CN103973711B - A kind of verification method and device - Google Patents
A kind of verification method and device Download PDFInfo
- Publication number
- CN103973711B CN103973711B CN201410230960.7A CN201410230960A CN103973711B CN 103973711 B CN103973711 B CN 103973711B CN 201410230960 A CN201410230960 A CN 201410230960A CN 103973711 B CN103973711 B CN 103973711B
- Authority
- CN
- China
- Prior art keywords
- terminal
- standard
- current
- user name
- location information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
This application discloses a kind of verification method and devices, are applied to first terminal, and method includes:The checking request instruction that second terminal is sent is received, the current location information and current user name and current password of second terminal are included at least in checking request instruction;Current location information is compared with standard location information, obtains the first comparison result;Current user name and current password are compared with Standard User name and its corresponding standard cipher, obtain the second comparison result;According to the first comparison result and the second comparison result, the verification result for showing whether user is proved to be successful in second terminal is generated.The embodiment of the present application passes through while realizing user name password authentification, legitimate verification is carried out to the location information of second terminal, realize the double verification of the financial transaction to user, financial transaction behavior is not gone on when a verification is unsuccessful wherein, improves user's E-Security.
Description
Technical field
This application involves technical field of data processing, more particularly to a kind of verification generation method and device.
Background technology
With the development of society, people’s lives level is gradually increased, financial transaction behavior is also more and more frequent, with mobile phone
For being paid on line, people log in its Web bank by mobile phone and carry out amount of money payment to its article of consumption, and banking terminal receives
To after the consumer requests of user, one is carried out to its password and pre-stored standard cipher according to the user name of user in request
The verification of cause property is realized and is verified to the identity legitimacy of user, protects the financial transaction safety of user.
But in said program, banking terminal carries out verification judgement to the username and password of user, can not ensure user's
User name and password are by illegal use or are stolen simultaneously (as thief steals the mobile phone of user and usurps and is recorded on its mobile phone
Bank-user name and password etc.) when user E-Security, thus the financial transaction safety of user is relatively low.
Invention content
Technical problems to be solved in this application are to provide a kind of verification method and device, silver-colored in the prior art to solve
The username and password of row terminal-pair user carries out verification judgement, can not ensure user user name and password by illegal use
Or simultaneously be stolen when user E-Security, as a result, reduce user financial transaction safety the technical issues of.
This application provides a kind of verification methods, are applied to first terminal, the method includes:
The checking request instruction that second terminal is sent is received, the second terminal is included at least in the checking request instruction
Current location information and current user name and current password;
The current location information is compared with pre-set standard location information, obtains the first comparison result;
The current user name and current password are carried out with pre-set Standard User name and its corresponding standard cipher
It compares, obtains the second comparison result;
According to first comparison result and second comparison result, generation shows in the second terminal whether is user
The verification result being proved to be successful.
The above method, it is preferred that the standard location information is standard coordinate value range;
Wherein, described that the current location information is compared with pre-set standard location information, obtain first
Comparison result, including:
Judge whether the present coordinate values of second terminal described in the current location information are in the standard coordinate model
It encloses in value, generates the first comparison result, first comparison result shows whether the present coordinate values of the second terminal are in
In the standard coordinate value range.
The above method, it is preferred that the present coordinate values of the second terminal are the global positioning system of the second terminal
GPS positioning coordinate value.
The above method, it is preferred that the standard location information identifies for multiple standard places;
Wherein, described that the current location information is compared with pre-set standard location information, obtain first
Comparison result, including:
By the current location of second terminal described in current location information mark respectively with each standard place
Mark is compared successively, obtains the first comparison result, first comparison result shows the current location of the second terminal
Identify whether that the one place mark in being identified with the multiple standard place is consistent.
The above method, it is preferred that described by the current user name and current password and pre-set Standard User name
And its corresponding standard cipher is compared, and obtains the second comparison result, including:
The current user name is matched with pre-set Standard User name, obtains the first matching result;
There is the use to match with the current user name in first matching result shows the Standard User name
When name in an account book, the standard cipher of the corresponding Standard User name of the current password is matched, the second matching result is obtained;
The second comparison result is generated according to first matching result and second matching result;
Second comparison result show the current user name and current password whether with the Standard User name and its
Corresponding standard cipher is consistent;
There is no match with the current user name in first matching result shows the Standard User name
When user name, the second comparison result is generated according to first matching result.
