corresponding to the communication identifier, operation time and the like. The social security verification information is only exemplified above, and can be specifically set according to actual needs, and other non-illustrated social security verification information is also within the protection scope of the present application, and is not described herein again.
The financial verification information is information determined by searching a corresponding database by the bank supervision node server and/or the network credit platform supervision node server through the communication identification corresponding to the unhooking terminal. For example, the financial verification information includes: the bank supervision node server searches the bank database through the communication identifier corresponding to the unhooking terminal, and determines whether the communication identifier logs in the bank system and carries out information of financial transactions (such as login, registration, binding card, transfer and other financial operation information), time information corresponding to the information of the financial transactions and the like. The financial verification information may further include: the network loan platform supervision node server searches the network loan database through the communication identifier corresponding to the hanging terminal, and determines whether the communication identifier performs network loan operation, network loan operation information (such as information of login, registration, loan and other operations) during the network loan operation, time information corresponding to the performed network loan operation information and the like. The above-mentioned financial verification information is only exemplified, and can be specifically set according to actual needs, and other non-explained financial verification information is also within the protection scope of the present application, and is not described herein again.
It should be noted that, the first multi-terminal management node, the protecting node server, the bank supervision node server and the network credit platform supervision node server all query and confirm the communication identifier under the condition of obtaining the user authorization consent. The obtained information type is directly related to the business function of the product or service, and the obtained information is collected with the lowest frequency and the least quantity, and the personal information is collected without violating the autonomous willingness of the personal information body.
Step S102, determining whether the communication identifier corresponding to the hanging terminal is stolen or not according to the management verification information, the social security verification information and the financial verification information.
In the process of determining whether the communication identifier corresponding to the unhooking terminal is stolen, any one or more of management verification information, social security verification information and financial verification information can be used to ensure the security of the communication identifier.
In some embodiments, determining whether the communication identifier corresponding to the hanging terminal is stolen according to the management verification information, the social security verification information and the financial verification information includes: judging whether a communication identifier corresponding to the unhooking terminal logs in a social security platform according to the social security verification information, and acquiring identity card information corresponding to the communication identifier to obtain a first judgment result; judging whether the communication identifier corresponding to the unhooking terminal carries out financial transaction according to the financial verification information, and obtaining a second judgment result; judging whether the unhooking terminal is communicated with the trust terminal or not according to the management verification information, judging whether the unhooking terminal and the trust terminal are located in the same cell when the unhooking terminal performs the unhooking operation, and obtaining a third judgment result; and determining whether the communication identifier corresponding to the unhooking terminal is stolen or not according to any one or more of the first judging result, the second judging result and the third judging result.
The first judgment result comprises that the communication identifier logs in the social security platform and acquires identity card information and login time corresponding to the communication identifier; or, the communication identifier is not logged into the social security platform.
The second judgment result comprises financial transaction (such as information of login, registration, binding, transfer, loan and other operations) and financial transaction time information of the communication identification; or, the communication identifies that the financial transaction has not been conducted.
The third judgment result comprises that when the unhooking terminal and the trust terminal are communicated and the unhooking terminal performs unhooking operation, the unhooking terminal and the trust terminal are located in the same cell; or when the un-hung terminal does not communicate with the trust terminal and the un-hung terminal performs the un-hung operation, the un-hung terminal and the trust terminal are positioned in different cells.
When any one or more of the following conditions are met, determining that the communication identifier corresponding to the unhooking terminal is not stolen: the method comprises the steps that when a first judgment result is that a communication identifier is not logged in a social security platform, a second judgment result is that the communication identifier is not subjected to financial transaction, and a third judgment result is that a unhooking terminal is in communication with a trust terminal and the unhooking terminal performs unhooking operation, the unhooking terminal and the trust terminal are located in the same cell; otherwise, determining that the communication identifier corresponding to the unhooking terminal is stolen.
Step S103, limiting the use authority of the unhooking terminal under the condition that the communication identification is determined to be stolen.
The use authority of the unhooking terminal comprises any one or more of the authorities of receiving and sending short messages, dialing calls, carrying out network communication and the like. Under the condition that the communication identification is stolen, the user number security assurance node server can close any one or more of the above-mentioned use rights of the unhooking terminal. The above usage rights of the unhooking terminal are only exemplified, and can be specifically set according to actual needs, and the usage rights of other unexplained unhooking terminals are also within the protection scope of the application, and are not described herein.
In some implementations, limiting usage rights of the unhooked terminal in the event that the communication identity is determined to be stolen includes: generating a stolen identifier of the communication identifier corresponding to the unhooking terminal; and generating and sending an alarm message to the blockchain network according to the stolen identifier, so that each financial node in the blockchain network freezes an account corresponding to the communication identifier.
The financial nodes comprise any one or more of a network credit platform supervision node server, a bank supervision node server and a network payment platform server. Under the condition that the communication identifier is determined to be stolen, each financial node acquires the stolen identifier from the blockchain network, closes or freezes an account corresponding to the communication identifier according to the stolen identifier, thereby avoiding the fund loss of the user and improving the property safety of the user.
In this embodiment, the information security of the suspension terminal may be determined by acquiring management verification information of the suspension terminal by the one-number multi-terminal management node, social security verification information and financial verification information corresponding to the suspension terminal; according to the management verification information, the social security verification information and the financial verification information, determining whether the corresponding communication identifier of the unhooking terminal is stolen or not, and judging whether the communication identifier is stolen by others or not so as to determine whether the unhooking terminal is in a safe state or not; under the condition that the communication identification is stolen, the use authority of the unhooking terminal is limited, the leakage of user information and the loss of user property caused by the leakage of identity information are avoided, the safety of the user information and the property is ensured, and the user experience is improved.
