CN103971239A - Verification method and device - Google Patents

Verification method and device Download PDF

Info

Publication number
CN103971239A
CN103971239A CN201410230863.8A CN201410230863A CN103971239A CN 103971239 A CN103971239 A CN 103971239A CN 201410230863 A CN201410230863 A CN 201410230863A CN 103971239 A CN103971239 A CN 103971239A
Authority
CN
China
Prior art keywords
terminal
authorization information
identifying code
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410230863.8A
Other languages
Chinese (zh)
Inventor
蔡立晶
齐向东
孟毅颖
陈尚元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN201410230863.8A priority Critical patent/CN103971239A/en
Publication of CN103971239A publication Critical patent/CN103971239A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a verification method and device applied to a first terminal. The method comprises the following steps: receiving a verification request command comprising identification information of a request user; determining a plurality of second terminals and terminal identifications thereof according to the identification information of the request user; generating a plurality of verification informations according to the terminal identification of each second terminal, and transmitting each verification information to the corresponding second terminals to trigger the second terminal to prompt the terminal user to perform verification code input operation; receiving a verification code returned by each second terminal; carrying out consistency judgment on each verification code according to the verification information to obtain a judgment result; and generating a first verification result of the valid request user when the judgment result indicates that each verification code is consistent with the corresponding verification information. Since a plurality of trusted terminals verify the verification codes at the same time, the embodiment of the invention implements protection on the financial transactions of the user, and enhances the financial transaction safety of the user.