Present invention also provides a kind of verification devices, are applied to first terminal, and described device includes:
Instruction reception unit, the checking request instruction for receiving second terminal transmission, in the checking request instruction extremely
Current location information including the second terminal and current user name and current password less;
First comparing unit, for the current location information to be compared with pre-set standard location information,
Obtain the first comparison result;
Second comparing unit, for by the current user name and current password and pre-set Standard User name and its
Corresponding standard cipher is compared, and obtains the second comparison result;
As a result generation unit, for according to first comparison result and second comparison result, generation to show described
The verification result that whether user is proved to be successful in second terminal.
Above-mentioned apparatus, it is preferred that the standard location information is standard coordinate value range;
Wherein, first comparing unit includes:
First comparison subunit, for judge second terminal described in the current location information present coordinate values whether
In the standard coordinate value range, the first comparison result is generated, first comparison result shows the second terminal
Whether present coordinate values are in the standard coordinate value range.
Above-mentioned apparatus, it is preferred that the present coordinate values of the second terminal are the global positioning system of the second terminal
GPS positioning coordinate value.
Above-mentioned apparatus, it is preferred that the standard location information identifies for multiple standard places;
Wherein, first comparing unit includes:
Second comparison subunit, for the current location of second terminal described in the current location information to be identified difference
It is compared successively with each standard place mark, obtains the first comparison result, first comparison result shows described
The current location of second terminal identifies whether that the one place mark in being identified with the multiple standard place is consistent.
Above-mentioned apparatus, it is preferred that second comparing unit includes:
First coupling subelement is obtained for matching the current user name with pre-set Standard User name
To the first matching result;
Second coupling subelement is worked as existing in showing the Standard User name in first matching result with described
When the user name that preceding user name matches, by the standard of the corresponding Standard User name of the current password, password is matched,
Obtain the second matching result;
It compares and generates subelement, compared for generating second according to first matching result and second matching result
As a result;
Second comparison result show the current user name and current password whether with the Standard User name and its
Corresponding standard cipher is consistent.
By said program it is found that a kind of verification method provided by the present application and device, are provided with applied to second terminal
In the first terminal of data connection, the application is by after the checking request instruction for receiving second terminal transmission, referring to this
The current location information and current user name and current password of second terminal are compared respectively in order, obtain two and compare knot
Fruit, then generate the whether successful verification result of user's checking in second terminal according to the two comparison results.The application by
While realizing user name password authentification, legitimate verification is carried out to the location information of second terminal, realizes the finance to user
The double verification of transaction does not go on financial transaction behavior when a verification is unsuccessful wherein, improves user's finance and hands over
Easy safety.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present application, for
For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these attached drawings
His attached drawing.
Fig. 1 is a kind of flow chart of verification method embodiment one provided by the present application;
Fig. 2 applies exemplary plot for the one of the embodiment of the present application;
Fig. 3 is the another application exemplary plot of the embodiment of the present application;
Fig. 4 is a kind of flow chart of verification method embodiment two provided by the present application;
Fig. 5 is that the another of the embodiment of the present application applies exemplary plot;
Fig. 6 is a kind of flow chart of verification method embodiment three provided by the present application;
Fig. 7 is the embodiment of the present application further using exemplary plot;
Fig. 8 is the flow chart of step 103 described in a kind of verification method example IV provided by the present application;
Fig. 9 is a kind of structural schematic diagram of verification device embodiment five provided by the present application;
Figure 10 is a kind of structural schematic diagram of verification device embodiment six provided by the present application;
Figure 11 is a kind of structural schematic diagram of verification device embodiment seven provided by the present application;
Figure 12 is a kind of part-structure schematic diagram of verification device embodiment eight provided by the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
With reference to figure 1, for a kind of flow chart of verification method embodiment one provided by the present application, wherein the method can be with
Applied in first terminal, the first terminal can be that the server of financial service center such as bank etc. is realized.The method
It may comprise steps of:
Step 101:Receive the checking request instruction that second terminal is sent.
Wherein, the current location information and current user name of the second terminal are included at least in the checking request instruction
And current password.
It should be noted that the second terminal can be that the terminal with unique identification's attribute such as mobile phone, pad is real
It is existing.The checking request instruction that the embodiment of the present application on the first terminal sends the second terminal obtains, such as Fig. 2
Shown in.
Wherein, the checking request instruction refers to that the user in the second terminal logs in or passes through when merchandising
The instruction that the second terminal is operated and is generated, carried in the instruction second terminal current location information and
Current user name and current password, the current user name are username information input by user in the second terminal, institute
It is encrypted message input by user in the second terminal to state current password.