Fig. 2 shows a flow diagram of a method for theft protection for a communication tag in a further embodiment of the present application. The anti-theft method of the communication identifier can be applied to the user number security assurance node server. As shown in fig. 2, the anti-theft method of the communication identifier includes the following steps:
step S201, obtaining management verification information of the one-number multi-terminal management node on the unhooking terminal, social security verification information and financial verification information corresponding to the unhooking terminal.
Step S202, determining whether the communication identifier corresponding to the hanging terminal is stolen or not according to the management verification information, the social security verification information and the financial verification information.
Step S203, limiting the use authority of the unhooking terminal under the condition that the communication identification is determined to be stolen.
It should be noted that, steps S201 to S203 in the present embodiment are the same as steps S101 to S103 in the previous embodiment, and are not described herein.
Step S204, fingerprint information fed back by the unhooking terminal is obtained.
The fingerprint information is obtained by a user of the unhooking terminal through a fingerprint collector on the unhooking terminal, and the collection and the use of the fingerprint information are authorized and agreed by the user.
It should be noted that the fingerprint information is only used for authenticating a user, and when the fingerprint information is stored, the fingerprint needs to be encrypted, and the encrypted fingerprint information and the personal identity information of the user are stored separately, so as to ensure the security of the personal information.
Step S205, a user of the unhooking terminal is subjected to liveness experience according to the fingerprint information, and whether the use authority of the unhooking terminal is restored is determined.
The living body verification is to compare the prestored fingerprint information of the registered user corresponding to the mobile phone number built in the unhooking terminal with the fingerprint information of the user currently reported by the unhooking terminal, and if the two fingerprint information are the same, the user is the registered user corresponding to the mobile phone number, so that the use authority of the unhooking terminal can be recovered; otherwise, the standard user is a third party, the user cannot recover the use authority of the unhooking terminal, the user cannot be provided with the use authority of the unhooking terminal on line, the registered user corresponding to the mobile phone number built in the unhooking terminal is required to recover the use authority of the mobile phone number to an off-line operator business hall.
The mobile phone number is prevented from being stolen by a third party, leakage of user information and loss of user property caused by identity information leakage are avoided, safety of the user information and property is guaranteed, and user experience is improved.
Fig. 3 shows a flow diagram of a method for theft protection for a communication tag in a further embodiment of the present application. The anti-theft method of the communication identifier can be applied to a one-number multi-terminal management node server. As shown in fig. 3, the anti-theft method of the communication identifier includes the following steps:
Step S301, obtaining the registered cell information corresponding to the trust terminal and the information of the un-suspended cell of the un-suspended terminal when the un-suspended operation is carried out.
The registration cell information comprises registration position information and registration time of the trust terminal, and the release cell information comprises release time of release position information of the release terminal when the release operation is carried out.
For example, the registration location information includes longitude information, latitude information, and the like of the trusted terminal at the time of cell registration. The information of the unhooking position comprises longitude information, latitude information and the like of the unhooking terminal when the unhooking operation is carried out.
Step S302, determining a first verification result according to the registered cell information and the suspension cell information.
The first verification result is used for representing whether the registered cell information and the hanged cell information are the same or similar, and further verifying whether the positions of the trust terminal and the hanged terminal are the same or similar.
In some implementations, determining the first verification result based on the registration cell information and the suspension cell information includes: under the condition that the unhooking time is the same as the registration time, comparing the registration position information with the unhooking position information to obtain a comparison result; and determining a first verification result according to the comparison result, wherein the first verification result comprises that the unhooking terminal and the trust terminal are positioned in the same cell when the unhooking operation is performed, or that the unhooking terminal and the trust terminal are not positioned in the same cell when the unhooking operation is performed.
In the case that the un-hung terminal is determined not to be in the same cell as the trust terminal when the un-hung operation is performed, it is indicated that the un-hung terminal may not be a terminal familiar to the trust terminal, that is, the un-hung terminal may be a terminal used by a third party.
Step S303, obtaining the call record of the unhooking terminal and the identification of the trust terminal.
The call record comprises an identifier of the unhooking terminal and an identifier of a first terminal, and the first terminal is a terminal which communicates with the unhooking terminal.
Step S304, inquiring the call record according to the identification of the trust terminal, determining whether the unhooking terminal is communicated with the trust terminal, and obtaining a second verification result.
If the unhooking terminal communicates with the trust terminal, the identification of the unhooking terminal can be found in the call record; otherwise, the identity of the unhooking terminal is not in the call record.
In some implementations, querying a call record according to an identifier of the trusted terminal, determining whether the unhooking terminal has communicated with the trusted terminal, and obtaining a second verification result includes: under the condition that the identification of the trust terminal is the same as the identification of the first terminal, determining that the second verification result is that the unhooking terminal is communicated with the trust terminal; otherwise, determining that the second verification result is that the unhooking terminal and the trust terminal do not communicate.
For example, the identifier of the trusted terminal is 135XXXX6565, and the identifier of the first terminal is also 135XXXX6565 by searching the call record, which indicates that the identifier of the trusted terminal is the same as the identifier of the first terminal, and determines that the unhooked terminal is in communication with the trusted terminal.
Step S305, according to the first verification result and the second verification result, generating and transmitting management verification information to the blockchain network.
When the user number security guarantee node obtains the management verification information from the blockchain network, whether the communication identifier corresponding to the unhooking terminal is stolen or not is determined according to the management verification information, the social security verification information and the financial verification information of the unhooking terminal, and the use authority of the unhooking terminal is limited under the condition that the communication identifier is determined to be stolen.
In some implementations, after performing step S304, before step S305, further includes: and verifying whether the unhooking terminal has a verification password preset by a user, and obtaining a password verification result.
The password verification result comprises that the verification of the unhooking terminal is successful or the verification of the unhooking terminal is failed. In specific implementation, the loss reporting terminal can verify the releasing terminal, or the one-number multi-terminal management node server can verify the releasing terminal.