Description

A kind of verification method and device
Technical field
The application relates to technical field of data processing, particularly a kind of verification method and device.
Background technology
Along with social development, people's living standard improves gradually, corresponding, financial consumption behavior is also more and more frequent, and at present, people realize financial consumption by various modes of doing business, except money transaction, also just like various modes of doing business such as POS transaction, online tradings.In these modes of doing business, conventionally can be trusted by setting in advance the verification mode of terminal its trading object is verified as user's legitimacy, be ensured user's financial transaction security.
Take online trading as example, user logins its Web bank its article of consumption is carried out to amount of money payment, after bank receives user's consumption request, to user's legal electric terminal, send identifying code as mobile phone etc., user sends to bank by this identifying code, identifying code user being returned by bank carries out consistance judgement, thereby user's legitimacy is verified.
But in such scheme, bank's place terminal is only carried out identifying code judgement to the electric terminal of this validated user, although can guarantee this user in its user name and password the financial transaction safety after stolen, but still exist user's electric terminal and user name password thereof by non-legal use (carrying out a large sum of money financial transaction etc. as child) or simultaneously stolen situation, cause equally user's financial transaction security lower.
Summary of the invention
The application's technical matters to be solved is to provide a kind of verification method and device, in order to solve in prior art by user's legal electric terminal being carried out to the scheme of identifying code judgement, the electric terminal and the simultaneously stolen situation of user name password thereof that have user, cause user's the lower technical matters of financial transaction security.
The application provides a kind of verification method, is applied to first terminal, and described method comprises:
Receipt Validation request instruction, at least comprises the identification information of asking user in described checking request instruction;
According to described request user's identification information, determine the second terminal and terminal iidentification thereof that a plurality of and described identification information is corresponding;
According to the terminal iidentification of the second terminal described in each, generate a plurality of authorization informations and authorization information described in each be sent in the second terminal of its correspondence, to trigger described its terminal user of the second terminal notifying, carry out identifying code input operation;
Receive the identifying code that the second terminal is returned described in each;
According to described authorization information, identifying code described in each is carried out to consistance judgement, obtain judged result;
At identifying code described in described judged result shows each, when all authorization information corresponding to it is consistent, generate the first legal the result of described request user.
Said method, preferred, according to the terminal iidentification of the second terminal described in each, generate a plurality of authorization informations and authorization information described in each be sent in the second terminal of its correspondence, comprising:
According to the terminal iidentification of the second terminal described in each, obtain each self-corresponding first information create-rule of the second terminal described in each;
According to first information create-rule described in each, generate respectively the authorization information of its corresponding the second terminal;
Described authorization information is sent in the second terminal of its correspondence.
Said method, preferred, according to the terminal iidentification of the second terminal described in each, generate a plurality of authorization informations and authorization information described in each be sent in the second terminal of its correspondence, comprising:
Terminal iidentification according to described the second terminal, obtains the second default creating info rules, and described the second creating info rules is corresponding with all described the second terminals;
According to described the second creating info rules, generate the authorization information of the second terminal described in each;
Described authorization information is sent in the second terminal of its correspondence.
Said method, preferred, in described authorization information, at least comprise a plurality of numerical characters.
Said method, preferred, the described authorization information of described foundation, carries out consistance judgement to identifying code described in each, obtains judged result, comprising:
Respectively numerical character in the authorization information corresponding to it of identifying code described in each is compared one by one, obtained sub-judged result corresponding to identifying code described in each; All described sub-judged results form judged results, and described judged result shows that the authorization information that whether identifying code is corresponding with it described in each is consistent.
The application also provides a kind of demo plant, is applied to first terminal, and described device comprises:
Command reception unit, for Receipt Validation request instruction, at least comprises the identification information of asking user in described checking request instruction;
Sign determining unit, for the identification information according to described request user, determines the second terminal and terminal iidentification thereof that a plurality of and described identification information is corresponding;
Authorization information processing unit, for the terminal iidentification according to described the second terminal, generate a plurality of authorization informations and authorization information described in each be sent in the second terminal of its correspondence, to trigger described its terminal user of the second terminal notifying, carrying out identifying code input operation;
Identifying code receiving element, for receiving the identifying code that the second terminal is returned described in each;
Identifying code judging unit, for according to described authorization information, identifying code described in each is carried out to consistance judgement, obtain judged result, at identifying code described in described judged result shows each, when all authorization information corresponding to it is consistent, trigger the first result generation unit;
The first result generation unit, for generating the first legal the result of described request user.
Said apparatus, preferred, described authorization information processing unit comprises:
The first Rule subelement, for the terminal iidentification according to the second terminal described in each, obtains each self-corresponding first information create-rule of the second terminal described in each;
The first information generates subelement, for according to first information create-rule described in each, generates respectively the authorization information of its corresponding the second terminal;
The first information sends subelement, for described authorization information being sent to the second terminal of its correspondence.
Said apparatus, preferred, described authorization information processing unit comprises:
Second Rule obtains subelement, and the terminal iidentification for according to described the second terminal, obtains the second default creating info rules, and described the second creating info rules is corresponding with all described the second terminals;
The second Information generation subelement, for according to described the second creating info rules, generates the authorization information of the second terminal described in each;
The second information sends subelement, for described authorization information being sent to the second terminal of its correspondence.
Said apparatus, preferred, in described authorization information, at least comprise a plurality of numerical characters.
Said apparatus, preferred, described identifying code judging unit comprises:
Character comparer unit, for respectively the authorization information numerical character corresponding to it of identifying code described in each being compared one by one, obtains sub-judged result corresponding to identifying code described in each; All described sub-judged results form judged results, and described judged result shows that the authorization information that whether identifying code is corresponding with it described in each is consistent.
From such scheme, a kind of verification method and device that the application provides, be applied on first terminal, the application is by after receiving request user's checking request instruction, utilize this request user's identification information to determine a plurality of the second terminals and terminal iidentification thereof, the terminal iidentification that recycles each the second terminal generates its each self-corresponding authorization information and sends in this second terminal, to trigger each its terminal user of the second terminal notifying who receives authorization information, carry out the input operation of identifying code, and then the application is again by after receiving the identifying code that each second terminal returns, these identifying codes are carried out to consistance judgement, and when its judged result shows each identifying code all authorization information corresponding to it is consistent, generate the first legal the result of request user, the legitimate verification of realization to this request user, with this result, allow this request user's financial transaction behavior.The application is by arranging i.e. the second terminal of a plurality of trust terminals; utilize a plurality of trust terminals to carry out identifying code checking simultaneously; in request user's terminal and the non-legal use of username and password thereof or when simultaneously stolen; by stoping other identifying codes of trusting terminal to send the protection realizing this request user's financial transaction, improve user's financial transaction security.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present application, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiment of the application, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
The process flow diagram of a kind of verification method embodiment mono-that Fig. 1 provides for the application;
Fig. 2 is the application example figure of the embodiment of the present application;
The part process flow diagram of a kind of verification method embodiment bis-that Fig. 3 provides for the application;
The part process flow diagram of a kind of verification method embodiment tri-that Fig. 4 provides for the application;
The process flow diagram of a kind of verification method embodiment tetra-that Fig. 5 provides for the application;
The structural representation of a kind of demo plant embodiment five that Fig. 6 provides for the application;
The part-structure schematic diagram of a kind of demo plant embodiment six that Fig. 7 provides for the application;