Step 102:The current location information is compared with pre-set standard location information, obtains the first ratio
To result.
Wherein, the standard location information is pre-set licit traffic location information, and user only holds its second end
The operations such as other identity/password authentifications could be carried out when holding position corresponding in the standard location information.In the step
In 102, the current location information of the second terminal and the legal standard location information are compared, described is obtained with this
Whether two terminals are in the first comparison result of licit traffic position.
Step 103:By the current user name and current password and pre-set Standard User name and its corresponding standard
Password is compared, and obtains the second comparison result.
Wherein, refer to the current user name and its current password for inputting user by second terminal in the step 103
Compared with pre-stored legal Standard User name and its corresponding standard cipher in first terminal such as bank server terminal
It is right, with this obtain user in the second terminal whether be first terminal validated user the second comparison result.
It should be noted that the execution step interchangeable between the step 102 and the step 103, after exchanging
Technical solution is still fallen in the protection domain of the application.
Step 104:According to first comparison result and second comparison result, generation shows in the second terminal
The verification result whether user is proved to be successful.
Wherein, the step 104 refers to, according to above two comparison result, judges in second terminal whether user is the
Whether one terminal validated user and the user are in licit traffic position, generate whether user in second terminal verifies into this
The verification result of work(.
Specifically, the step 104 can implement in the following manner:
Judging that first comparison result shows that the current location information is consistent with the standard location information,
And second comparison result shows that the current user name and current password and the Standard User name and its corresponding standard are close
When code is corresponding, successful first verification result of user's checking in the second terminal is generated;
Judging that first comparison result shows the current location information and the standard location information and differ
It causes or second comparison result shows the current user name and current password and the Standard User name and its corresponding standard
Password and non-corresponding it is consistent when, generate unsuccessful second verification result of user's checking in the second terminal.
It should be noted that when generating the first verification result in the step 104, illustrate in the second terminal at this time
User be validated user and be in licit traffic position, allow in the second terminal user to log in first terminal or execution at this time
The financial transaction behavior of next step, such as payment action.When generating the second verification result in the step 104, illustrate at this time
User in the second terminal is disabled user or is in illegal transaction position, and user in second terminal is not allowed to step at this time
It records first terminal or executes the financial transaction behavior of next step, such as payment, even if with this user in its user name and password
It, all can terminal when being in the login of other illegal positions or transaction by second terminal when stolen or loss with the username and password
Current financial is merchandised, and ensures the financial transaction safety of user as a result,.
By said program it is found that a kind of verification method embodiment one provided by the present application, is applied to be arranged with second terminal
Have in the first terminal of data connection, the embodiment of the present application by receive second terminal transmission checking request instruction it
Afterwards, the current location information to second terminal in the instruction and current user name and current password are compared respectively, obtain two
A comparison result, then generate the whether successful verification result of user's checking in second terminal according to the two comparison results.This Shen
Please embodiment by while realizing user name password authentification, legitimate verification is carried out to the location information of second terminal, it is real
Now to the double verification of the financial transaction of user, financial transaction behavior is not gone on when a verification is unsuccessful wherein,
Improve user's E-Security.
In the realization of above-described embodiment, the standard location information can be different type location information, for example, the standard
Location information can be the standard coordinate value range that user is arranged according to its demand, such as office's coordinate range value of user and family
Front yard coordinate range value, as shown in Figure 3.It is a kind of stream of verification method embodiment two provided by the present application at this point, with reference to figure 4
Cheng Tu, wherein the step 102 can be realized by following steps:
Step 121:Judge whether the present coordinate values of second terminal described in the current location information are in the mark
In quasi coordinates value range, the first comparison result is generated.
Wherein, first comparison result shows whether the present coordinate values of the second terminal are in the standard coordinate
In value range.
As shown in Figure 5, the present coordinate values X of the second terminal is in office's coordinate of user in the second terminal
In value range, corresponding first comparison result shows that the second terminal is within the critical field value at this time, described
The present coordinate values Y of two terminals is in the office's coordinate range value and its family's coordinate range value of user in the second terminal
Outside, corresponding first comparison result shows that the second terminal is in except the critical field value at this time.
Wherein, the standard coordinate value range can correspond to global position system GPS elements of a fix value range, can also
The relative coordinate value range being arranged with a certain preset is corresponded to, correspondingly, the present coordinate values of the second terminal can be
GPS positioning coordinate value (is provided with the GPS positioning instrument that can obtain GPS coordinate) in the second terminal, or with institute
State the relative coordinate values subject to preset.