For example, when the hanging-up terminal verifies the hanging-up terminal, the hanging-up terminal performs hash operation on a password to be verified (for example, abcv) to obtain a hash value to be verified, performs private key signature on the hash value to be verified, generates a signed message to be verified, and sends the signed message to be verified to the blockchain network, so that the hanging-up terminal obtains the hash value to be verified.
When the loss reporting terminal obtains a message to be verified, which is sent by the unhooking terminal, from the blockchain network, the private key signature of the message to be verified is verified, and when the verification passes, a hash value to be verified is obtained. Meanwhile, the loss reporting terminal performs hash calculation on a preset password (for example, abcv) preset by a user and stored in advance to obtain a preset hash value; comparing a preset hash value with a hash value to be verified, and determining that the verification of the unhooking terminal is successful when the preset hash value is the same as the hash value to be verified; otherwise, determining that the verification of the unhooking terminal fails.
In the embodiment, determining a first verification result according to the acquired registered cell information corresponding to the trust terminal and the information of the unhooking cell of the unhooking terminal when the unhooking operation is performed, and verifying whether the unhooking terminal and the trust terminal are located in the same cell when the unhooking terminal is in the same cell; acquiring a call record of the unhooking terminal and an identifier of the trust terminal, inquiring the call record according to the identifier of the trust terminal, determining whether the unhooking terminal is communicated with the trust terminal, and acquiring a second verification result; and generating and sending management verification information to the blockchain network according to the first verification result and the second verification result, so that the user number security assurance node obtains the management verification information, determines whether the communication identifier corresponding to the unhooking terminal is stolen according to the management verification information, the social security verification information of the unhooking terminal and the financial verification information, limits the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen, ensures the safety of the communication identifier, avoids the property loss of a stolen user, improves the safety of the user and improves the user experience.
Fig. 4 shows a block diagram of the components of the subscriber number security protection node server in the embodiment of the present application. As shown in fig. 4, the user number security protection node server specifically includes the following modules:
a first obtaining module 401, configured to obtain management verification information of a first multi-terminal management node on a suspension terminal, social security verification information and financial verification information corresponding to the suspension terminal; a judging module 402, configured to determine whether a communication identifier corresponding to the hanging terminal is stolen according to the management verification information, the social security verification information and the financial verification information; and the limiting module 403 is configured to limit the usage rights of the hanging terminal when the communication identifier is determined to be stolen.
In this embodiment, the first acquisition module acquires management verification information of the first multi-terminal management node on the unhooking terminal, social security verification information and financial verification information corresponding to the unhooking terminal, so that information security of the unhooking terminal can be determined; the use judging module is used for determining whether the corresponding communication identifier of the unhooking terminal is stolen or not according to the management verification information, the social security verification information and the financial verification information, and judging whether the communication identifier is stolen by other people or not so as to determine whether the unhooking terminal is in a safe state or not; under the condition that the communication identification is determined to be stolen, the use restriction module restricts the use authority of the unhooking terminal, avoids the leakage of user information and the loss of user property caused by the leakage of identity information, ensures the safety of the user information and the property, and improves the user experience.
Fig. 5 shows a block diagram of the components of the one-number multi-terminal management node server in the embodiment of the present application. As shown in fig. 5, the one-number multi-terminal management node server specifically includes the following modules:
a second obtaining module 501, configured to obtain registered cell information corresponding to a trusted terminal and suspension cell information when a suspension terminal performs a suspension operation; a first verification module 502, configured to determine a first verification result according to the registered cell information and the suspension cell information; a third obtaining module 503, configured to obtain a call record of the hanging terminal and an identifier of the trusted terminal; a second verification module 504, configured to query a call record according to the identifier of the trusted terminal, determine whether the unhooking terminal has communicated with the trusted terminal, and obtain a second verification result; the processing module 505 is configured to generate and send management verification information to the blockchain network according to the first verification result and the second verification result, so that the user number security protection node obtains the management verification information, determine whether the communication identifier corresponding to the unhooking terminal is stolen according to the management verification information, the social security verification information of the unhooking terminal, and the financial verification information, and limit the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen.
In the embodiment, a first verification result is determined according to the registered cell information corresponding to the trust terminal and the unhooking cell information of the unhooking terminal when the unhooking operation is performed by the first verification module, and whether the unhooking terminal and the trust terminal are located in the same cell when the unhooking is performed is verified; acquiring call records of the unhooking terminal and the identification of the trust terminal through a third acquisition module; inquiring call records according to the identification of the trust terminal by using a second verification module, and determining whether the unhooking terminal is communicated with the trust terminal or not to obtain a second verification result; the use processing module generates and transmits management verification information to the blockchain network according to the first verification result and the second verification result, so that the user number security assurance node obtains the management verification information, determines whether the communication identifier corresponding to the unhooking terminal is stolen according to the management verification information, the social security verification information of the unhooking terminal and the financial verification information, limits the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen, ensures the security of the communication identifier, avoids the property loss of a stolen user, improves the security of the user, and improves the user experience.
It should be noted that each module in this embodiment is a logic module, and in practical application, one logic unit may be one physical unit, or may be a part of one physical unit, or may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present application, elements that are not so close to solving the technical problem presented in the present application are not introduced in the present embodiment, but it does not indicate that other elements are not present in the present embodiment.
Fig. 6 shows a block diagram of the components of the anti-theft system for communication identification in the embodiment of the present application. As shown in fig. 6, the anti-theft system for communication identification specifically includes the following devices: the system comprises a user number security assurance node server 610, a hanging terminal 620, a loss reporting terminal 630, a social security node server 640, a bank supervision node server 650, a network credit platform supervision node server 660, an operator node server 670, a trust terminal 680 and a number one multi-terminal management node server 690.