The part-structure schematic diagram of a kind of verification method embodiment seven that Fig. 8 provides for the application;
The structural representation of a kind of demo plant embodiment eight that Fig. 9 provides for the application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is clearly and completely described, obviously, described embodiment is only the application's part embodiment, rather than whole embodiment.Embodiment based in the application, those of ordinary skills are not making the every other embodiment obtaining under creative work prerequisite, all belong to the scope of the application's protection.
With reference to figure 1, the process flow diagram of a kind of verification method embodiment mono-providing for the application, described method can be applied in first terminal, and described first terminal can be realized as the server of bank etc. for financial service center, and described method can comprise the following steps:
Step 101: Receipt Validation request instruction.
Wherein, in described checking request instruction, at least include request user's identification information.
It should be noted that, described request user is and need to carries out the user that financial transaction behavior is carried out in financial transaction, this user carries out the operation to first terminal by webpage or ATM etc., to generate checking request instruction, by the application who is applied on first terminal, this checking request instruction is received.
Wherein, described request user's identification information can ask the user name of user on described first terminal as Bank Account Number user name or registered contacts telephone number etc. for this.
Step 102: according to described request user's identification information, determine the second terminal and terminal iidentification thereof that a plurality of and described identification information is corresponding.
Wherein, described request user's identification information can have incidence relation with a plurality of trust terminals, for example, this request user is associated with a plurality of the second terminals, in described step 102, utilize this request user's identification information, determine the second terminal and terminal iidentification thereof described in each that be subject to this request users to trust.
It should be noted that, described the second terminal can have for mobile phone, pad etc. the terminal realization of uniqueness identity property.The terminal iidentification of described the second terminal can be for the hardware identifier of this second terminal be as NIC address, or the SIM card sign communicating in this second terminal etc.
Step 103: according to the terminal iidentification of the second terminal described in each, generate a plurality of authorization informations and authorization information described in each be sent in the second terminal of its correspondence, carrying out identifying code input operation to trigger described its terminal user of the second terminal notifying.
Wherein, described in each, the second terminal can have otherness between the corresponding authorization information receiving separately, that is, authorization information corresponding to any two the second terminals is all not identical.
It should be noted that, in described step 103, while described authorization information being sent in the second terminal of its correspondence, can pass through Wireless Data Transmission mode, as realizations such as bluetooth, mobile communication, as shown in Figure 2, each authorization information generating in described step 103 is sent to respectively in its each self-corresponding the second terminal.
Step 104: receive the identifying code that the second terminal is returned described in each.
Wherein, described the second terminal is after receiving authorization information, this authorization information is showed to user, and reminding user is carried out the input operation of identifying code according to this authorization information, now, the webpage of user's the second terminal or the upper input operation of carrying out identifying code of other application APP, for example, request user is carried out and is extracted monetary transaction by ATM, now generate checking request instruction, banking terminal receives and determines according to the identification information of this request user in instruction mobile phone and the phone number of this request users to trust to this checking request instruction, and generate authorization information and be sent on these mobile phones, these mobile phones of being trusted point out its cellphone subscriber to carry out identifying code input, these mobile phones return to the identifying code of user's input, the identifying code these being returned by the application in first terminal receives.
Step 105: according to described authorization information, identifying code described in each is carried out to consistance judgement, obtain judged result, when all authorization information corresponding to it is consistent, perform step 106 at identifying code described in described judged result shows each.
Wherein, described step 105 refers to, the authorization information that identifying code described in each is corresponding with it is carried out to consistance matching judgment, obtain judged result, this judged result can show that the authorization information that whether identifying code is corresponding with it described in each is consistent, and at identifying code described in described judged result shows each when all authorization information corresponding to it is consistent, execution step 106.
Step 106: generate the first legal the result of described request user.
Wherein, described request user is legal to be referred to, the legitimate verification of this request user's financial transaction is passed through, and shows that this request user can proceed its current financial transaction behavior.
From such scheme, a kind of verification method embodiment mono-that the application provides, on the first terminal that is applied to be connected with a plurality of the second terminals, the embodiment of the present application one is by after receiving request user's checking request instruction, utilize this request user's identification information to determine the second terminal and terminal iidentification thereof, the terminal iidentification that recycles each the second terminal generates its each self-corresponding authorization information and sends in this second terminal, to trigger each its terminal user of the second terminal notifying who receives authorization information, carry out the input operation of identifying code, and then the application is again by after receiving the identifying code that each second terminal returns, these identifying codes are carried out to consistance judgement, and when its judged result shows each identifying code all authorization information corresponding to it is consistent, generate the first legal the result of request user, the legitimate verification of realization to this request user, with this result, allow this request user's financial transaction behavior.
For example, in family's account management, when child carries out financial transaction behavior, the mobile phone terminal proof procedure that not only needs child, need father and mother or other tutorial mobile phone terminal proof procedures simultaneously, detailed process is: in first terminal as the embodiment of the present application of bank server end, first receive child by the mobile phone of oneself or the checking request instruction of computer transmission, utilize afterwards the identification information of child in this instruction to determine a plurality of the second terminals of being trusted, as mobile phone of child's mobile phone and father and mother etc., the terminal iidentification that the embodiment of the present application is trusted mobile phone according to these afterwards generates authorization information, and these authorization informations are sent to respectively on each mobile phone, child and father and mother carry out the input operation of identifying code by mobile phone, with this, the embodiment of the present application can receive each and be trusted the identifying code that mobile phone returns, further these identifying codes authorization information corresponding with it carried out to consistency checking, guarantee child's E-Security.
Thus; the embodiment of the present application one is by arranging i.e. the second terminal of a plurality of trust terminals; utilize a plurality of trust terminals to carry out identifying code checking simultaneously; in request user's terminal and the non-legal use of username and password thereof or when simultaneously stolen; by stoping other identifying codes of trusting terminal to send the protection realizing this request user's financial transaction, improve user's financial transaction security.
Wherein, in above-described embodiment, when judging described judged result showing described in each identifying code not all authorization information corresponding to it is consistent in described step 105, there is the inconsistent situation of some identifying code authorization information corresponding to it, now, execution step: generate illegal the second the result of described request user, described the second the result shows, to the legitimate verification of this request user's financial transaction, can not pass through, now, this request user can not proceed its current financial transaction behavior, in described first terminal, can further carry out the operation of this request of terminal user's current financial transaction behavior, guarantee this request user's E-Security.
Implementation based on previous embodiment, with reference to figure 3, the realization flow figure of step 103 described in a kind of verification method embodiment bis-providing for the application, described step 103 can realize by following steps:
Step 131: according to the terminal iidentification of the second terminal described in each, obtain each self-corresponding first information create-rule of the second terminal described in each.
Wherein, in described step 131, refer to, described in each, the second terminal has its first information create-rule separately, and the first information create-rule of each the second terminal is all not identical.These first information create-rules can arrange in advance, in described step 131, terminal iidentification according to each the second terminal, a plurality of first information create-rules that set in advance are distributed to the second terminal described in each, get each self-corresponding first information create-rule of the second terminal described in each.
Step 132: according to first information create-rule described in each, generate respectively the authorization information of its corresponding the second terminal.
Wherein, known in above, described in each, first information create-rule is different, and the authorization information of each the second terminal generating is accordingly different.
Step 133: described authorization information is sent in the second terminal of its correspondence.
With above-mentioned child, carry out the example that is exemplified as that financial transaction verification, father and mother carry out simultaneous verification, the authorization information that child and father and mother's mobile phone receives is obtained by the embodiment of the present application foundation first information create-rule separately respectively, accordingly, the authorization information receiving on child and father and mother's mobile phone is different.
With reference to figure 4, the realization flow figure of step 103 described in a kind of verification method embodiment tri-providing for the application, described step 103 also can realize by following steps:
Step 134: the terminal iidentification according to described the second terminal, obtain the second default creating info rules, described the second creating info rules is corresponding with the second terminal described in each.
Wherein, described the second creating info rules can be for setting in advance, and have uniqueness, and this second creating info rules is corresponding with all the second terminals.
Step 135: according to described the second creating info rules, generate the authorization information of the second terminal described in each.
Wherein, described step 135 refers to: according to described the second creating info rules, generate successively or simultaneously the authorization information of the second terminal described in each, described in each, the authorization information of the second terminal is different.
Step 136: described authorization information is sent in the second terminal of its correspondence.
With above-mentioned child, carry out the example that is exemplified as that financial transaction verification, father and mother carry out simultaneous verification, the authorization information that child and father and mother's mobile phone receives obtains according to same the second creating info rules by the embodiment of the present application, and the authorization information receiving on child and father and mother's mobile phone is different.
It should be noted that, described in each generation in above-mentioned steps 103 in the authorization information of the second terminal, can comprise by a plurality of numerical characters, or alphabetic character etc., as 0~9 or a~z in any number of characters etc., these characters form the authorization information of the second terminal, described authorization information also can be for including pictorial information of character information etc., as a jpg picture, on this picture, draw have 0~9 or a~z in any number of characters etc.
Composition based on above-mentioned authorization information, with reference to figure 5, the process flow diagram of a kind of verification method embodiment tetra-providing for the application, wherein, described step 105 can realize by following steps:
Step 151: respectively numerical character in the authorization information corresponding to it of identifying code described in each is compared one by one, obtained sub-judged result corresponding to identifying code described in each.
Wherein, all described sub-judged results form judged results, and described judged result shows that the authorization information that whether identifying code is corresponding with it described in each is consistent.
It should be noted that, in described step 151, refer to: by the character in identifying code described in each respectively in the authorization information corresponding with this identifying code numerical character compare one by one, with this, generate the sub-judged result of identifying code described in each, and all sub-judged results are combined into described judged result, and in subsequent step 106 by described judged result is identified, when identifying it and showing identifying code described in each authorization information corresponding with it is consistent respectively, generate the first legal the result of described request user.
Wherein, described authorization information also can be for representing character string or the pictorial information of a plurality of characters, as " 9-5=? " character string, a jpg picture for another example, on this picture, draw have " 1+5=? " Deng.Accordingly, described step 105 can realize in the following manner:
Respectively the character information of representative in the authorization information corresponding to it of identifying code described in each is carried out to Corresponding matching, obtain sub-judged result corresponding to identifying code described in each, wherein, all described sub-judged results form judged results, and described judged result shows that the authorization information that whether identifying code is corresponding with it described in each is consistent.
For example, one of them authorization information is " 9+8=? ", the legal identifying code of its correspondence is " 17 ", in described step 105, the identifying code that the second terminal corresponding to this authorization information returned mates with " 17 ", obtains the matching result of this authorization information.
With reference to figure 6, the structural representation of a kind of demo plant embodiment five providing for the application, wherein, described device can be applied in first terminal, described first terminal can be realized as the server of bank etc. for financial service center, and described device can comprise following structure:
Command reception unit 601, for Receipt Validation request instruction, at least comprises the identification information of asking user in described checking request instruction.
It should be noted that, described request user is and need to carries out the user that financial transaction behavior is carried out in financial transaction, this user carries out the operation to first terminal by webpage or ATM etc., to generate checking request instruction, by the application who is applied on first terminal, this checking request instruction is received.
Wherein, described request user's identification information can ask the user name of user on described first terminal as Bank Account Number user name or registered contacts telephone number etc. for this.
Sign determining unit 602, for the identification information according to described request user, determines the second terminal and terminal iidentification thereof that a plurality of and described identification information is corresponding.
Wherein, described request user's identification information can have incidence relation with a plurality of trust terminals, for example, this request user is associated with a plurality of the second terminals, in described sign determining unit 602, utilize this request user's identification information, determine the second terminal and terminal iidentification thereof described in each that be subject to this request users to trust.
It should be noted that, described the second terminal can have for mobile phone, pad etc. the terminal realization of uniqueness identity property.The terminal iidentification of described the second terminal can be for the hardware identifier of this second terminal be as NIC address, or the SIM card sign communicating in this second terminal etc.
Authorization information processing unit 603, for the terminal iidentification according to described the second terminal, generate a plurality of authorization informations and authorization information described in each be sent in the second terminal of its correspondence, to trigger described its terminal user of the second terminal notifying, carrying out identifying code input operation.
Wherein, described in each, the second terminal can have otherness between the corresponding authorization information receiving separately, that is, authorization information corresponding to any two the second terminals is all not identical.
It should be noted that, in described authorization information processing unit 603, while described authorization information being sent in the second terminal of its correspondence, can pass through Wireless Data Transmission mode, as realizations such as bluetooth, mobile communication, as shown in Figure 2, each authorization information generating in described authorization information processing unit 603 is sent to respectively in its each self-corresponding the second terminal.
Identifying code receiving element 604, for receiving the identifying code that the second terminal is returned described in each.
Wherein, described the second terminal is after receiving authorization information, this authorization information is showed to user, and reminding user is carried out the input operation of identifying code according to this authorization information, now, the webpage of user's the second terminal or the upper input operation of carrying out identifying code of other application APP, for example, request user is carried out and is extracted monetary transaction by ATM, now generate checking request instruction, banking terminal receives and determines according to the identification information of this request user in instruction mobile phone and the phone number of this request users to trust to this checking request instruction, and generate authorization information and be sent on these mobile phones, these mobile phones of being trusted point out its cellphone subscriber to carry out identifying code input, these mobile phones return to the identifying code of user's input, the identifying code these being returned by the application in first terminal receives.
Identifying code judging unit 605, for according to described authorization information, identifying code described in each is carried out to consistance judgement, obtain judged result, at identifying code described in described judged result shows each, when all authorization information corresponding to it is consistent, trigger the first result generation unit 606.
Wherein, described identifying code judging unit 605 refers to, the authorization information that identifying code described in each is corresponding with it is carried out to consistance matching judgment, obtain judged result, this judged result can show that the authorization information that whether identifying code is corresponding with it described in each is consistent, and when all authorization information corresponding to it is consistent, trigger described the first result generation unit 606 at identifying code described in described judged result shows each.
The first result generation unit 606, for generating the first legal the result of described request user.
Wherein, described request user is legal to be referred to, the legitimate verification of this request user's financial transaction is passed through, and shows that this request user can proceed its current financial transaction behavior.
From such scheme, a kind of demo plant embodiment five that the application provides, on the first terminal that is applied to be connected with a plurality of the second terminals, the embodiment of the present application one is by after receiving request user's checking request instruction, utilize this request user's identification information to determine the second terminal and terminal iidentification thereof, the terminal iidentification that recycles each the second terminal generates its each self-corresponding authorization information and sends in this second terminal, to trigger each its terminal user of the second terminal notifying who receives authorization information, carry out the input operation of identifying code, and then the application is again by after receiving the identifying code that each second terminal returns, these identifying codes are carried out to consistance judgement, and when its judged result shows each identifying code all authorization information corresponding to it is consistent, generate the first legal the result of request user, the legitimate verification of realization to this request user, with this result, allow this request user's financial transaction behavior.
For example, in family's account management, when child carries out financial transaction behavior, the mobile phone terminal proof procedure that not only needs child, need father and mother or other tutorial mobile phone terminal proof procedures simultaneously, detailed process is: in first terminal as the embodiment of the present application of bank server end, first receive child by the mobile phone of oneself or the checking request instruction of computer transmission, utilize afterwards the identification information of child in this instruction to determine a plurality of the second terminals of being trusted, as mobile phone of child's mobile phone and father and mother etc., the terminal iidentification that the embodiment of the present application is trusted mobile phone according to these afterwards generates authorization information, and these authorization informations are sent to respectively on each mobile phone, father and mother carry out the input operation of identifying code by mobile phone, with this, the embodiment of the present application can receive each and be trusted the identifying code that mobile phone returns, further these identifying codes authorization information corresponding with it carried out to consistency checking, guarantee child's E-Security.
Thus; the embodiment of the present application five-way is crossed i.e. the second terminal of a plurality of trust terminals is set; utilize a plurality of trust terminals to carry out identifying code checking simultaneously; in request user's terminal and the non-legal use of username and password thereof or when simultaneously stolen; by stoping other identifying codes of trusting terminal to send the protection realizing this request user's financial transaction, improve user's financial transaction security.
Wherein, in above-described embodiment, when judging described judged result showing described in each identifying code not all authorization information corresponding to it is consistent in described identifying code judging unit 605, there is the inconsistent situation of some identifying code authorization information corresponding to it, now, trigger the second result generation unit to generate illegal the second the result of described request user, described the second the result shows, to the legitimate verification of this request user's financial transaction, can not pass through, now, this request user can not proceed its current financial transaction behavior, in described first terminal, can further carry out the operation of this request of terminal user's current financial transaction behavior, guarantee this request user's E-Security.
Implementation structure based on previous embodiment, with reference to figure 7, the structural representation of authorization information processing unit 603 described in a kind of demo plant embodiment six providing for the application, wherein, described authorization information processing unit 603 can comprise following structure:
The first Rule subelement 631, for the terminal iidentification according to the second terminal described in each, obtains each self-corresponding first information create-rule of the second terminal described in each.
Wherein, in described the first Rule subelement 631, refer to, described in each, the second terminal has its first information create-rule separately, and the first information create-rule of each the second terminal is all not identical.These first information create-rules can arrange in advance, in described the first Rule subelement 631, terminal iidentification according to each the second terminal, a plurality of first information create-rules that set in advance are distributed to the second terminal described in each, get each self-corresponding first information create-rule of the second terminal described in each.
The first information generates subelement 632, for according to first information create-rule described in each, generates respectively the authorization information of its corresponding the second terminal.
Wherein, known in above, described in each, first information create-rule is different, and the authorization information of each the second terminal generating is accordingly different.
The first information sends subelement 633, for described authorization information being sent to the second terminal of its correspondence.
With above-mentioned child, carry out the example that is exemplified as that financial transaction verification, father and mother carry out simultaneous verification, the authorization information that child and father and mother's mobile phone receives is obtained by the embodiment of the present application foundation first information create-rule separately respectively, accordingly, the authorization information receiving on child and father and mother's mobile phone is different.
With reference to figure 8, the structural representation of authorization information processing unit 603 described in a kind of verification method embodiment seven providing for the application, wherein, described authorization information processing unit 603 also can be realized by following structure:
Second Rule obtains subelement 634, and the terminal iidentification for according to described the second terminal, obtains the second default creating info rules, and described the second creating info rules is corresponding with the second terminal described in each.
Wherein, described the second creating info rules can be for setting in advance, and have uniqueness, and this second creating info rules is corresponding with all the second terminals.
The second Information generation subelement 635, for according to described the second creating info rules, generates the authorization information of the second terminal described in each.
Wherein, described the second Information generation subelement 635 refers to: according to described the second creating info rules, generate successively or simultaneously the authorization information of the second terminal described in each, described in each, the authorization information of the second terminal is different.
The second information sends subelement 636, for described authorization information being sent to the second terminal of its correspondence.
With above-mentioned child, carry out the example that is exemplified as that financial transaction verification, father and mother carry out simultaneous verification, the authorization information that child and father and mother's mobile phone receives obtains according to same the second creating info rules by the embodiment of the present application, and the authorization information receiving on child and father and mother's mobile phone is different.
It should be noted that, described in each generation in above-mentioned authorization information processing unit 603 in the authorization information of the second terminal, can comprise by a plurality of numerical characters, or alphabetic character etc., as 0~9 or a~z in any number of characters etc., these characters form the authorization information of the second terminal, described authorization information also can be for including pictorial information of character information etc., as a jpg picture, on this picture, draw have 0~9 or a~z in any number of characters etc.
Composition based on above-mentioned authorization information, with reference to figure 9, the structural representation of a kind of demo plant embodiment eight providing for the application, wherein, described identifying code judging unit 605 can be realized by following structure:
Character comparer unit 651, for respectively the authorization information numerical character corresponding to it of identifying code described in each being compared one by one, obtains sub-judged result corresponding to identifying code described in each.
Wherein, all described sub-judged results form judged results, and described judged result shows that the authorization information that whether identifying code is corresponding with it described in each is consistent.
It should be noted that, described character comparer unit 651 refers to: by the character in identifying code described in each respectively in the authorization information corresponding with this identifying code numerical character compare one by one, with this, generate the sub-judged result of identifying code described in each, and all sub-judged results are combined into described judged result, and described the first result generation unit 606 is by identifying described judged result, when identifying it and showing identifying code described in each authorization information corresponding with it is consistent respectively, generate the first legal the result of described request user.
Wherein, described authorization information also can be for representing character string or the pictorial information of a plurality of characters, as " 9-5=? " character string, a jpg picture for another example, on this picture, draw have " 1+5=? " Deng.Accordingly, described identifying code judging unit 605 can be realized in the following manner:
Respectively the character information of representative in the authorization information corresponding to it of identifying code described in each is carried out to Corresponding matching, obtain sub-judged result corresponding to identifying code described in each, wherein, all described sub-judged results form judged results, and described judged result shows that the authorization information that whether identifying code is corresponding with it described in each is consistent.
For example, one of them authorization information is " 9+8=? ", the legal identifying code of its correspondence is " 17 ", in described identifying code judging unit 605, the identifying code that the second terminal corresponding to this authorization information returned mates with " 17 ", obtains the matching result of this authorization information.
It should be noted that, each embodiment in this instructions all adopts the mode of going forward one by one to describe, and each embodiment stresses is the difference with other embodiment, between each embodiment identical similar part mutually referring to.
Finally, also it should be noted that, in this article, relational terms such as the first and second grades is only used for an entity or operation to separate with another entity or operational zone, and not necessarily requires or imply and between these entities or operation, have the relation of any this reality or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby the process, method, article or the equipment that make to comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or be also included as the intrinsic key element of this process, method, article or equipment.The in the situation that of more restrictions not, the key element being limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment that comprises described key element and also have other identical element.
A kind of verification method and the device that above the application are provided are described in detail, applied specific case herein the application's principle and embodiment are set forth, the explanation of above embodiment is just for helping to understand the application's method and core concept thereof; Meanwhile, for one of ordinary skill in the art, the thought according to the application, all will change in specific embodiments and applications, and in sum, this description should not be construed as the restriction to the application.

Claims (10)

1. a verification method, is characterized in that, is applied to first terminal, and described method comprises:
Receipt Validation request instruction, at least comprises the identification information of asking user in described checking request instruction;
According to described request user's identification information, determine the second terminal and terminal iidentification thereof that a plurality of and described identification information is corresponding;
According to the terminal iidentification of the second terminal described in each, generate a plurality of authorization informations and authorization information described in each be sent in the second terminal of its correspondence, to trigger described its terminal user of the second terminal notifying, carry out identifying code input operation;
Receive the identifying code that the second terminal is returned described in each;
According to described authorization information, identifying code described in each is carried out to consistance judgement, obtain judged result;
At identifying code described in described judged result shows each, when all authorization information corresponding to it is consistent, generate the first legal the result of described request user.
2. method according to claim 1, is characterized in that, according to the terminal iidentification of the second terminal described in each, generates a plurality of authorization informations and authorization information described in each is sent in the second terminal of its correspondence, comprising:
According to the terminal iidentification of the second terminal described in each, obtain each self-corresponding first information create-rule of the second terminal described in each;
According to first information create-rule described in each, generate respectively the authorization information of its corresponding the second terminal;
Described authorization information is sent in the second terminal of its correspondence.
3. method according to claim 1, is characterized in that, according to the terminal iidentification of the second terminal described in each, generates a plurality of authorization informations and authorization information described in each is sent in the second terminal of its correspondence, comprising:
Terminal iidentification according to described the second terminal, obtains the second default creating info rules, and described the second creating info rules is corresponding with all described the second terminals;
According to described the second creating info rules, generate the authorization information of the second terminal described in each;
Described authorization information is sent in the second terminal of its correspondence.
4. according to the method described in claim 1,2 or 3, it is characterized in that, in described authorization information, at least comprise a plurality of numerical characters.
5. method according to claim 4, is characterized in that, the described authorization information of described foundation, carries out consistance judgement to identifying code described in each, obtains judged result, comprising:
Respectively numerical character in the authorization information corresponding to it of identifying code described in each is compared one by one, obtained sub-judged result corresponding to identifying code described in each; All described sub-judged results form judged results, and described judged result shows that the authorization information that whether identifying code is corresponding with it described in each is consistent.
6. a demo plant, is characterized in that, is applied to first terminal, and described device comprises:
Command reception unit, for Receipt Validation request instruction, at least comprises the identification information of asking user in described checking request instruction;
Sign determining unit, for the identification information according to described request user, determines the second terminal and terminal iidentification thereof that a plurality of and described identification information is corresponding;
Authorization information processing unit, for the terminal iidentification according to described the second terminal, generate a plurality of authorization informations and authorization information described in each be sent in the second terminal of its correspondence, to trigger described its terminal user of the second terminal notifying, carrying out identifying code input operation;
Identifying code receiving element, for receiving the identifying code that the second terminal is returned described in each;
Identifying code judging unit, for according to described authorization information, identifying code described in each is carried out to consistance judgement, obtain judged result, at identifying code described in described judged result shows each, when all authorization information corresponding to it is consistent, trigger the first result generation unit;
The first result generation unit, for generating the first legal the result of described request user.
7. device according to claim 6, is characterized in that, described authorization information processing unit comprises:
The first Rule subelement, for the terminal iidentification according to the second terminal described in each, obtains each self-corresponding first information create-rule of the second terminal described in each;
The first information generates subelement, for according to first information create-rule described in each, generates respectively the authorization information of its corresponding the second terminal;
The first information sends subelement, for described authorization information being sent to the second terminal of its correspondence.
8. device according to claim 6, is characterized in that, described authorization information processing unit comprises:
Second Rule obtains subelement, and the terminal iidentification for according to described the second terminal, obtains the second default creating info rules, and described the second creating info rules is corresponding with all described the second terminals;
The second Information generation subelement, for according to described the second creating info rules, generates the authorization information of the second terminal described in each;
The second information sends subelement, for described authorization information being sent to the second terminal of its correspondence.
9. according to the device described in claim 6,7 or 8, it is characterized in that, in described authorization information, at least comprise a plurality of numerical characters.
10. device according to claim 9, is characterized in that, described identifying code judging unit comprises:
Character comparer unit, for respectively the authorization information numerical character corresponding to it of identifying code described in each being compared one by one, obtains sub-judged result corresponding to identifying code described in each; All described sub-judged results form judged results, and described judged result shows that the authorization information that whether identifying code is corresponding with it described in each is consistent.
CN201410230863.8A 2014-05-28 2014-05-28 Verification method and device Pending CN103971239A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410230863.8A CN103971239A (en) 2014-05-28 2014-05-28 Verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410230863.8A CN103971239A (en) 2014-05-28 2014-05-28 Verification method and device

Publications (1)

Publication Number Publication Date
CN103971239A true CN103971239A (en) 2014-08-06

Family

ID=51240701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410230863.8A Pending CN103971239A (en) 2014-05-28 2014-05-28 Verification method and device

Country Status (1)

Country Link
CN (1) CN103971239A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217328A (en) * 2014-08-12 2014-12-17 小米科技有限责任公司 Multi-verification payment method and multi-verification payment device
CN104572135A (en) * 2015-02-10 2015-04-29 深圳酷派技术有限公司 Command processing method, command processing device and terminal
CN104680372A (en) * 2015-02-28 2015-06-03 熊贤浪 Transaction security payment method and system
CN105516054A (en) * 2014-09-22 2016-04-20 阿里巴巴集团控股有限公司 User authentication method and user authentication device
CN105530129A (en) * 2015-12-11 2016-04-27 小米科技有限责任公司 Router reset method and device
CN105577621A (en) * 2014-10-16 2016-05-11 腾讯科技(深圳)有限公司 Service operation verification method, apparatus and system thereof
CN105592005A (en) * 2014-10-22 2016-05-18 腾讯科技(深圳)有限公司 Safety verification method, apparatus, and system
CN105635040A (en) * 2014-10-27 2016-06-01 阿里巴巴集团控股有限公司 Validation method, device and system
CN106101125A (en) * 2016-07-01 2016-11-09 龙官波 Authentication processing method, Apparatus and system
CN106209810A (en) * 2016-07-03 2016-12-07 韦建峰 A kind of verification method and generating means
CN107357821A (en) * 2017-05-24 2017-11-17 杭州励飞软件技术有限公司 Method for managing system, device and storage medium
CN108810267A (en) * 2018-05-30 2018-11-13 努比亚技术有限公司 verification information display control method, terminal and computer readable storage medium
CN108829464A (en) * 2018-06-25 2018-11-16 腾讯科技(深圳)有限公司 Serving starting method, device, computer equipment and storage medium
CN109146489A (en) * 2018-09-29 2019-01-04 平安科技(深圳)有限公司 Safe payment method, device, server and storage medium
CN111242605A (en) * 2018-11-29 2020-06-05 中国移动通信集团广东有限公司 Mobile payment method
CN111986405A (en) * 2020-09-01 2020-11-24 中国银行股份有限公司 Method and device for verifying withdrawal of common property based on ATM
CN112446020A (en) * 2020-12-07 2021-03-05 北京小米松果电子有限公司 Authentication method, authentication device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764800A (en) * 2009-12-02 2010-06-30 深圳市融创天下科技发展有限公司 Method for dynamic password multi-terminal combined authentication
CN102868665A (en) * 2011-07-05 2013-01-09 华为软件技术有限公司 Method and device for data transmission
CN102968722A (en) * 2012-12-21 2013-03-13 北京惠银通联科技有限公司 Method and system for transaction confirmation
CN103685311A (en) * 2013-12-27 2014-03-26 网易(杭州)网络有限公司 Log-in validation method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764800A (en) * 2009-12-02 2010-06-30 深圳市融创天下科技发展有限公司 Method for dynamic password multi-terminal combined authentication
CN102868665A (en) * 2011-07-05 2013-01-09 华为软件技术有限公司 Method and device for data transmission
CN102968722A (en) * 2012-12-21 2013-03-13 北京惠银通联科技有限公司 Method and system for transaction confirmation
CN103685311A (en) * 2013-12-27 2014-03-26 网易(杭州)网络有限公司 Log-in validation method and device

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217328A (en) * 2014-08-12 2014-12-17 小米科技有限责任公司 Multi-verification payment method and multi-verification payment device
CN105516054B (en) * 2014-09-22 2019-01-18 阿里巴巴集团控股有限公司 A kind of method and device of subscriber authentication
CN105516054A (en) * 2014-09-22 2016-04-20 阿里巴巴集团控股有限公司 User authentication method and user authentication device
CN105577621A (en) * 2014-10-16 2016-05-11 腾讯科技(深圳)有限公司 Service operation verification method, apparatus and system thereof
CN105577621B (en) * 2014-10-16 2020-04-24 腾讯科技(深圳)有限公司 Business operation verification method, device and system
CN105592005A (en) * 2014-10-22 2016-05-18 腾讯科技(深圳)有限公司 Safety verification method, apparatus, and system
CN105635040A (en) * 2014-10-27 2016-06-01 阿里巴巴集团控股有限公司 Validation method, device and system
CN105635040B (en) * 2014-10-27 2018-12-28 阿里巴巴集团控股有限公司 A kind of verification method, equipment and system
CN104572135B (en) * 2015-02-10 2018-04-10 深圳酷派技术有限公司 Processing method, the processing unit and terminal of instruction of instruction
CN104572135A (en) * 2015-02-10 2015-04-29 深圳酷派技术有限公司 Command processing method, command processing device and terminal
CN104680372A (en) * 2015-02-28 2015-06-03 熊贤浪 Transaction security payment method and system
CN105530129A (en) * 2015-12-11 2016-04-27 小米科技有限责任公司 Router reset method and device
CN105530129B (en) * 2015-12-11 2020-07-10 小米科技有限责任公司 Router resetting method and device
CN106101125A (en) * 2016-07-01 2016-11-09 龙官波 Authentication processing method, Apparatus and system
CN106209810A (en) * 2016-07-03 2016-12-07 韦建峰 A kind of verification method and generating means
CN107357821A (en) * 2017-05-24 2017-11-17 杭州励飞软件技术有限公司 Method for managing system, device and storage medium
CN108810267A (en) * 2018-05-30 2018-11-13 努比亚技术有限公司 verification information display control method, terminal and computer readable storage medium
CN108829464A (en) * 2018-06-25 2018-11-16 腾讯科技(深圳)有限公司 Serving starting method, device, computer equipment and storage medium
CN108829464B (en) * 2018-06-25 2022-02-22 腾讯科技(深圳)有限公司 Service starting method and device, computer equipment and storage medium
CN109146489A (en) * 2018-09-29 2019-01-04 平安科技(深圳)有限公司 Safe payment method, device, server and storage medium
WO2020062784A1 (en) * 2018-09-29 2020-04-02 平安科技(深圳)有限公司 Secure payment method and apparatus, and server and storage medium
CN111242605A (en) * 2018-11-29 2020-06-05 中国移动通信集团广东有限公司 Mobile payment method
CN111242605B (en) * 2018-11-29 2023-09-19 中国移动通信集团广东有限公司 Mobile payment method
CN111986405A (en) * 2020-09-01 2020-11-24 中国银行股份有限公司 Method and device for verifying withdrawal of common property based on ATM
CN111986405B (en) * 2020-09-01 2022-04-26 中国银行股份有限公司 Method and device for verifying withdrawal of common property based on ATM
CN112446020A (en) * 2020-12-07 2021-03-05 北京小米松果电子有限公司 Authentication method, authentication device and storage medium

Similar Documents

Publication Publication Date Title
CN103971239A (en) Verification method and device
KR101583741B1 (en) Two-Factor Authentication Systems and Methods
CN105933266B (en) A kind of verification method and server
CN105515783B (en) Identity identifying method, server and certification terminal
CN104077689A (en) Information verification method, relevant device and system
CN106372940A (en) Identity authentication method based on block chain network, server and terminal device
CN105868970B (en) authentication method and electronic equipment
CN103973711A (en) Verification method and device
CN103039098A (en) Authentication method and system using portable terminal
CN110826043A (en) Digital identity application system and method, identity authentication system and method
CN105989485B (en) Service management method and device
CN102130909A (en) Authentication method and system
CN106657032A (en) System and method for realizing identity identification and data authentication based on security medium confidential short message
CN103905191A (en) Verification method applied to mobile terminal, mobile terminal and system
CN106529955A (en) Payment method and device
CN106656993A (en) Dynamic verification code verifying method and apparatus
CN108400989A (en) A kind of safety certificate equipment of shared resource authentication, method and system
CN103139210A (en) Method of safety authentication
CN101296078A (en) Information interactive affirmation device in internetwork communication
CN104935550A (en) Intelligent electronic commerce user management system technique and operating method thereof
CN103684796A (en) SMI (subscriber identity module) card and personal identity authentication method
GB2508173A (en) Identity verification systems and methods
CN106779711A (en) Safe payment method and device based on eID
CN104702410A (en) Dynamic password authentication device, system and method
KR100563544B1 (en) Method for authenticating a user with one-time password

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140806