In addition, the standard location information may be multiple standard place marks, such as office identification and household identification
Deng the corresponding current location information includes being identified by the current location of the second terminal.For example, pre- in first terminal
If multiple standard place marks, in the second terminal when generating the checking request instruction, by its present coordinate values foundation
Preset location identifies and its coordinate range identifies the corresponding current location mark of the present coordinate values, the current location mark
Can be the one place mark in the site identifications, the preset location mark includes being identified by the standard place,
Therefore, the current location mark may be one in standard place mark, it is also possible to be identified for the preset location
In in addition to these standard places identify other than some site identifications.
It is a kind of flow chart of verification method embodiment three provided by the present application, wherein the step as a result, with reference to figure 6
102 can be realized by following steps:
Step 122:By the current location of second terminal described in current location information mark respectively with it is each described
Standard place mark is compared successively, obtains the first comparison result.
Wherein, first comparison result shows that the current location of the second terminal identifies whether and the multiple standard
One place mark in site identifications is consistent.
As shown in Figure 7, the office place of current location the mark H and user in the second terminal of the second terminal
Identify it is consistent, at this point, first comparison result shows the current location information and pre-set standard location information
It is consistent;Office site identifications and its family of the current location mark K of the second terminal with user in the second terminal
Site identifications are inconsistent, at this point, first comparison result shows the current location information and pre-set normal bit
Confidence breath is not consistent.
It is the flow chart of step 103 described in a kind of verification method example IV provided by the present application with reference to figure 8, wherein
The step 103 can be realized by following steps:
Step 131:The current user name is matched with pre-set Standard User name, obtains the first matching knot
Fruit.
Specifically, being previously provided with multiple Standard User names in the first terminal, work as to described in above-mentioned steps 131
Preceding user name with the presence or absence of being judged in the Standard User name, specifically, by the current user name successively with it is each
The Standard User name is matched one by one, obtains the first matching result, and first matching result shows the active user
Whether name is consistent with one of Standard User name or matches.
Step 132:Judge whether first matching result shows to exist and the current use in the Standard User name
The user name that name in an account book matches, if so, step 133 is executed, it is no to then follow the steps 134.
Step 133:The standard cipher of the corresponding Standard User name of the current password is matched, obtains second
With as a result, executing step 134.
Step 134:The second comparison result is generated according to first matching result and/or second matching result.
Wherein, second comparison result show the current user name and current password whether with the Standard User name
And its correspondence standard cipher is consistent.
Specifically, in the step 134 in first matching result shows the Standard User name exist with it is described
When the user name that current user name matches, and second matching result shows the corresponding Standard User of the current password
Name standard cipher it is consistent when, second comparison result show the current user name and current password with it is pre-set
Standard User name and its corresponding standard cipher are consistent, show to be not present in the Standard User name in first matching result
When the user name to match with the current user name, second comparison result shows that the current user name is not present, and needs
It wants user to re-enter user name and password by second terminal, current user name described in as described second comparison result and works as
Preceding password and pre-set Standard User name and its corresponding standard cipher are inconsistent.
With reference to figure 9, for a kind of structural schematic diagram of verification device embodiment five provided by the present application, wherein described device
It can be applied in first terminal, the first terminal can be that the server of financial service center such as bank etc. is realized.It is described
Device may include with lower structure:
Instruction reception unit 901, the checking request instruction sent for receiving the second terminal.
Wherein, the current location information and current user name of the second terminal are included at least in the checking request instruction
And current password.
It should be noted that the second terminal can be that the terminal with unique identification's attribute such as mobile phone, pad is real
It is existing.The checking request instruction that the embodiment of the present application on the first terminal sends the second terminal obtains, such as Fig. 2
Shown in.
Wherein, the checking request instruction refers to that the user in the second terminal logs in or passes through when merchandising
The instruction that the second terminal is operated and is generated, carried in the instruction second terminal current location information and
Current user name and current password, the current user name are username information input by user in the second terminal, institute
It is encrypted message input by user in the second terminal to state current password.
First comparing unit 902, for comparing the current location information and pre-set standard location information
It is right, obtain the first comparison result.
Wherein, the standard location information is pre-set licit traffic location information, and user only holds its second end
The operations such as other identity/password authentifications could be carried out when holding position corresponding in the standard location information.Described first
In comparing unit 902, the current location information of the second terminal and the legal standard location information are compared, obtained with this
The first comparison result of licit traffic position whether is in the second terminal.