The communication identifier may be a mobile phone number in a one-number multi-terminal service, where the mobile phone number is a number corresponding to user information obtained after user agreeing. The mobile phone number corresponding to the drop terminal 620 is the same as the mobile phone number corresponding to the loss terminal 630 (e.g., the drop terminal 620 and the loss terminal 630 are two terminals in a one-number multi-terminal service). In the case that the loss reporting terminal 630 is lost, the unhooking terminal 620 may be configured to perform the unhooking processing on the mobile phone number corresponding to the loss reporting terminal 630.
The trusted terminal 680 is a terminal trusted by the registered user corresponding to the un-hung terminal 620 (for example, the trusted terminal 680 is a terminal used by a family member of the registered user, or may be a terminal used by a user in a buddy list of the address book in the un-hung terminal 620). The operator node server 670 includes: an operator short message node server 671, an operator core network node server 672, and a user behavior analysis node server 673.
The anti-theft system of the mobile phone number uses a blockchain network to communicate among the devices.
Fig. 7 shows a flow chart of a working method of the anti-theft system with communication identification in the embodiment of the application. As shown in fig. 7, the method specifically comprises the following steps.
In step S701, the loss reporting terminal 630 logs in to the operator node server 670 to report the loss of the mobile phone number (i.e., the number to be verified, for example, 186XXXX 8866) corresponding to the loss reporting terminal 630.
For example, the loss report terminal 630 may log into the carrier node server 670 through a call to a customer service phone (such as 10010/10000/10086) of the carrier, or through a mobile phone client (such as a mobile phone business hall) of the loss report terminal 630, to perform the loss report processing of the number to be verified, and generate loss report information. The loss information includes any one or more of a device identifier of the loss terminal 630, location information (e.g., latitude and longitude information, etc.) of the loss terminal 630, and communication information of the loss terminal 630.
For example, the communication information of the loss reporting terminal 630 includes base station cell information (e.g., physical cell identity (Physical Cell Identifier, PCI) and the like) where the loss reporting terminal 630 is located, IMSI corresponding to the loss reporting terminal 630, and the like.
In step S702, the unhooking terminal 620 logs in the operator node server 670 and performs the unhooking operation on the number to be verified.
For example, the unhooking terminal 620 may log into the operator node server 670 through a call to an operator customer service phone (e.g. 10010/10000/10086, etc.), or through a mobile phone client (e.g. a mobile phone business hall) of the unhooking terminal 620, etc. to perform the unhooking process of the number to be verified. The information of the suspension includes any one or more of a device identifier of the suspension terminal 620, location information (e.g., latitude and longitude information, etc.) of the suspension terminal 620, and communication information of the suspension terminal 620.
For example, the communication information of the suspension terminal 620 includes base station cell information (e.g., PCI, etc.) where the suspension terminal 620 is located, IMSI corresponding to the suspension terminal 620, etc.
In step S703, the operator node server 670 reports the loss reporting information and the loss releasing information corresponding to the number to be verified to the user number security assurance node server 610.
Because the number to be verified is subjected to the loss reporting process and then is subjected to the loss knowing process, and the two processes are executed by different terminals, the user number security assurance node server 610 marks the number to be verified as a mobile phone number with the risk of theft, and starts the monitoring operation of the number to be verified so as to prevent the number to be verified from being stolen.
In step S704, the user number security node server 610 generates a first broadcast message according to the number to be verified (e.g. 186xxxx 8888), the loss information and the suspension information.
In step S705, the user number security assurance node server 610 signs the first broadcast message using its own private key, and generates and transmits the signed first broadcast message to the blockchain network, so that other nodes in the blockchain network obtain the first broadcast message.
Step S706, when the social security node server 640 in the blockchain network receives the first broadcast message and verifies the private key signature thereof, the social security node server 640 obtains the number to be verified, searches its own database according to the number to be verified, and obtains a first search result, where the first search result includes: whether the number to be verified logs in the social security node server 640 and whether the number to be verified acquires user identity information corresponding to the number to be verified; if it is determined that the user logs in to the social security node server 640, social security verification information is generated according to the operation information of the number to be verified on the social security node server 640, the time information corresponding to the operation information and the identity information corresponding to the number to be verified. And signs the social security verification information with a private key, and generates and transmits the signed social security verification information to the blockchain network, so that the user number security assurance node server 610 obtains the social security verification information.
In step S707, the bank supervision node server 650 receives the first broadcast message, verifies the private key signature thereof, obtains the number to be verified, searches its own internal database according to the number to be verified, and obtains a second search result, where the second search result includes information about whether the number to be verified is logged in the banking system and performs financial transactions (e.g., login, registration, binding, transfer, etc.) and time information corresponding to the information for performing financial transactions. The bank supervision node server 650 generates first financial verification information according to the number to be verified, the information of the financial transaction corresponding to the number to be verified, and the time information corresponding to the information of the financial transaction, signs the first financial verification information by using its private key, and generates and transmits the signed first financial verification information to the blockchain network, so that the user number security assurance node server 610 obtains the first financial verification information.
In step S708, the network loan platform supervision node server 660 receives the first broadcast message, verifies the private key signature thereof, obtains the number to be verified, searches its own internal database according to the number to be verified, and obtains a third search result, where the third search result includes whether the number to be verified performs network loan operation, network loan operation information (such as information of login, registration, loan, etc.) during the network loan operation, and time information corresponding to the performed network loan operation information. The network credit platform supervision node server 660 generates second financial verification information according to the number to be verified, the network credit operation information corresponding to the number to be verified and the time information corresponding to the network credit operation information, signs the second financial verification information by using a private key of the user, and generates and transmits the signed second financial verification information to the blockchain network so that the user number security assurance node server 610 obtains the second financial verification information.
Step S709, when the operator short message node server 671 in the blockchain network receives the first broadcast message, the private key signature of the first broadcast message is verified, and then the number to be verified is obtained; according to the number to be verified, calling a short message record corresponding to the number to be verified; judging whether the number to be verified sends short messages to a plurality of strange numbers or not according to the short message records, and whether the number to be verified receives verification short messages sent by a plurality of banks or verification short messages sent by a network credit platform or the like or not, so as to obtain a judging result; and generating a short message verification message according to the judging result and the number to be verified, carrying out private key signature on the short message verification message, generating and sending the signed short message verification message to the blockchain network, so that the user number security assurance node server 610 obtains the short message verification message.
Step S710, when the user behavior analysis node server 673 in the blockchain network receives the first broadcast message, and after the private key signature thereof passes verification, a number to be verified is obtained, and the internal database of the user is searched according to the number to be verified, so as to obtain a fourth search result, wherein the fourth search result comprises a call record corresponding to the number to be verified; judging whether the number to be verified is subjected to a conversation with a plurality of strange telephone numbers according to the conversation record; if so, the call log information is private key signed, and a call log verification message is generated and sent to the blockchain network, so that the user number security assurance node server 610 obtains the call log verification message.
In step S711, the user number security assurance node server 610 obtains social security verification information, first financial verification information, second financial verification information, short message verification message, and call record verification message from the blockchain network, respectively. The private key signatures of the respective authentication messages are then separately authenticated. And when the verification is passed, obtaining the number to be verified. Acquiring identity card information according to whether the user logs in the social security node server 640 through the terminal according to the number to be verified; whether to log in the bank supervision node server 650 for relevant operation; whether to log in the network credit platform supervision node server 660 for registering and binding cards; and judging whether operation information and the like of verification short messages sent by a plurality of banks and network credit platform servers are received or not according to the operation information and information such as identification, position information, call records and the like of user terminal equipment used by a user when carrying out loss reporting and unhooking processing on a number to be verified. If any one or more of the following conditions are determined to be met: 1) The number to be verified is directed to a plurality of strange numbers for communication; 2) Registering, swiping and other operations are carried out by logging in a plurality of network credit platform servers or banks; 3) The identity of the terminal device that performs the loss reporting and the loss releasing processes is different from the identity of the terminal device stored in the operator core network node server 672, 4) the registered cell information is different, and 5) the geographic location is different. And indicating that the number to be verified is at risk of being stolen, and generating the identification to be verified.
Step S712, according to the identifier to be verified, generates and sends a verification message to the one-number multi-terminal management node server 690.
Step S713, the first multi-terminal management node server 690 obtains a verification message from the blockchain network; and obtaining the identification to be verified through analyzing the verification message. And generating and respectively sending an authentication request to the loss reporting terminal 630 and the loss releasing terminal 620 according to the identification to be verified, so that the loss releasing terminal 620 and the loss reporting terminal 630 perform mutual authentication.
In step S714, the hanging terminal 620 and the loss reporting terminal 630 perform mutual authentication.
Specifically, the unhooking terminal 620 performs hash operation on the password to be verified to obtain a hash value to be verified, performs private key signing on the hash value to be verified, generates a signed message to be verified, and sends the signed message to be verified to the blockchain network, so that the unhooking terminal 630 obtains the hash value to be verified. When the loss reporting terminal 630 obtains the message to be verified from the blockchain network, which is sent by the unhooking terminal 620, the private key signature of the message to be verified is verified, and when the verification passes, the hash value to be verified is obtained. Meanwhile, the loss reporting terminal 630 performs hash calculation on a preset password preset by a user and stored in advance to obtain a preset hash value; comparing the preset hash value with the hash value to be verified, and determining that the verification of the unhooking terminal 620 is passed when the preset hash value is the same as the hash value to be verified; otherwise, it is determined that authentication of the hanging terminal 620 fails.
In step S715, the loss reporting terminal 630 sends the result of mutual authentication to the one-number multi-terminal management node server 690.
Wherein, the result of the mutual authentication includes authentication success or authentication failure.
For example, when the loss reporting terminal 630 determines that the verification of the drop terminal 620 fails, the loss reporting terminal 630 generates a verification failure identification; based on the authentication failure identifier and the device identifier of the suspension terminal 620, an authentication failure message is generated and sent to the blockchain network, so that the one-number multi-terminal management node server 690 obtains the authentication failure identifier. When the loss report terminal 630 determines that the verification of the drop terminal 620 is successful, the loss report terminal 630 generates and sends a verification success message to the blockchain network to cause the one-number multi-terminal management node server 690 to determine that the loss report terminal 630 successfully verifies the drop terminal 620.
In step S716, when it is determined that the loss reporting terminal 630 successfully authenticates the drop terminal 620, the one-number multi-terminal management node server 690 sends an authentication request to the trusted terminal 680 in the blockchain network, so that the trusted terminal 680 can authenticate the drop terminal 620 again.
In step S717, the trust terminal 680 sends the registered cell information of itself and the identifier of the trust terminal 680 to the blockchain network, so that the one-number multi-terminal management node server 690 obtains the registered cell information corresponding to the trust terminal 680 and the suspension cell information of the suspension terminal 620 when the suspension operation is performed.
In step S718, the first multi-terminal management node server 690 determines a first verification result according to the acquired registered cell information corresponding to the trusted terminal 680 and the suspension cell information of the suspension terminal 620 when the suspension operation is performed, where the first verification result includes: the disassociation terminal 620 is located in the same cell as the trust terminal 680 when performing the disassociation operation. And queries the call record of the hanging terminal 620 according to the identifier of the trusted terminal 680, and determines a second verification result, where the second verification result includes whether the call record includes the identifier of the trusted terminal 680, that is, whether the trusted terminal 680 has been in a call with the hanging terminal 620. Then, according to the first verification result and the second verification result, management verification information is generated and sent to the blockchain network, so that the user number security assurance node server 610 performs re-verification on the hanging-up terminal 620 according to the management verification information.
Step S719, after obtaining the management verification information, the user number security assurance node server 610 determines that the disconnected terminal 620 is located in the same cell as the trusted terminal 680 when the disconnected terminal 620 performs the disconnected operation, and determines that the verification of the disconnected terminal 620 is successful when the trusted terminal 680 has communicated with the disconnected terminal 620; otherwise, it is determined that authentication of the hanging terminal 620 fails.
When it should be noted that, in the case that the authentication of the unhooking terminal 620 is determined to be successful, the user number security assurance node server 610 sends an authentication success message to the operator core network node server 672, so that the unhooking terminal 620 can normally use the number to be authenticated.
Step S720, the user number security assurance node server 610 generates an identifier that the mobile phone number corresponding to the hanging terminal 620 is stolen if determining that the verification of the hanging terminal 620 fails; and generating and sending an alarm message to the blockchain network according to the stolen identifier, so that each node in the blockchain network freezes an account corresponding to the communication identifier.
For example, when the bank supervision node server 650 and the network credit platform supervision node server 660 obtain the alarm message from the blockchain network, according to the device identifier of the unhooking terminal 620, the financial account corresponding to the unhooking terminal 620 is searched and obtained, and the financial account is frozen, so as to avoid property loss of the user and improve the security of the user.
When the operator core network node server 672 obtains the alarm message from the blockchain network, the communication function of the drop terminal 620 is stopped, and the drop terminal 620 is locked.
When the social security node server 640 obtains the alarm message from the blockchain network, the account login corresponding to the unhooking terminal 620 is forbidden, so as to ensure the safety of the identity information of the user.
In some embodiments, in the case that the unhooking terminal 620 determines that the communication function of the unhooking terminal 620 is stopped, the unhooking terminal 620 still needs to continue to use the mobile phone number, and the unhooking terminal 620 needs to upload fingerprint information of a user of the unhooking terminal 620 to the user number security assurance node server 610, so that the user number security assurance node server 610 performs live experience authentication on the user of the unhooking terminal 620 according to the fingerprint information, thereby determining whether to restore the use authority of the unhooking terminal 620.
If it is determined that the liveness experience fails, that is, the user of the hanging terminal 620 is not a registered user of the mobile phone number, the communication function of the hanging terminal 620 is still stopped, for example, the user of the hanging terminal 620 is stopped to make a call, surfing the internet, receiving and sending a short message, and the like. Meanwhile, the identifier of the unhooking terminal 620 and the identifier of the stolen mobile phone number corresponding to the unhooking terminal 620 are sent to the blockchain network, so that other nodes in the blockchain network are ensured not to perform on-line opening operation for the user of the unhooking terminal 620.
In this embodiment, during non-business hours of a business hall (for example, during hours of working hours), two different terminals in a one-number multi-terminal service respectively perform a reporting loss operation and a resolving operation on a number to be verified, and a user number security assurance node server judges whether the number to be verified is at risk of being stolen or not through multiple verification information such as social security verification information, first financial verification information, second financial verification information, short message verification information, call record verification information and the like obtained from a blockchain network, and comprehensively measures the security of the number to be verified; under the condition that the to-be-verified number is determined to be not stolen, the password to be verified is used for enabling the unhooking terminal and the loss reporting terminal to carry out mutual authentication, and under the condition that the loss reporting terminal is determined to pass the verification of the unhooking terminal, the trust terminal is used for carrying out the re-verification of the unhooking terminal again, so that the accuracy of a verification result is ensured, and whether the to-be-verified number is stolen is further determined. Under the condition that the number to be verified is stolen, the communication function of the unhooking terminal is stopped, and the financial account corresponding to the unhooking terminal is frozen through a bank supervision node server and a network credit platform supervision node server in the blockchain network, so that the property loss of a stolen user is avoided, the safety of the user is improved, and the user experience is improved.
It is to be understood that the above embodiments are merely illustrative of the exemplary embodiments employed to illustrate the principles of the present application, however, the present application is not limited thereto. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the application, and are also considered to be within the scope of the application.

Claims (9)

1. A method for theft protection for a communication tag, the method comprising:
acquiring management verification information of a first multi-terminal management node on a hanging-off terminal, social security verification information and financial verification information corresponding to the hanging-off terminal;
the management verification information comprises a first verification result and a second verification result, the first verification result is a verification result determined according to the registered cell information corresponding to the trust terminal and the unhooking cell information of the unhooking terminal when the unhooking operation is carried out, and the second verification result is a verification result determined according to the call record of the unhooking terminal and the identification of the trust terminal;
determining whether the communication identifier corresponding to the hanging terminal is stolen or not according to the management verification information, the social security verification information and the financial verification information;
And determining whether the communication identifier corresponding to the hanging terminal is stolen according to the management verification information, the social security verification information and the financial verification information, including:
judging whether a communication identifier corresponding to the unhooking terminal logs in a social security platform according to the social security verification information, and acquiring identity card information corresponding to the communication identifier to obtain a first judgment result;
judging whether the communication identifier corresponding to the unhooking terminal carries out financial transaction according to the financial verification information, and obtaining a second judgment result;
judging whether the unhooking terminal is communicated with the trust terminal according to the management verification information, judging whether the unhooking terminal and the trust terminal are located in the same cell when the unhooking terminal performs unhooking operation, and obtaining a third judgment result;
determining whether the communication identifier corresponding to the unhooking terminal is stolen or not according to any one or more of the first judging result, the second judging result and the third judging result;
and limiting the use authority of the unhooking terminal under the condition that the communication identification is determined to be stolen.
2. The method according to claim 1, wherein limiting the usage rights of the unhooked terminal in case it is determined that the communication identity is stolen comprises:
Generating a stolen identifier of the communication identifier corresponding to the unhooking terminal;
and generating and sending an alarm message to the blockchain network according to the stolen identifier, so that each node in the blockchain network freezes an account corresponding to the communication identifier.
3. The method according to claim 1, wherein after limiting the usage rights of the hanging terminal in case it is determined that the communication identity is stolen, further comprising:
acquiring fingerprint information fed back by the unhooking terminal;
and carrying out liveness experience on the user of the unhooking terminal according to the fingerprint information, and determining whether to recover the use authority of the unhooking terminal.
4. A method for theft protection for a communication tag, the method comprising:
acquiring registration cell information corresponding to a trust terminal and unhooking cell information of a unhooking terminal when the unhooking operation is carried out;
determining a first verification result according to the registered cell information and the de-hung cell information;
acquiring a call record of the unhooking terminal and an identification of the trust terminal;
inquiring the call record according to the identification of the trust terminal, and determining whether the unhooking terminal is communicated with the trust terminal or not to obtain a second verification result;
Generating and sending management verification information to a blockchain network according to the first verification result and the second verification result, so that a user number security assurance node obtains the management verification information, determines whether a communication identifier corresponding to the unhooking terminal is stolen according to the management verification information, social security verification information of the unhooking terminal and financial verification information, and limits the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen;
and determining whether the communication identifier corresponding to the unhooking terminal is stolen according to the management verification information, the social security verification information and the financial verification information of the unhooking terminal, including:
judging whether a communication identifier corresponding to the unhooking terminal logs in a social security platform according to the social security verification information, and acquiring identity card information corresponding to the communication identifier to obtain a first judgment result;
judging whether the communication identifier corresponding to the unhooking terminal carries out financial transaction according to the financial verification information, and obtaining a second judgment result;
judging whether the unhooking terminal is communicated with the trust terminal according to the management verification information, judging whether the unhooking terminal and the trust terminal are located in the same cell when the unhooking terminal performs unhooking operation, and obtaining a third judgment result;
And determining whether the communication identifier corresponding to the unhooking terminal is stolen or not according to any one or more of the first judging result, the second judging result and the third judging result.
5. The method according to claim 4, wherein the registration cell information includes registration location information and registration time of the trusted terminal, and the de-attach cell information includes de-attach time of de-attach location information of the de-attach terminal when the de-attach operation is performed;
and determining a first verification result according to the registered cell information and the de-suspended cell information, including:
under the condition that the unhooking time is identical to the registration time, comparing the registration position information with the unhooking position information to obtain a comparison result;
and determining the first verification result according to the comparison result, wherein the first verification result comprises that the unhooking terminal and the trust terminal are positioned in the same cell when the unhooking operation is performed, or that the unhooking terminal and the trust terminal are not positioned in the same cell when the unhooking operation is performed.
6. The method of claim 4, wherein the call record includes an identification of the drop terminal and an identification of a first terminal, the first terminal being a terminal in communication with the drop terminal;
The step of inquiring the call record according to the identification of the trust terminal, determining whether the unhooking terminal communicates with the trust terminal, and obtaining a second verification result includes:
under the condition that the identification of the trust terminal is the same as the identification of the first terminal, determining that the second verification result is that the unhooking terminal is communicated with the trust terminal;
otherwise, determining that the second verification result is that the unhooking terminal and the trust terminal do not communicate.
7. The method of claim 4, wherein the querying the call record according to the identifier of the trusted terminal, determining whether the unhooking terminal has communicated with the trusted terminal, and after obtaining a second verification result, generating and sending management verification information to a blockchain network according to the first verification result and the second verification result, further comprises:
and verifying whether the unhooking terminal has a verification password preset by a user, and obtaining a password verification result.
8. A user number security assurance node server, comprising:
the first acquisition module is used for acquiring management verification information of the first multi-terminal management node on the unhooking terminal, social security verification information and financial verification information corresponding to the unhooking terminal; the management verification information comprises a first verification result and a second verification result;
The first determining module is used for determining the first verification result according to the registered cell information corresponding to the trust terminal and the unhooking cell information of the unhooking terminal when the unhooking operation is carried out, and determining the second verification result according to the call record of the unhooking terminal and the identification of the trust terminal;
the judging module is used for determining whether the communication identifier corresponding to the hanging terminal is stolen or not according to the management verification information, the social security verification information and the financial verification information;
the judging module is further used for judging whether the communication identifier corresponding to the unhooking terminal logs in the social security platform according to the social security verification information and acquiring identity card information corresponding to the communication identifier to obtain a first judging result; and the communication identifier is also used for judging whether the communication identifier corresponding to the unhooking terminal carries out financial transaction according to the financial verification information to obtain a second judgment result; and the method is also used for judging whether the unhooking terminal is communicated with the trust terminal according to the management verification information, judging whether the unhooking terminal and the trust terminal are positioned in the same cell when the unhooking terminal performs the unhooking operation, and obtaining a third judgment result;
The first determining module is further configured to determine whether a communication identifier corresponding to the hanging terminal is stolen according to any one or more of the first determination result, the second determination result, and the third determination result; and the limiting module is used for limiting the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen.
9. A one-number multi-terminal management node server, characterized by comprising:
the second acquisition module is used for acquiring the registered cell information corresponding to the trust terminal and the information of the unhooking cell of the unhooking terminal when the unhooking operation is carried out;
the first verification module is used for determining a first verification result according to the registered cell information and the de-hung cell information;
the third acquisition module is used for acquiring the call record of the unhooking terminal and the identification of the trust terminal;
the second verification module is used for inquiring the call record according to the identification of the trust terminal, determining whether the unhooking terminal is communicated with the trust terminal, and obtaining a second verification result;
the processing module is used for generating and sending management verification information to a blockchain network according to the first verification result and the second verification result so as to enable a user number security assurance node to obtain the management verification information, determining whether a communication identifier corresponding to the unhooking terminal is stolen according to the management verification information, social security verification information and financial verification information of the unhooking terminal, and limiting the use authority of the unhooking terminal under the condition that the communication identifier is determined to be stolen;
The second judging module is used for judging whether the communication identifier corresponding to the unhooking terminal logs in the social security platform according to the social security verification information and acquiring the identity card information corresponding to the communication identifier to obtain a first judging result;
the second judging module is further configured to judge whether a financial transaction is performed on the communication identifier corresponding to the unhooking terminal according to the financial verification information, so as to obtain a second judging result; and the method is also used for judging whether the unhooking terminal is communicated with the trust terminal according to the management verification information, judging whether the unhooking terminal and the trust terminal are positioned in the same cell when the unhooking terminal performs the unhooking operation, and obtaining a third judgment result;
and the second determining module is used for determining whether the communication identifier corresponding to the unhooking terminal is stolen or not according to any one or more of the first judging result, the second judging result and the third judging result.
CN202110155475.8A 2021-02-04 2021-02-04 Anti-theft method and server for communication identification Active CN112950199B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110155475.8A CN112950199B (en) 2021-02-04 2021-02-04 Anti-theft method and server for communication identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110155475.8A CN112950199B (en) 2021-02-04 2021-02-04 Anti-theft method and server for communication identification

Publications (2)

Publication Number Publication Date
CN112950199A CN112950199A (en) 2021-06-11
CN112950199B true CN112950199B (en) 2023-06-23

Family

ID=76243930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110155475.8A Active CN112950199B (en) 2021-02-04 2021-02-04 Anti-theft method and server for communication identification

Country Status (1)

Country Link
CN (1) CN112950199B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302544A (en) * 2016-10-18 2017-01-04 深圳市金立通信设备有限公司 A kind of safe verification method and system
CN106330839A (en) * 2015-07-01 2017-01-11 阿里巴巴集团控股有限公司 Account loss report cancelling method and apparatus
CN106372474A (en) * 2016-09-08 2017-02-01 广州衡昊数据科技有限公司 Method and system for preventing identification card from being stolen
CN107464121A (en) * 2017-07-11 2017-12-12 阿里巴巴集团控股有限公司 Electronic account is reported the loss, solves extension, business management method, device and equipment
CN107895256A (en) * 2017-11-08 2018-04-10 平安科技(深圳)有限公司 Bank account cancel loss report method for processing business, system, terminal and storage medium
CN109033869A (en) * 2018-07-04 2018-12-18 深圳虚觅者科技有限公司 Encrypted file system hanging method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9779434B2 (en) * 2009-07-20 2017-10-03 Wenxuan Tonnison Online e-commerce and networking system with user-participated advertisements, joint online purchasing and dynamic user interactions
US20160012445A1 (en) * 2011-11-10 2016-01-14 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), methods and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without nfc component and system, with cellular/satellite phone/internet/multi-media functions

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330839A (en) * 2015-07-01 2017-01-11 阿里巴巴集团控股有限公司 Account loss report cancelling method and apparatus
CN106372474A (en) * 2016-09-08 2017-02-01 广州衡昊数据科技有限公司 Method and system for preventing identification card from being stolen
CN106302544A (en) * 2016-10-18 2017-01-04 深圳市金立通信设备有限公司 A kind of safe verification method and system
CN107464121A (en) * 2017-07-11 2017-12-12 阿里巴巴集团控股有限公司 Electronic account is reported the loss, solves extension, business management method, device and equipment
CN107895256A (en) * 2017-11-08 2018-04-10 平安科技(深圳)有限公司 Bank account cancel loss report method for processing business, system, terminal and storage medium
CN109033869A (en) * 2018-07-04 2018-12-18 深圳虚觅者科技有限公司 Encrypted file system hanging method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Malik Nadeem Anwar 等.Security threats taxonomy: Smart-home perspective.《2017 3rd International Conference on Advances in Computing,Communication &amp Automation》.2018,第1-4页. *
基于RFID技术的校园一卡通系统设计与实现;孙尚文;《中国优秀硕士学位论文全文数据库 信息科技辑》(第7期);第I138-150页 *

Also Published As

Publication number Publication date
CN112950199A (en) 2021-06-11

Similar Documents

Publication Publication Date Title
CN106991317B (en) Security verification method, platform, device and system
US9578025B2 (en) Mobile network-based multi-factor authentication
CN102790674B (en) Auth method, equipment and system
US7559081B2 (en) Method and apparatus for authenticating a user at an access terminal
CN1142700C (en) Finding copied SIM cards
EP2248295B1 (en) System and method for wireless device based user authentication
CN112437428B (en) Verification method and server
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN106850209A (en) A kind of identity identifying method and device
CN103945385B (en) The method and its device of guarding against theft for mobile terminal
JPH11507451A (en) System for detecting unauthorized account access
CN111444531A (en) Privacy data protection system based on block chain and implementation method
CN1980459A (en) Method for realizing information destroying at network side
CN111507718B (en) Non-inductive payment system
CN109587683B (en) Method and system for preventing short message from being monitored, application program and terminal information database
US8874067B2 (en) Medical data access system
CN112995227B (en) One-stop information service platform based on three-party credit management
CN112651044B (en) Business transaction method, system and storage medium based on block chain technology
CN112950199B (en) Anti-theft method and server for communication identification
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
CN105939512A (en) Mobile phone and anti-loss system for mobile phone
CN115767538A (en) Information verification method, information processing method, device and equipment
CN112954688B (en) Communication identifier verification method, server and core network equipment
CN112564915B (en) Verification method, one-number multi-terminal management server and terminal
CN105743883B (en) A kind of the identity attribute acquisition methods and device of network application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant