CN103810595B - Information verification method and device - Google Patents
Information verification method and device Download PDFInfo
- Publication number
- CN103810595B CN103810595B CN201410037491.7A CN201410037491A CN103810595B CN 103810595 B CN103810595 B CN 103810595B CN 201410037491 A CN201410037491 A CN 201410037491A CN 103810595 B CN103810595 B CN 103810595B
- Authority
- CN
- China
- Prior art keywords
- key word
- predetermined key
- information
- checking
- bank
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3221—Access to banking information through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an information verification method and device, and belongs to the technical field of computers. The information verification method includes the steps: scanning verification information in a terminal and screening out preset keywords including bank names and short words related to bank card tail numbers; acquiring user information; transmitting verification requests to verification servers corresponding to the bank names in the preset keywords, determining the bank card numbers by the verification servers according to the preset keywords and the user information, and finishing verification of the bank card numbers. The bound needed information is automatically acquired according to the verification information and transmitted to the verification servers, the method solves the problems of high input difficulty, low efficiency and easiness in wrong input in the verification process of a phone wallet bound card in related technology, the input difficulty can be reduced, and verification efficiency can be improved.
Description
Technical field
It relates to field of computer technology, particularly to a kind of Information Authentication method and device.
Background technology
With the popularization of mobile phone application, mobile phone wallet has been accepted by users and has used.For the ease of mobile phone wallet
Payment using it will usually mobile phone wallet is bound with bank card, the mobile phone wallet said here as can be used for mobile phone
The payment accounts paying.
During mobile phone wallet and bank card are bound, proof procedure and binding procedure can be included, and test
Card process is usually:When needing to bind bank card, user needs continuously to input the user profile of complexity in mobile phone terminal, such as
Including the information such as selection bank, input bank card number, name, ID (identity number) card No., phone number, expiration date and safety code, handss
Machine terminal transmits these information to the authentication server of the bank corresponding to bank card, and authentication server is to authenticate to user defeated
In the case of the information entering is all effective, checking information is fed back to the binding server for binding payment accounts;Binding procedure
Generally include:Binding server, after receiving the checking information of authentication server transmission, payment accounts is sticked into bank
Row binding.
Inventor, during realizing the disclosure, finds that correlation technique at least has following defect:By mobile phone wallet
In proof procedure when being bound with bank card, need the information that user input is more, due to by mobile phone screen size
Restriction, therefore input difficulty are big, efficiency is low, and erroneous input easily.
Content of the invention
In order to solve in correlation technique in the proof procedure that mobile phone wallet ties up card, input difficulty is big, efficiency is low and easy
The problem of erroneous input occurs, present disclose provides a kind of Information Authentication method and device.Described technical scheme is as follows:
According to the embodiment of the present disclosure in a first aspect, provide a kind of Information Authentication method, including:
Checking information in terminal is scanned, filters out predetermined key word, described predetermined key word includes bank's name
Claim and the short word related to bank card tail number;
Obtain user profile;
Send checking request to the corresponding authentication server of described Bank Name in described predetermined key word, described test
Described predetermined key word and described user profile is included, by described authentication server according to described predetermined key word in card request
Determine bank's card number with described user profile, complete the checking to described bank card number.
Optionally, described checking information in terminal is scanned, including:
The checking information conforming to a predetermined condition is chosen, described predetermined condition is in each checking information from described terminal
The communication identifier of described checking information is the mark for bank's setting for providing checking information service;
The described checking information selecting is scanned.
Optionally, also include:
Show the predetermined key word of least one set filtering out;
Receive the checking instruction producing when the predetermined key word of one of which to display selects, by select one group
The predetermined key word using when predetermined key word is as transmission described checking request.
Optionally, the predetermined key word of least one set that described display filters out, including:
What calculating sifting went out has the quantity with the checking information organizing predetermined key word, and the quantity of described checking information is made
Quantity for every group of predetermined key word;According to the quantity of every group of predetermined key word, descending show successively each group make a reservation for key
Word;
Or,
Determine the nearest reception time of the checking information corresponding to every group of predetermined key word filtering out;Predetermined according to every group
The nearest reception time corresponding to key word, from the close-by examples to those far off show the predetermined key word of each group successively.
Optionally, also include:
Show described user profile and the one group of predetermined key word selected;
Receive for determining described user profile and the correct confirmation of the predetermined key word of described a group selecting, hold
The described step sending checking request to authentication server corresponding with described Bank Name of row.
Optionally, described acquisition user profile, including:
Obtain the communication identifier that described terminal has;Or,
Obtain the communication identifier that described terminal has, and obtain from checking information corresponding with described predetermined key word
Address name.
Optionally, also include:
Generate and show for prompting the user to choose whether the information verified;
Receive the scan instruction producing when selecting and verified according to described information;
After receiving described scan instruction, execute the described step that checking information in terminal is scanned.
According to the second aspect of the embodiment of the present disclosure, provide a kind of Information Authentication device, including:
Scan module, for being scanned to the checking information in terminal, filters out predetermined key word, described predetermined key
Word includes Bank Name and the short word related to bank card tail number;
Acquisition module, for obtaining user profile;
Sending module, for testing to the described Bank Name corresponding authentication server transmission in described predetermined key word
Card request, include described predetermined key word and described user profile in described checking request, by described authentication server according to
Described predetermined key word and described user profile determine bank's card number, complete the checking to described bank card number.
Optionally, described scan module, including:
Choose unit, choose, in each checking information from described terminal, the checking information conforming to a predetermined condition,
Described predetermined condition is the communication for providing checking information service for bank's setting for the communication identifier of described checking information
Mark;
Scanning element, for being scanned to the described checking information selecting.
Optionally, also include:
First display module, for showing the predetermined key word of least one set that described scan module filters out;
First receiver module, the checking that the one of which predetermined key word for receiving to display produces when selecting refers to
Order, the predetermined key word using during using select one group of predetermined key word as the described checking request of transmission;
Optionally, described first display module, including:
Computing unit, the quantity having with the checking information organizing predetermined key word going out for calculating sifting, test described
The quantity of card information is as the quantity of every group of predetermined key word;First display unit, for calculating according to described computing unit
Every group of predetermined key word quantity, descending show the predetermined key word of each group successively;
Or,
Determining unit, during the nearest reception of the checking information corresponding to every group of predetermined key word filtering out for determination
Between;Second display unit, for the nearest reception time corresponding to every group of predetermined key word being determined according to described determining unit,
From the close-by examples to those far off show the predetermined key word of each group successively.
Optionally, also include:
Second display module, for showing described user profile and the one group of predetermined key word selected;
Second receiver module, for receiving for determining described user profile and the described one group of predetermined key word selected
Correct confirmation.
Optionally, described acquisition module, including:
First acquisition unit, for obtaining the communication identifier that described terminal has;Or,
Second acquisition unit, for obtaining the communication identifier that described terminal has, and from described predetermined key word pair
Address name is obtained in the checking information answered.
Optionally, also include:
Generation module, for generating and showing for prompting the user to choose whether the information verified;
3rd receiver module, for the scan instruction producing when receiving and selecting and verified according to described information;
Described scan module, is additionally operable to after receiving described scan instruction, to checking letter present on described terminal
Breath is scanned.
According to the third aspect of the embodiment of the present disclosure, provide a kind of Information Authentication device, including:
Processor;
For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Checking information in terminal is scanned, filters out predetermined key word, described predetermined key word includes bank's name
Claim and the short word related to bank card tail number;
Obtain user profile;
Send checking request to the corresponding authentication server of described Bank Name in described predetermined key word, described test
Described predetermined key word and described user profile is included, by described authentication server according to described predetermined key word in card request
Determine bank's card number with described user profile, complete the checking to described bank card number.
The technical scheme that embodiment of the disclosure provides can include following beneficial effect:
By the checking information in end of scan, automatically analyze out bank and corresponding bank card tail number, and automatically obtain
Take other users information, these information automatically obtaining are sent to the authentication server corresponding to bank, complete to bank card
Checking etc. information;Solve in correlation technique in the proof procedure that mobile phone wallet ties up card, input difficulty is big, efficiency is low and holds
The problem of erroneous input easily occurs;Because script needs the information of user input all can automatically get, therefore reach permissible
Reduce input difficulty, the effect of raising verification efficiency.
It should be appreciated that above general description and detailed description hereinafter are only exemplary, can not be limited this
Open.
Brief description
Accompanying drawing herein is merged in description and constitutes the part of this specification, shows the enforcement meeting the present invention
Example, and be used for together explaining the principle of the present invention in description.
Fig. 1 is the signal of the implementation environment according to involved by a kind of Information Authentication method that exemplary partial enforcement exemplifies
Figure;
Fig. 2 is a kind of flow chart of the Information Authentication method according to an exemplary embodiment;
Fig. 3 A is a kind of flow chart of the Information Authentication method implementing to exemplify according to another exemplary;
Fig. 3 B is the schematic diagram of the information being shown to user according to an exemplary embodiment;
Fig. 3 C is the schematic diagram showing the predetermined key word of each group according to an exemplary embodiment;
Fig. 3 D is the list showing user profile and the predetermined key word selecting according to an exemplary embodiment
Schematic diagram;
Fig. 4 is a kind of schematic diagram of the Information Authentication device according to an exemplary embodiment;
Fig. 5 is a kind of schematic diagram of the Information Authentication device implementing to exemplify according to another exemplary;
Fig. 6 is a kind of schematic diagram of the device for Information Authentication according to an exemplary embodiment.
Specific embodiment
Here will in detail exemplary embodiment be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the present invention.On the contrary, they be only with such as appended
The example of the consistent apparatus and method of some aspects being described in detail in claims, the present invention.
Fig. 1 is the signal of the implementation environment according to involved by a kind of Information Authentication method that exemplary partial enforcement exemplifies
Figure, as shown in figure 1, this implementation environment can include terminal 120 and authentication server 140.
Terminal 120 can for receiving and preserving the electronic equipment of checking information, this electronic equipment can be smart mobile phone,
Panel computer, intelligent television, E-book reader, MP3 player(Moving Picture Experts Group Audio
Layer III, dynamic image expert's compression standard audio frequency aspect 3)、MP4(Moving Picture Experts Group
Audio Layer IV, dynamic image expert's compression standard audio frequency aspect 4)Player, pocket computer on knee and desk-top meter
Calculation machine etc..
Can be connected by wireless network or cable network between terminal 120 and authentication server 140.
Authentication server 140 can be to verify whether the bank card that user provides is correct can be used for corresponding to bank
Server.Here the authentication server 140 said can be a server, or the server being made up of some servers
Cluster, or a cloud computing service center.
This implementation environment can also include binding server 160.Binding server 160 can be by cable network or nothing
Gauze network is connected with terminal 120 and authentication server 140 respectively.Binding server 160 can verify silver in authentication server 140
After row card is correct, the payment accounts in terminal 120 and bank card are bound.Likewise, the binding service said here
Device 160 can be a server, or the server cluster being made up of some servers, or a cloud computing service
Center.
Fig. 2 is a kind of flow chart of the Information Authentication method according to an exemplary embodiment, as shown in Fig. 2 this letter
Breath verification method is applied in the terminal 120 in the implementation environment shown in Fig. 1, and this Information Authentication method can include following walking
Suddenly.
In step 201, the checking information in terminal is scanned, filters out predetermined key word, predetermined key word bag
Include Bank Name and the short word related to bank card tail number;
In step 202., obtain user profile;
In step 203, send checking request to the corresponding authentication server of Bank Name in predetermined key word, test
Include predetermined key word and user profile in card request, silver is determined according to predetermined key word and user profile by authentication server
Row card number, completes the checking to bank's card number.
In sum, the Information Authentication method providing in the embodiment of the present disclosure, by the checking information in end of scan, from
Move and analyze bank and corresponding bank card tail number, and automatically obtain other users information, the information that these are obtained automatically
It is sent to the authentication server corresponding to bank, complete the checking to information such as bank cards;Solve in correlation technique in mobile phone
Wallet is tied up in the proof procedure of card, and input difficulty is big, efficiency is low and problem that is that erroneous input easily;Because script needs user
The information of input all can get automatically, has therefore reached the effect that can reduce input difficulty, improve verification efficiency.
Fig. 3 A is a kind of flow chart of the Information Authentication method implementing to exemplify according to another exemplary, as shown in Figure 3A,
This Information Authentication method is applied in the terminal 120 in the implementation environment shown in Fig. 1, and this Information Authentication method can include following
Step.
In step 301, generate and show for prompting the user to choose whether the information verified;
When user attempts using mobile phone wallet for the first time, or mobile phone wallet is not yet bound and when needing to be used,
Terminal can for user prompting the need of binding bank card operation, that is, terminal can generate and show for point out user select
Select the information whether verified.Here the mobile phone wallet said is paid a bill by propping up of being used when being paid by mobile phone
Number, the bank card said here can include debit card and credit card of issued by banks etc..
Generally, information can include and select the checking button verified and for user's selection for user
Cancel the cancel button of checking, refer to shown in Fig. 3 B, it illustrates and be shown to user according to an exemplary embodiment
Information schematic diagram, include in prompting frame as shown in Figure 3 B checking button b2 and cancel button b4.
It should be noted that during mobile phone wallet is bound, being proof procedure first, checking therefore here is pressed
After the binding button that the confession user selection that button is equal in practical application is bound, namely user's selection binding button, first
Follow the steps below the proof procedure of 302 to step 310.
In step 302, receive the scan instruction producing when selecting and verified according to information;
Referring still to shown in Fig. 3 B, when user selects to be verified, then can click on checking button b2, corresponding, eventually
End then can receive the scan instruction producing when user selects and verified according to information.
In step 303, after receiving scan instruction, in each checking information from terminal choose meet predetermined
The checking information of condition, predetermined condition is for providing checking information service for bank's setting for the communication identifier of checking information
Communication identifier;
Generally, the checking information in terminal can be the note in inbox, corresponding communication identifier can be for
Bank setting for provide checking information service transmission number, this is because the short message service of bank would generally frequently to
User sends note, such as, after user opens bank account, the cell-phone number that meeting be filled in user when opening bank account
Send for pointing out user successfully to open the SMS Tips such as bank card on code;Also such as in customer consumption bank card(Permissible
The credit card including issued by banks and debit card)On the amount of money when, the short message service of bank then can send to this phone number and use
When consuming the SMS Tips such as how many amounts in prompting user.
Additionally, checking information in terminal can be the instant messaging program run in mail that terminal receives, terminal
On interactive information or current content of webpage logging in of terminal etc., generally, when checking information receives for terminal
During mail, corresponding communication identifier is the email address for bank's setting for providing checking information service;Work as checking information
During for interactive information in instant messaging program, corresponding communication identifier is for providing checking information service for bank's setting
Information send account;When checking information is for the content of the current webpage logging in of terminal, corresponding communication identifier is for bank
The network address for providing checking information service of setting.
In actual applications, with the continuous improvement of mobile phone storage capacity, the quantity of the checking information being stored in mobile phone
May be very many, therefore in order to improve scanning speed, the checking information that some conform to a predetermined condition can be chosen first, and this
The communication identifier of the checking information of a little symbol predetermined conditions is the communication mark for bank's setting for providing checking information service
Know.This is because for bank card to be bound, requiring to look up the information of bank card, therefore only requiring to look up and there is these silver
The checking information of row card information, and general, different bank can to should have one special for providing checking information
The communication identifier of service, different banks provides the communication identifier of checking information service can be the same or different.
In step 304, the checking information selecting is scanned, filters out predetermined key word;
Generally, the form of the sent prompting checking information of the checking information service of bank is fixing, in checking information
Bank Name " xx bank " and the short word " tail number be the credit card of xxxx " related to bank card tail number is generally comprised in appearance
Or the content such as the bank card of xxxx " tail number be ", now then can be by Bank Name and the short word work related to bank card tail number
For one group of predetermined key word.
Same group of predetermined key word all can be extracted in each checking information conforming to a predetermined condition.
In a kind of possible implementation, same bank is only same user and has done a bank card, and this silver
Row provides the checking information corresponding to communication identifier of checking information service may there are several(Carried several times
Wake up), now only a checking information corresponding to the communication identifier of this bank can be scanned and screens, to screen to one
Organize predetermined key word.
In alternatively possible implementation, same bank can handle multiple bank cards for same user,
And this bank provides the communication identifier of checking information service all to have corresponding checking information prompting for these bank cards, now then
All checking informations corresponding to this account can be scanned and screen, to filter out one group of predetermined key word.
In step 305, show the predetermined key word of least one set filtering out;
For checking of the user that is more convenient for, can with by every group of predetermined key word according to list in the form of show.It will be apparent that with
It is only necessary to show once when one group of predetermined key word multiple.
General, when there is multigroup predetermined key word, these predetermined key words can be ranked up, and the rule sorted
Then can be determined by many factors.
For example, when the rule of sequence is determined by the number of the checking information with predetermined key word, then show each
Organize predetermined key word, can include:
First, what calculating sifting went out has the quantity with the checking information organizing predetermined key word, by the quantity of checking information
Quantity as every group of predetermined key word;
In actual applications, according to predetermined key word, the checking information with the predetermined key word of this group can be carried out point
Class, calculates the quantity of each lower checking information of classification, and using the quantity of checking information as every group of predetermined key word quantity.Than
As the checking information with " Bank of China, tail number are 0548 debit card " is divided into a class.
Second, according to the quantity of every group of predetermined key word, descending show the predetermined key word of each group successively.
That is, when the checking information with identical predetermined key word is more, then showing that this user uses this predetermined pass
The frequency of the bank card corresponding to keyword is also higher, and the probability that user binds this bank card is also bigger, therefore can will be this
Predetermined key word corresponding to bank card is arranged in front;And when the checking information with identical predetermined key word is fewer, then show
This user is also lower using the frequency of this bank card corresponding to predetermined key word, and the probability that user binds this bank card is also got over
Little, after therefore the predetermined key word corresponding to this bank card being arranged in.
Again for example, when the nearest reception time of the checking information corresponding to every group of predetermined key word for the rule of sequence
During decision, then show various predetermined key words, can include:
First, determine the nearest reception time of the checking information corresponding to every group of predetermined key word filtering out;
Due to the checking information corresponding to every group of predetermined key word can have one, two or more, it is thus determined that these
There is in checking information the nearest time receiving the time.
Second, the nearest reception time according to corresponding to every group of predetermined key word, from the close-by examples to those far off show that each group makes a reservation for successively
Key word.
That is, the reception time corresponding to predetermined key word is nearer, then show this silver corresponding to predetermined key word
The time that row card is used is also nearer, and the probability that user binds this bank card is also bigger, therefore can be by this bank card institute
Corresponding predetermined key word is arranged in front;Conversely, the reception time corresponding to predetermined key word is more remote, then show this predetermined key
The time that bank card corresponding to word is used is also more remote, and the probability that user binds this bank card is also less, therefore can be by
After predetermined key word corresponding to this bank card is arranged in.
Fig. 3 C is the schematic diagram showing the predetermined key word of each group according to an exemplary embodiment, as Fig. 3 C institute
Show, wherein, show three groups of predetermined key words, first group of predetermined key word c2 corresponds to Bank of China, second group of predetermined key word
C4 corresponds to industrial and commercial bank, and the 3rd group of predetermined key word c6 corresponds to agricultural bank.It should be added that, three groups depicted herein
The schematic example that predetermined key word is only by, is not intended as the restriction of disclosure protection domain.
Within step 306, receive the checking instruction producing when the predetermined key word of one of which to display selects;
In actual applications, user can select to any one group of real predetermined key word, when user selects one
When organizing predetermined key word, then show that user wants the bank card corresponding to predetermined key word to this group to be verified and bind, right
Answer, the checking instruction that terminal is produced when then the predetermined key word of one of which of display can be selected with receive user, should
Checking instruction is related to the predetermined key word being chosen group, and in other words, this checking instruction can carry and be chosen the pre- of group
Determine key word.
Referring still to shown in Fig. 3 C, user selects second group of predetermined key word c4, corresponding can produce pre- to second group
Determine the checking instruction that key word is verified, generally, this checking instruction is related to second group of predetermined key word, in other words
Say, this checking instruction carries second group of predetermined key word.
In step 307, obtain user profile;
Here the user profile said be typically when authentication server needs to verify required except predetermined key word before
Information, such as can include phone number, address name, identification card number etc..
When obtaining user profile, different according to the content that user profile is comprised, the following two kinds situation can be included:
The first situation, obtains the communication identifier that terminal has.In actual applications, automatically can be obtained according to system
Communication identifier.
Second situation, obtains the communication identifier that terminal has, and from checking information corresponding with predetermined key word
Obtain address name.In actual applications, have in the checking information of predetermined key word and generally also can comprise address name, than
As the short word generally comprising in checking information is " distinguished xxx user ", and xxx here is address name, and therefore terminal can
So that address name is obtained according to the short word of such in these checking informations.
In step 308, display user profile and the one group of predetermined key word selected;
After getting user profile, the predetermined key word that the user profile of acquisition and user can be selected by terminal enters
Row display, such as can be shown as a list.Refer to shown in Fig. 3 D, it illustrates according to an exemplary embodiment
Show user profile and the schematic diagram of the list of predetermined key word selecting, Fig. 3 D is that user makes a reservation for second group in Fig. 3 C
User profile and the schematic diagram of second group of predetermined key word that key word shows after being selected.Institute in list shown in Fig. 3 D
The predetermined key word comprising includes " Industrial and Commercial Bank of China " and " * * * * * * * * * * * * * * 1111 ", the user included in this list
Information includes address name " Zhang San ", phone number " 139****3333 ".
In a step 309, receive for determining user profile and the correct confirmation letter of the predetermined key word of select one group
Breath;
After the predetermined key word of display user profile and selection, user can confirm that the user profile of display and makes a reservation for
Whether key word is correct, and corresponding, terminal can receive for determining user profile and the correct confirmation letter of predetermined key word
Breath.
In actual applications, referring still to shown in Fig. 3 D, except user profile and pre- can be shown on the list of this display
Determine key word, can also show that being available for user selects to determine user profile and predetermined key word correct ACK button d2 and confession
User selects to determine the modification button d4 that user profile and predetermined key word are modified when incorrect, presses when user clicks on confirmation
After button d2, terminal can receive for determining user profile and the correct confirmation of predetermined key word;And work as user's point
After hitting modification button d4, the attribute of the user profile of display and predetermined key word all can be changed to editable state, with
Change these contents for user.
In the step 310, send out to the corresponding authentication server of Bank Name in the one group of predetermined key word selected
Send checking request, in checking request, include predetermined key word and user profile, by authentication server according to predetermined key word and
User profile determines bank's card number, completes the checking to bank's card number.
Because the authentication server corresponding to different banks can be different, therefore need checking when, need to
Authentication server corresponding with the Bank Name in predetermined key word sends checking request;Corresponding, authentication server can root
Determine bank's card number according to predetermined key word and user profile, complete the checking to bank's card number.
Such as authentication server can determine and the bank card in predetermined key word according to the phone number in user profile
The corresponding bank card of tail number, is then determining whether this bank card is effective or available, this is because handling industry in actual bank card
It will usually require user to fill in phone number in business, and phone number is unique, therefore when phone number and bank card pair
After answering, then can determine the card number of specific bank card according to phone number.And in actual applications, user can also be same
When one bank handles multiple bank cards, all stay same phone number, as such, it is desirable to according to this phone number and bank card
Tail number determines the card number of bank card.
So, when authentication server verifies that predetermined key word, user profile and predetermined key word, user profile are determined
When information is all correct, then can send to binding server and be proved to be successful information, this is proved to be successful in information and generally can comprise
The card number of bank card, corresponding, the card number of mobile phone wallet and this bank card then can be bound by binding server.
In sum, the Information Authentication method providing in the embodiment of the present disclosure, by the checking information in end of scan, from
Move and analyze bank and corresponding bank card tail number, and automatically obtain other users information, the information that these are obtained automatically
It is sent to the authentication server corresponding to bank, complete the checking to information such as bank cards;Solve in correlation technique in mobile phone
Wallet is tied up in the proof procedure of card, and input difficulty is big, efficiency is low and problem that is that erroneous input easily;Because script needs user
The information of input all can get automatically, has therefore reached the effect that can reduce input difficulty, improve verification efficiency.
Following for disclosure device embodiment, can be used for executing method of disclosure embodiment.Real for disclosure device
Apply the details not disclosed in example, refer to method of disclosure embodiment.
Fig. 4 is a kind of schematic diagram of the Information Authentication device according to an exemplary embodiment, as shown in figure 4, this letter
Breath checking device is applied in the terminal 120 in implementation environment shown in Fig. 1, and this Information Authentication device can include but is not limited to:
Scan module 402, acquisition module 404 and sending module 406.
This scan module 402 is configured to the checking information in terminal is scanned, and filters out predetermined key word, makes a reservation for
Key word includes Bank Name and the short word related to bank card tail number;
This acquisition module 404 is configured to obtain user profile;
This sending module 406 is configured to test to the Bank Name corresponding authentication server transmission in predetermined key word
Card request, includes predetermined key word and user profile, by authentication server according to predetermined key word and user in checking request
Information determines bank's card number, completes the checking to bank's card number.
In sum, the Information Authentication device providing in the embodiment of the present disclosure, by the checking information in end of scan, from
Move and analyze bank and corresponding bank card tail number, and automatically obtain other users information, the information that these are obtained automatically
It is sent to the authentication server corresponding to bank, complete the checking to information such as bank cards;Solve in correlation technique in mobile phone
Wallet is tied up in the proof procedure of card, and input difficulty is big, efficiency is low and problem that is that erroneous input easily;Because script needs user
The information of input all can get automatically, has therefore reached the effect that can reduce input difficulty, improve verification efficiency.
Fig. 5 is a kind of schematic diagram of the Information Authentication device implementing to exemplify according to another exemplary, as shown in figure 5, should
Information Authentication device is applied in the terminal 120 in implementation environment shown in Fig. 1.This Information Authentication device can include but not limit
In:Scan module 502, acquisition module 508 and sending module 510.
This scan module 502 is configured to the checking information in terminal is scanned, and filters out predetermined key word, makes a reservation for
Key word includes Bank Name and the short word related to bank card tail number;
This acquisition module 508 is configured to obtain user profile;
This sending module 510 is configured to test to the Bank Name corresponding authentication server transmission in predetermined key word
Card request, includes predetermined key word and user profile, by authentication server according to predetermined key word and user in checking request
Information determines bank's card number, completes the checking to bank's card number.
In the possible implementation of in the embodiment shown in fig. 5 the first,
This scan module 502 can include:Choose unit 502a and scanning element 502b.
Choose, in each checking information that this selection unit 502a is configured to from terminal, the checking conforming to a predetermined condition
Information, predetermined condition is the communication mark for providing checking information service for bank's setting for the communication identifier of checking information
Know;
This scanning element 502b is configured to the checking information selecting is scanned.
In the possible implementation of second in the embodiment shown in fig. 5,
This Information Authentication device can also include:First display module 504 and the first receiver module 506.
This first display module 504 is display configured to the predetermined key word of least one set that scan module 502 filters out;
Produce when the predetermined key word of one of which that this first receiver module 506 is configured to receive to display selects
Checking instruction, using select one group of predetermined key word as send described checking request when the predetermined key word that uses.
In the third possible implementation in the embodiment shown in fig. 5,
First display module 504 can include:Computing unit 504a and the first display unit 504b, or include:Determine
Unit 504c and the second display unit 504d.
This computing unit 504a is configured to the quantity having with the checking information organizing predetermined key word that calculating sifting goes out,
Using the quantity of checking information as every group of predetermined key word quantity;This first display unit 504b is configurable for according to meter
Calculate the quantity of every group of predetermined key word that unit calculates, descending show the predetermined key word of each group successively;
Or,
This determining unit 504c is configured to determine that the checking information corresponding to every group of predetermined key word filtering out
Between the proximity time receiving;This second display unit 504d is configurable for the every group of predetermined key word determining according to determining unit 504c
The corresponding nearest reception time, from the close-by examples to those far off show the predetermined key word of each group successively.
In the 4th kind of possible implementation in the embodiment shown in fig. 5,
This Information Authentication device can also include:Second display module 512 and the second receiver module 514.
This second display module 512 is display configured to user profile and the one group of predetermined key word selected;
This second receiver module 514 is configured to receive for determining user profile and the one group of predetermined key word selected
Correct confirmation, triggering sending module 510 executes operation.
In the 5th kind of possible implementation in the embodiment shown in fig. 5,
Acquisition module 508 can include:First acquisition unit 508a and second acquisition unit 508b.
This first acquisition unit 508a is configured to obtain the communication identifier that terminal has;Or,
This second acquisition unit 508b is configured to obtain the communication identifier that has of terminal, and from predetermined key word pair
Address name is obtained in the checking information answered.
In the 6th kind of possible implementation in the embodiment shown in fig. 5,
This Information Authentication device can also include:Generation module 516 and the 3rd receiver module 518.
This generation module 516 is configurable to generate and shows for prompting the user to choose whether the prompting letter verified
Breath;
3rd receiver module 518 is configured to receive the scanning producing when being verified according to information selection and refers to
Order;
This scan module 502 is additionally configured to, after receiving scan instruction, the checking information in terminal be swept
Retouch.
In sum, the Information Authentication device providing in the embodiment of the present disclosure, by the checking information in end of scan, from
Move and analyze bank and corresponding bank card tail number, and automatically obtain other users information, the information that these are obtained automatically
It is sent to the authentication server corresponding to bank, complete the checking to information such as bank cards;Solve in correlation technique in mobile phone
Wallet is tied up in the proof procedure of card, and input difficulty is big, efficiency is low and problem that is that erroneous input easily;Because script needs user
The information of input all can get automatically, has therefore reached the effect that can reduce input difficulty, improve verification efficiency.
It should be noted that:Above-described embodiment provide Information Authentication device when verifying to information, only with above-mentioned
The division of each functional module is illustrated, and in practical application, can distribute above-mentioned functions by different as desired
Functional module completes, and the internal structure of terminal will be divided into different functional modules, with complete described above all or
Partial function.In addition, the Information Authentication device that above-described embodiment provides belongs to same design with Information Authentication embodiment of the method, its
The process of implementing refers to embodiment of the method, repeats no more here.
Fig. 6 is a kind of schematic diagram of the device 600 for Information Authentication according to an exemplary embodiment.For example,
Device 600 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, doctor
Treatment equipment, body-building equipment, personal digital assistant etc..
With reference to Fig. 6, device 600 can include following one or more assemblies:Process assembly 602, memorizer 604, power supply
Assembly 606, multimedia groupware 608, audio-frequency assembly 610, input/output(I/O)Interface 612, sensor cluster 614, and
Communication component 616.
The integrated operation of the usual control device 600 of process assembly 602, such as with display, call, data communication, phase
Machine operation and record operate associated operation.Treatment element 602 can include one or more processors 618 and refer to execute
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 602 can include one or more modules, just
Interaction between process assembly 602 and other assemblies.For example, processing component 602 can include multi-media module, many to facilitate
Interaction between media component 608 and process assembly 602.
Memorizer 604 is configured to store various types of data to support the operation in equipment 600.The showing of these data
Example includes the instruction for any application program of operation or method on device 600, contact data, telephone book data, disappears
Breath, picture, video etc..Memorizer 604 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM(SRAM), Electrically Erasable Read Only Memory(EEPROM), erasable compile
Journey read only memory(EPROM), programmable read only memory(PROM), read only memory(ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 606 provides electric power for the various assemblies of device 600.Power supply module 606 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for device 600, the assembly that electric power is associated.
Multimedia groupware 608 includes the screen of one output interface of offer between described device 600 and user.One
In a little embodiments, screen can include liquid crystal display(LCD)And touch panel(TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sensing touch or sliding action
Border, but also detection and described touch or slide related persistent period and pressure.In certain embodiments, many matchmakers
Body assembly 608 includes a front-facing camera and/or post-positioned pick-up head.When equipment 600 is in operator scheme, such as screening-mode or
During video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and
Post-positioned pick-up head can be the optical lens system of a fixation or have focusing and optical zoom capabilities.
Audio-frequency assembly 610 is configured to output and/or input audio signal.For example, audio-frequency assembly 610 includes a Mike
Wind(MIC), when device 600 is in operator scheme, during as call model, logging mode and speech recognition mode, mike is joined
It is set to reception external audio signal.The audio signal being received can be further stored in memorizer 604 or via communication set
Part 616 sends.In certain embodiments, audio-frequency assembly 610 also includes a speaker, for exports audio signal.
, for providing interface between process assembly 602 and peripheral interface module, above-mentioned peripheral interface module can for I/O interface 612
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 614 includes one or more sensors, for providing the state of various aspects to comment for device 600
Estimate.For example, sensor cluster 614 can detect/the closed mode of opening of equipment 600, and the relative localization of assembly is for example described
Assembly is display and the keypad of device 600, and sensor cluster 614 can be with detection means 600 or 600 1 assemblies of device
Position change, user is presence or absence of with what device 600 contacted, device 600 orientation or acceleration/deceleration and device 600
Temperature change.Sensor cluster 614 can include proximity transducer, is configured to the detection when not having any physical contact
The presence of object nearby.Sensor cluster 614 can also include optical sensor, such as CMOS or ccd image sensor, for becoming
Use as in application.In certain embodiments, this sensor cluster 614 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 616 is configured to facilitate the communication of wired or wireless way between device 600 and other equipment.Device
600 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary enforcement
In example, communication component 616 receives broadcast singal or the broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, described communication component 616 also includes near-field communication(NFC)Module, to promote junction service.Example
As RF identification can be based in NFC module(RFID)Technology, Infrared Data Association(IrDA)Technology, ultra broadband(UWB)Technology,
Bluetooth(BT)Technology and other technologies are realizing.
In the exemplary embodiment, device 600 can be by one or more application specific integrated circuits(ASIC), numeral letter
Number processor(DSP), digital signal processing appts(DSPD), PLD(PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, for executing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
As included the memorizer 604 instructing, above-mentioned instruction can be executed by the processor 618 of device 600 to complete said method.For example,
Described non-transitorycomputer readable storage medium can be ROM, random access memory(RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the present invention
Its embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, these modifications, purposes or
Person's adaptations are followed the general principle of the present invention and are included the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It is described above and precision architecture illustrated in the accompanying drawings it should be appreciated that the invention is not limited in, and
And various modifications and changes can carried out without departing from the scope.The scope of the present invention only to be limited by appended claim.
Claims (13)
1. a kind of Information Authentication method is it is characterised in that include:
Checking information in terminal is scanned, filters out predetermined key word, described predetermined key word include Bank Name with
And the short word related to bank card tail number;
Show the predetermined key word of least one set filtering out;
Receive the checking instruction producing when the predetermined key word of one of which to display selects, select one group is made a reservation for
The predetermined key word using when key word is as transmission checking request;
Obtain user profile;
Send checking request, institute to the corresponding authentication server of described Bank Name in the described predetermined key word selected
State and in checking request, include described predetermined key word and described user profile, by described authentication server according to described predetermined pass
Keyword and described user profile determine bank's card number, complete the checking to described bank card number.
2. method according to claim 1 is it is characterised in that described be scanned to the checking information in terminal, including:
The checking information conforming to a predetermined condition is chosen, described predetermined condition is described in each checking information from described terminal
The communication identifier of checking information is the communication identifier for bank's setting for providing checking information service;
The described checking information selecting is scanned.
3. method according to claim 1 is it is characterised in that the predetermined key word of least one set that filters out of described display,
Including:
What calculating sifting went out have with the checking information organizing predetermined key word quantity, using the quantity of described checking information as every
Organize the quantity of predetermined key word;According to the quantity of every group of predetermined key word, descending show the predetermined key word of each group successively;
Or,
Determine the nearest reception time of the checking information corresponding to every group of predetermined key word filtering out;According to every group of predetermined key
The nearest reception time corresponding to word, from the close-by examples to those far off show the predetermined key word of each group successively.
4. method according to claim 1 is it is characterised in that also include:
Show described user profile and the one group of predetermined key word selected;
Receive for determining described user profile and the correct confirmation of the predetermined key word of described a group selecting, execute institute
State to the step sending checking request with the corresponding authentication server of described Bank Name in the described predetermined key word selected
Suddenly.
5. method according to claim 1 is it is characterised in that described acquisition user profile, including:
Obtain the corresponding communication identifier of described terminal;
Or, obtain the corresponding communication identifier of described terminal, and obtain from checking information corresponding with described predetermined key word
Address name.
6. according to described method arbitrary in claim 1 to 5 it is characterised in that also including:
Generate and show for prompting the user to choose whether the information verified;
Receive the scan instruction producing when selecting and verified according to described information;
After receiving described scan instruction, execute the described step that checking information in terminal is scanned.
7. a kind of Information Authentication device is it is characterised in that include:
Scan module, for being scanned to the checking information in terminal, filters out predetermined key word, described predetermined key word bag
Include Bank Name and the short word related to bank card tail number;
First display module, for showing the predetermined key word of least one set that described scan module filters out;
First receiver module, the checking instruction that the one of which predetermined key word for receiving to display produces when selecting,
The predetermined key word using during using select one group of predetermined key word as transmission checking request;
Acquisition module, for obtaining user profile;
Sending module, for sending out to the corresponding authentication server of described Bank Name in the described predetermined key word selected
Send checking request, include described predetermined key word and described user profile in described checking request, by described authentication server
Bank's card number is determined according to described predetermined key word and described user profile, completes the checking to described bank card number.
8. device according to claim 7 is it is characterised in that described scan module, including:
Choose unit, choose, in each checking information from described terminal, the checking information conforming to a predetermined condition, described
Predetermined condition is the communication identifier for providing checking information service for bank's setting for the communication identifier of described checking information;
Scanning element, for being scanned to the described checking information selecting.
9. device according to claim 7 is it is characterised in that described first display module, including:
Computing unit, the quantity having with the checking information organizing predetermined key word going out for calculating sifting, by described checking letter
The quantity of breath is as the quantity of every group of predetermined key word;First display unit, every for calculated according to described computing unit
Organize the quantity of predetermined key word, descending show the predetermined key word of each group successively;
Or,
Determining unit, for determining the nearest reception time of the checking information corresponding to the every group of predetermined key word filtering out;The
Two display units, for the nearest reception time corresponding to every group of predetermined key word being determined according to described determining unit, by near
And far show the predetermined key word of each group successively.
10. device according to claim 7 is it is characterised in that also include:
Second display module, for showing described user profile and the one group of predetermined key word selected;
Second receiver module, for receiving for determining that described user profile and the described one group of predetermined key word selected are correct
Confirmation, trigger described sending module execute operation.
11. devices according to claim 7 it is characterised in that described acquisition module, including:
First acquisition unit, for obtaining the corresponding communication identifier of described terminal;Or,
Second acquisition unit, for obtaining the corresponding communication identifier of described terminal, and tests from corresponding with described predetermined key word
Address name is obtained in card information.
12. according to described device arbitrary in claim 7 to 11 it is characterised in that also including:
Generation module, for generating and showing for prompting the user to choose whether the information verified;
3rd receiver module, for the scan instruction producing when receiving and selecting and verified according to described information;
Described scan module, is additionally operable to, after receiving described scan instruction, the checking information in described terminal be swept
Retouch.
A kind of 13. Information Authentication devices are it is characterised in that include:
Processor;
For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Checking information in terminal is scanned, filters out predetermined key word, described predetermined key word include Bank Name with
And the short word related to bank card tail number;
Show the predetermined key word of least one set filtering out;
Receive the checking instruction producing when the predetermined key word of one of which to display selects, select one group is made a reservation for
The predetermined key word using when key word is as transmission checking request;
Obtain user profile;
Send checking request, institute to the corresponding authentication server of described Bank Name in the described predetermined key word selected
State and in checking request, include described predetermined key word and described user profile, by described authentication server according to described predetermined pass
Keyword and described user profile determine bank's card number, complete the checking to described bank card number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410037491.7A CN103810595B (en) | 2014-01-26 | 2014-01-26 | Information verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410037491.7A CN103810595B (en) | 2014-01-26 | 2014-01-26 | Information verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103810595A CN103810595A (en) | 2014-05-21 |
CN103810595B true CN103810595B (en) | 2017-02-15 |
Family
ID=50707328
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410037491.7A Active CN103810595B (en) | 2014-01-26 | 2014-01-26 | Information verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103810595B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105279160B (en) * | 2014-06-05 | 2020-01-31 | 腾讯科技(深圳)有限公司 | Method and device for displaying account attribute information |
CN104484811B (en) * | 2014-12-18 | 2018-09-04 | 王智勇 | It is a kind of that transaction processing method and system are put on someone's head based on mobile Internet |
CN107094129A (en) * | 2016-12-20 | 2017-08-25 | 招商银行股份有限公司 | Card management method and apparatus |
CN107094130B (en) * | 2016-12-20 | 2020-09-25 | 招商银行股份有限公司 | Card activation method and device |
CN109842605B (en) * | 2017-11-29 | 2020-07-07 | 华为技术有限公司 | Card binding method and terminal |
CN110288332A (en) * | 2019-06-28 | 2019-09-27 | 北京三快在线科技有限公司 | System, method, apparatus, equipment and the storage medium of bank card binding |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004038915A (en) * | 2002-07-06 | 2004-02-05 | Makoto Sarutani | Personal confirmation system |
CN101807273A (en) * | 2010-03-25 | 2010-08-18 | 上海合合信息科技发展有限公司 | Method and system for performing financial management by extracting consumption information in credit card short message |
CN101841416A (en) * | 2009-12-31 | 2010-09-22 | 北京握奇数据系统有限公司 | Method, device and system for realizing mobile phone bank |
CN101916478A (en) * | 2010-08-03 | 2010-12-15 | 上海瀚银信息技术有限公司 | Method for automatically acquiring, verifying and inputting dynamic password in normal short message by client |
CN102142127A (en) * | 2010-07-30 | 2011-08-03 | 华为技术有限公司 | Method and device for managing consumption details of user |
RU2434287C2 (en) * | 2006-04-25 | 2011-11-20 | Кил-Джин ЛЕЕ | Novel conceptual card, as well as system and method of selling based on card use by consumer |
CN102592218A (en) * | 2011-12-31 | 2012-07-18 | 武汉银讯科技发展有限公司 | Method and system for realizing debit card transaction by mobile phone |
-
2014
- 2014-01-26 CN CN201410037491.7A patent/CN103810595B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004038915A (en) * | 2002-07-06 | 2004-02-05 | Makoto Sarutani | Personal confirmation system |
RU2434287C2 (en) * | 2006-04-25 | 2011-11-20 | Кил-Джин ЛЕЕ | Novel conceptual card, as well as system and method of selling based on card use by consumer |
CN101841416A (en) * | 2009-12-31 | 2010-09-22 | 北京握奇数据系统有限公司 | Method, device and system for realizing mobile phone bank |
CN101807273A (en) * | 2010-03-25 | 2010-08-18 | 上海合合信息科技发展有限公司 | Method and system for performing financial management by extracting consumption information in credit card short message |
CN102142127A (en) * | 2010-07-30 | 2011-08-03 | 华为技术有限公司 | Method and device for managing consumption details of user |
CN101916478A (en) * | 2010-08-03 | 2010-12-15 | 上海瀚银信息技术有限公司 | Method for automatically acquiring, verifying and inputting dynamic password in normal short message by client |
CN102592218A (en) * | 2011-12-31 | 2012-07-18 | 武汉银讯科技发展有限公司 | Method and system for realizing debit card transaction by mobile phone |
Also Published As
Publication number | Publication date |
---|---|
CN103810595A (en) | 2014-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102447385B1 (en) | User Interfaces for Transfer Accounts | |
CN103810595B (en) | Information verification method and device | |
CN104852966B (en) | Numeric value transfer, terminal and cloud server | |
CN112835496A (en) | Method for processing notification and electronic equipment | |
CN106022758A (en) | Wireless router smart home managing method and wireless router | |
CN109074571B (en) | Transaction method and device based on Near Field Communication (NFC) | |
CN107924213A (en) | Can be from the method and apparatus of the separated electronic equipment of another electronic equipment for operating | |
CN106020784A (en) | Method and device for displaying application message, and terminal | |
CN106528709A (en) | Social information recommendation method and apparatus | |
CN105099879A (en) | Instant communication method and instant communication device | |
CN105654302A (en) | Payment method and device | |
CN107491966A (en) | Method of payment, apparatus and system, storage medium | |
CN106204046A (en) | The method and device that order pays | |
CN107229915A (en) | Biological feather recognition method, device, equipment and storage medium | |
CN107748991A (en) | Account safety management method and device | |
CN109102266A (en) | Account numeric value transfer and device | |
CN104219648B (en) | Prompt the method and device of charging information | |
CN108985768A (en) | A kind of data transferring system, method and device | |
CN104966192B (en) | Data processing method and device | |
CN105788072B (en) | A kind of method and device of swiping the card of mobile terminal | |
CN107643879A (en) | Information clearing method, device and terminal | |
CN107734072A (en) | The processing method and processing device of pushed information | |
CN106507335A (en) | Mobile phone user's authentication method and device | |
CN105976235A (en) | Information classification method and information classification device | |
CN105095350A (en) | Bill obtaining method, device, server and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180820 Address after: 100176 Beijing Beijing economic and Technological Development Zone, Chuang Chuang fourteen Street 99, 33 D Building 2 level 2243 (centralized office area) Patentee after: Beijing millet Payment Technology Co., Ltd. Address before: 100085 Beijing Haidian District Qinghe middle street 68 Huarun colorful shopping mall two phase 13 level. Patentee before: Xiaomi Technology Co., Ltd. |