Second comparing unit 903 is used for the current user name and current password and pre-set Standard User name
And its corresponding standard cipher is compared, and obtains the second comparison result.
Wherein, second comparing unit 903 refers to, by current user name that user is inputted by second terminal and its works as
Preceding password and pre-stored legal Standard User name and its corresponding standard cipher in first terminal such as bank server terminal
Be compared, with this obtain user in the second terminal whether be first terminal validated user the second comparison result.
As a result generation unit 904, for according to first comparison result and second comparison result, generation to show institute
The verification result that whether user is proved to be successful in second terminal stated.
Wherein, the result generation unit 904 refers to, according to above two comparison result, judging user in second terminal
Whether it is whether first terminal validated user and the user are in licit traffic position, generating user in second terminal with this is
The no verification result being proved to be successful.
Specifically, the result generation unit 904 can implement in the following manner:
Judging that first comparison result shows that the current location information is consistent with the standard location information,
And second comparison result shows that the current user name and current password and the Standard User name and its corresponding standard are close
When code is corresponding, successful first verification result of user's checking in the second terminal is generated;
Judging that first comparison result shows the current location information and the standard location information and differ
It causes or second comparison result shows the current user name and current password and the Standard User name and its corresponding standard
Password and non-corresponding it is consistent when, generate unsuccessful second verification result of user's checking in the second terminal.
It should be noted that when generating the first verification result in the result generation unit 904, illustrate described at this time
User in two terminals is validated user and is in licit traffic position, and user in the second terminal is allowed to log in first eventually at this time
End or the financial transaction behavior for executing next step, such as payment action.The second verification is generated in the result generation unit 904
When as a result, illustrates that the user in the second terminal at this time is disabled user or is in illegal transaction position, do not allow at this time
User logs in first terminal or executes the financial transaction behavior of next step in second terminal, such as payment, with this user at it
Even if being in other illegal positions by second terminal when user name and password are stolen or lose with the username and password to log in
Or transaction when, all can terminal current financial transaction, as a result, ensure user financial transaction safety.
By said program it is found that a kind of verification device embodiment five provided by the present application, is applied to be arranged with second terminal
Have in the first terminal of data connection, the embodiment of the present application by receive second terminal transmission checking request instruction it
Afterwards, the current location information to second terminal in the instruction and current user name and current password are compared respectively, obtain two
A comparison result, then generate the whether successful verification result of user's checking in second terminal according to the two comparison results.This Shen
Please embodiment by while realizing user name password authentification, legitimate verification is carried out to the location information of second terminal, it is real
Now to the double verification of the financial transaction of user, financial transaction behavior is not gone on when a verification is unsuccessful wherein,
Improve user's E-Security.
In the realization of above-described embodiment, the standard location information can be different type location information, for example, the standard
Location information can be the standard coordinate value range that user is arranged according to its demand, such as office's coordinate range value of user and family
Front yard coordinate range value, as shown in Figure 3.At this point, with reference to figure 10, for a kind of knot of verification device embodiment six provided by the present application
Structure schematic diagram, wherein first comparing unit 902 may include being realized with lower structure:
First comparison subunit 921, the present coordinate values for judging second terminal described in the current location information
Whether in the standard coordinate value range, the first comparison result is generated.
Wherein, first comparison result shows whether the present coordinate values of the second terminal are in the standard coordinate
In value range.
As shown in Figure 5, the present coordinate values X of the second terminal is in office's coordinate of user in the second terminal
In value range, corresponding first comparison result shows that the second terminal is within the critical field value at this time, described
The present coordinate values Y of two terminals is in the office's coordinate range value and its family's coordinate range value of user in the second terminal
Outside, corresponding first comparison result shows that the second terminal is in except the critical field value at this time.
Wherein, the standard coordinate value range can correspond to global position system GPS elements of a fix value range, can also
The relative coordinate value range being arranged with a certain preset is corresponded to, correspondingly, the present coordinate values of the second terminal can be
GPS positioning coordinate value (is provided with the GPS positioning instrument that can obtain GPS coordinate) in the second terminal, or with institute
State the relative coordinate values subject to preset.
In addition, the standard location information may be multiple standard place marks, such as office identification and household identification
Deng the corresponding current location information includes being identified by the current location of the second terminal.For example, pre- in first terminal
If multiple standard place marks, in the second terminal when generating the checking request instruction, by its present coordinate values foundation
Preset location identifies and its coordinate range identifies the corresponding current location mark of the present coordinate values, the current location mark
Can be the one place mark in the site identifications, the preset location mark includes being identified by the standard place,
Therefore, the current location mark may be one in standard place mark, it is also possible to be identified for the preset location
In in addition to these standard places identify other than some site identifications.
As a result, with reference to figure 11, for a kind of structural schematic diagram of verification device embodiment seven provided by the present application, wherein institute
State the first comparing unit 902 can also be by being realized with lower structure:
Second comparison subunit 922, for identifying the current location of second terminal described in the current location information
It is compared successively with each standard place mark respectively, obtains the first comparison result.
Wherein, first comparison result shows that the current location of the second terminal identifies whether and the multiple standard
One place mark in site identifications is consistent.
As shown in Figure 7, the office place of current location the mark H and user in the second terminal of the second terminal
Identify it is consistent, at this point, first comparison result shows the current location information and pre-set standard location information
It is consistent;Office site identifications and its family of the current location mark K of the second terminal with user in the second terminal
Site identifications are inconsistent, at this point, first comparison result shows the current location information and pre-set normal bit
Confidence breath is not consistent.
With reference to figure 12, for a kind of knot for verifying the second comparing unit 903 described in device embodiment eight provided by the present application
Structure schematic diagram, wherein second comparing unit 903 may include being realized with lower structure:
First coupling subelement 931, for the current user name to be matched with pre-set Standard User name,
Obtain the first matching result.
Specifically, multiple Standard User names are previously provided in the first terminal, in first coupling subelement 931
In the current user name whether there is judge in the Standard User name, specifically, by the current user name
It is matched one by one with each Standard User name successively, obtains the first matching result, first matching result shows institute
It is whether consistent with one of Standard User name or match to state current user name.
Second coupling subelement 932, for existing and institute in showing the Standard User name in first matching result
When stating the user name that current user name matches, by the standard of the corresponding Standard User name of the current password, password carries out
Matching, obtains the second matching result.
It compares and generates subelement 933, for generating second according to first matching result and second matching result
Comparison result.
Wherein, second comparison result show the current user name and current password whether with the Standard User name
And its correspondence standard cipher is consistent.
Specifically, the comparison generates in subelement 933, in first matching result shows the Standard User name
When in the presence of the user name to match with the current user name, and second matching result shows that the current password is right with it
When answering the standard cipher of Standard User name consistent, second comparison result show the current user name and current password with
Pre-set Standard User name and its corresponding standard cipher are consistent, show the Standard User in first matching result
There is no when the user name to match with the current user name in name, second comparison result shows the current user name
It is not present, user is needed to re-enter user name and password by second terminal, it is current described in as described second comparison result
User name and current password and pre-set Standard User name and its corresponding standard cipher are inconsistent.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment weight
Point explanation is all difference from other examples, and the same or similar parts between the embodiments can be referred to each other.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment including a series of elements includes not only that
A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
A kind of verification method provided herein and device are described in detail above, it is used herein specifically
The principle and implementation of this application are described for a example, and the explanation of above example is only intended to help to understand the application
Method and its core concept;Meanwhile for those of ordinary skill in the art, according to the thought of the application, it is being embodied
There will be changes in mode and application range, in conclusion the contents of this specification should not be construed as limiting the present application.
Claims (10)
1. a kind of verification method, which is characterized in that be applied to first terminal, the verification includes that user is logged in by second terminal
Its Web bank carries out its article of consumption verification when amount of money payment;The method includes:
The checking request instruction that second terminal is sent is received, working as the second terminal is included at least in the checking request instruction
Front position information and current user name and current password;The second terminal be user hold with unique identification's attribute
Mobile terminal;The checking request instruction refers to when the user in the second terminal logs in or merchandises by institute
State second terminal operated and the instruction that generates;
The current location information is compared with pre-set standard location information, obtains the first comparison result;
The current user name and current password are compared with pre-set Standard User name and its corresponding standard cipher,
Obtain the second comparison result;
According to first comparison result and second comparison result, generation shows whether user verifies in the second terminal
Successful verification result.
2. according to the method described in claim 1, it is characterized in that, the standard location information is standard coordinate value range;
Wherein, described that the current location information is compared with pre-set standard location information, obtain the first comparison
As a result, including:
Judge whether the present coordinate values of second terminal described in the current location information are in the standard coordinate value range
It is interior, the first comparison result is generated, first comparison result shows the present coordinate values of the second terminal whether in described
In standard coordinate value range.
3. according to the method described in claim 2, it is characterized in that, the present coordinate values of the second terminal are described second whole
The global position system GPS elements of a fix value at end.
4. according to the method described in claim 1, it is characterized in that, the standard location information identifies for multiple standard places;
Wherein, described that the current location information is compared with pre-set standard location information, obtain the first comparison
As a result, including:
The current location mark of second terminal described in the current location information is identified with each standard place respectively
It is compared successively, obtains the first comparison result, first comparison result shows the current location mark of the second terminal
One place mark in whether being identified with the multiple standard place is consistent.
5. method according to claim 1,2,3 or 4, which is characterized in that described by the current user name and current close
Code is compared with pre-set Standard User name and its corresponding standard cipher, obtains the second comparison result, including:
The current user name is matched with pre-set Standard User name, obtains the first matching result;
There is the user name to match with the current user name in first matching result shows the Standard User name
When, the standard cipher of the corresponding Standard User name of the current password is matched, the second matching result is obtained;
The second comparison result is generated according to first matching result and/or second matching result;
Second comparison result show the current user name and current password whether with the Standard User name and its corresponding
Standard cipher is consistent;
There is no the users to match with the current user name in first matching result shows the Standard User name
When name, the second comparison result is generated according to first matching result.
6. a kind of verification device, which is characterized in that be applied to first terminal, the verification includes that user is logged in by second terminal
Its Web bank carries out its article of consumption verification when amount of money payment;Described device includes:
Instruction reception unit, the checking request instruction for receiving second terminal transmission are at least wrapped in the checking request instruction
Include the current location information and current user name and current password of the second terminal;The second terminal is the tool that user holds
There is the mobile terminal of unique identification's attribute;The checking request instruction refers to that the user in the second terminal steps on
The instruction generated by being operated to the second terminal when land or transaction;First comparing unit, being used for will be described current
Location information is compared with pre-set standard location information, obtains the first comparison result;
Second comparing unit, for by the current user name and current password and pre-set Standard User name and its corresponding
Standard cipher is compared, and obtains the second comparison result;
As a result generation unit, for according to first comparison result and second comparison result, generation to show described second
The verification result that whether user is proved to be successful in terminal.
7. device according to claim 6, which is characterized in that the standard location information is standard coordinate value range;
Wherein, first comparing unit includes:
First comparison subunit, for judging whether the present coordinate values of second terminal described in the current location information are in
In the standard coordinate value range, the first comparison result is generated, first comparison result shows the current of the second terminal
Whether coordinate value is in the standard coordinate value range.
8. device according to claim 7, which is characterized in that the present coordinate values of the second terminal are described second whole
The global position system GPS elements of a fix value at end.
9. device according to claim 6, which is characterized in that the standard location information identifies for multiple standard places;
Wherein, first comparing unit includes:
Second comparison subunit, for by the current location of second terminal described in current location information mark respectively with often
A standard place mark is compared successively, obtains the first comparison result, first comparison result shows described second
The current location of terminal identifies whether that the one place mark in being identified with the multiple standard place is consistent.
10. according to the device described in claim 6,7,8 or 9, which is characterized in that second comparing unit includes:
First coupling subelement obtains for matching the current user name with pre-set Standard User name
One matching result;
Second coupling subelement, for existing and the current use in showing the Standard User name in first matching result
When the user name that name in an account book matches, by the standard of the corresponding Standard User name of the current password, password is matched, is obtained
Second matching result;
It compares and generates subelement, compared for generating second according to first matching result and/or second matching result
As a result;
Second comparison result show the current user name and current password whether with the Standard User name and its corresponding
Standard cipher is consistent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410230960.7A CN103973711B (en) | 2014-05-28 | 2014-05-28 | A kind of verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410230960.7A CN103973711B (en) | 2014-05-28 | 2014-05-28 | A kind of verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103973711A CN103973711A (en) | 2014-08-06 |
CN103973711B true CN103973711B (en) | 2018-07-24 |
Family
ID=51242757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410230960.7A Active CN103973711B (en) | 2014-05-28 | 2014-05-28 | A kind of verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103973711B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105634739B (en) * | 2015-04-21 | 2019-03-22 | 宇龙计算机通信科技(深圳)有限公司 | The processing method of payment request, the processing unit of payment request and terminal |
CN104794616A (en) * | 2015-05-11 | 2015-07-22 | 易联支付有限公司 | Safety verification method for mobile phone payment |
CN104794615A (en) * | 2015-05-11 | 2015-07-22 | 易联支付有限公司 | Safety verification method for mobile phone payment |
CN105162775A (en) * | 2015-08-05 | 2015-12-16 | 深圳市方迪科技股份有限公司 | Logging method and device of virtual machine |
CN106529248B (en) * | 2016-10-20 | 2020-02-07 | 广东小天才科技有限公司 | User terminal unlocking method and device and user terminal |
CN107995587B (en) * | 2016-10-25 | 2021-03-16 | 中国电信股份有限公司 | Authentication method, authentication platform, authentication system and service provider platform |
CN107995150B (en) * | 2016-10-27 | 2020-08-28 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN107241348A (en) * | 2017-07-13 | 2017-10-10 | 上海斐讯数据通信技术有限公司 | Alarming method and system that a kind of router is logged in |
CN107516207A (en) * | 2017-08-15 | 2017-12-26 | 上海与德科技有限公司 | A kind of data identification method and device |
CN110378695A (en) * | 2019-06-19 | 2019-10-25 | 深圳壹账通智能科技有限公司 | Bank card payment method, device, equipment and computer storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103035078A (en) * | 2012-11-30 | 2013-04-10 | 深圳天源迪科信息技术股份有限公司 | Payment security monitoring method based on position |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101374046B (en) * | 2007-08-23 | 2011-01-05 | 中兴通讯股份有限公司 | Method for implementing user port orientation on wideband access equipment |
CN101582769B (en) * | 2009-07-03 | 2012-07-04 | 杭州华三通信技术有限公司 | Authority setting method of user access network and equipment |
CN101945412A (en) * | 2009-07-07 | 2011-01-12 | 中兴通讯股份有限公司 | Service protection method and device based on user level |
JP5372254B2 (en) * | 2010-07-21 | 2013-12-18 | 楽天株式会社 | Server apparatus, posting information processing method, posting information processing program, and recording medium |
CN102664989A (en) * | 2012-03-26 | 2012-09-12 | 中国联合网络通信集团有限公司 | Data processing method of terminal lexicon, apparatus and terminal thereof |
CN102685106B (en) * | 2012-03-27 | 2015-09-30 | 北京百纳威尔科技有限公司 | A kind of safe verification method and equipment |
CN103077458A (en) * | 2012-09-24 | 2013-05-01 | 安徽杨凌科技有限公司 | ATM (automated teller machine) secure transaction authentication method based on position |
-
2014
- 2014-05-28 CN CN201410230960.7A patent/CN103973711B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103035078A (en) * | 2012-11-30 | 2013-04-10 | 深圳天源迪科信息技术股份有限公司 | Payment security monitoring method based on position |
Also Published As
Publication number | Publication date |
---|---|
CN103973711A (en) | 2014-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103973711B (en) | A kind of verification method and device | |
US9235695B2 (en) | Alias-based social media identity verification | |
TWI530894B (en) | Method and related apparatus for information verification and apparatus thereof | |
CN102164141B (en) | Method for protecting security of account | |
CN106357640A (en) | Method, system and server for authenticating identities on basis of block chain networks | |
JP6481038B2 (en) | Service processing method and apparatus, and service server | |
CN103123706A (en) | Management method, device and system of bill payment for another | |
CN103971239A (en) | Verification method and device | |
CN103023638A (en) | Identity verification method and device based on mobile terminal | |
CN105281908A (en) | USB Key and USB Key digital certificate write-in method and device | |
CN105184567A (en) | Information processing method, processing device and mobile terminal | |
US20170076285A1 (en) | Payment Method and Apparatus and Payment Factor Processing Method and Apparatus | |
CN102739667A (en) | Verification method, device and system based on verification prompt message and server | |
CN104901924A (en) | Internet account verifying method and device | |
JP2014106593A (en) | Transaction authentication method and system | |
CN105741116A (en) | Fast payment method, apparatus and system | |
CN102413146B (en) | Client authorized logon method based on dynamic codes | |
CN105871903A (en) | Information security control method and system as well as mobile terminal | |
TWI786039B (en) | Offline payment method, terminal equipment, backstage payment device and offline payment system | |
CN105790952A (en) | Verification system and verification method of user information | |
KR101603963B1 (en) | Authentication method using fingerprint information and certification number, user terminal and financial institution server | |
CN105591746B (en) | A kind of processing method and processing system of online binding accepting terminal | |
CN110351672A (en) | Information-pushing method, device and electronic equipment | |
JP2006155547A (en) | Individual authentication system, terminal device and server | |
CN107040497A (en) | Network account theft preventing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |