CN103973711B - A kind of verification method and device - Google Patents

A kind of verification method and device Download PDF

Info

Publication number
CN103973711B
CN103973711B CN201410230960.7A CN201410230960A CN103973711B CN 103973711 B CN103973711 B CN 103973711B CN 201410230960 A CN201410230960 A CN 201410230960A CN 103973711 B CN103973711 B CN 103973711B
Authority
CN
China
Prior art keywords
terminal
standard
current
user name
location information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410230960.7A
Other languages
Chinese (zh)
Other versions
CN103973711A (en
Inventor
蔡立晶
齐向东
孟毅颖
陈尚元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN201410230960.7A priority Critical patent/CN103973711B/en
Publication of CN103973711A publication Critical patent/CN103973711A/en
Application granted granted Critical
Publication of CN103973711B publication Critical patent/CN103973711B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

This application discloses a kind of verification method and devices, are applied to first terminal, and method includes:The checking request instruction that second terminal is sent is received, the current location information and current user name and current password of second terminal are included at least in checking request instruction;Current location information is compared with standard location information, obtains the first comparison result;Current user name and current password are compared with Standard User name and its corresponding standard cipher, obtain the second comparison result;According to the first comparison result and the second comparison result, the verification result for showing whether user is proved to be successful in second terminal is generated.The embodiment of the present application passes through while realizing user name password authentification, legitimate verification is carried out to the location information of second terminal, realize the double verification of the financial transaction to user, financial transaction behavior is not gone on when a verification is unsuccessful wherein, improves user's E-Security.

Description

A kind of verification method and device
Technical field
This application involves technical field of data processing, more particularly to a kind of verification generation method and device.
Background technology
With the development of society, people’s lives level is gradually increased, financial transaction behavior is also more and more frequent, with mobile phone For being paid on line, people log in its Web bank by mobile phone and carry out amount of money payment to its article of consumption, and banking terminal receives To after the consumer requests of user, one is carried out to its password and pre-stored standard cipher according to the user name of user in request The verification of cause property is realized and is verified to the identity legitimacy of user, protects the financial transaction safety of user.
But in said program, banking terminal carries out verification judgement to the username and password of user, can not ensure user's User name and password are by illegal use or are stolen simultaneously (as thief steals the mobile phone of user and usurps and is recorded on its mobile phone Bank-user name and password etc.) when user E-Security, thus the financial transaction safety of user is relatively low.
Invention content
Technical problems to be solved in this application are to provide a kind of verification method and device, silver-colored in the prior art to solve The username and password of row terminal-pair user carries out verification judgement, can not ensure user user name and password by illegal use Or simultaneously be stolen when user E-Security, as a result, reduce user financial transaction safety the technical issues of.
This application provides a kind of verification methods, are applied to first terminal, the method includes:
The checking request instruction that second terminal is sent is received, the second terminal is included at least in the checking request instruction Current location information and current user name and current password;
The current location information is compared with pre-set standard location information, obtains the first comparison result;
The current user name and current password are carried out with pre-set Standard User name and its corresponding standard cipher It compares, obtains the second comparison result;
According to first comparison result and second comparison result, generation shows in the second terminal whether is user The verification result being proved to be successful.
The above method, it is preferred that the standard location information is standard coordinate value range;
Wherein, described that the current location information is compared with pre-set standard location information, obtain first Comparison result, including:
Judge whether the present coordinate values of second terminal described in the current location information are in the standard coordinate model It encloses in value, generates the first comparison result, first comparison result shows whether the present coordinate values of the second terminal are in In the standard coordinate value range.
The above method, it is preferred that the present coordinate values of the second terminal are the global positioning system of the second terminal GPS positioning coordinate value.
The above method, it is preferred that the standard location information identifies for multiple standard places;
Wherein, described that the current location information is compared with pre-set standard location information, obtain first Comparison result, including:
By the current location of second terminal described in current location information mark respectively with each standard place Mark is compared successively, obtains the first comparison result, first comparison result shows the current location of the second terminal Identify whether that the one place mark in being identified with the multiple standard place is consistent.
The above method, it is preferred that described by the current user name and current password and pre-set Standard User name And its corresponding standard cipher is compared, and obtains the second comparison result, including:
The current user name is matched with pre-set Standard User name, obtains the first matching result;
There is the use to match with the current user name in first matching result shows the Standard User name When name in an account book, the standard cipher of the corresponding Standard User name of the current password is matched, the second matching result is obtained;
The second comparison result is generated according to first matching result and second matching result;
Second comparison result show the current user name and current password whether with the Standard User name and its Corresponding standard cipher is consistent;
There is no match with the current user name in first matching result shows the Standard User name When user name, the second comparison result is generated according to first matching result.
Present invention also provides a kind of verification devices, are applied to first terminal, and described device includes:
Instruction reception unit, the checking request instruction for receiving second terminal transmission, in the checking request instruction extremely Current location information including the second terminal and current user name and current password less;
First comparing unit, for the current location information to be compared with pre-set standard location information, Obtain the first comparison result;
Second comparing unit, for by the current user name and current password and pre-set Standard User name and its Corresponding standard cipher is compared, and obtains the second comparison result;
As a result generation unit, for according to first comparison result and second comparison result, generation to show described The verification result that whether user is proved to be successful in second terminal.
Above-mentioned apparatus, it is preferred that the standard location information is standard coordinate value range;
Wherein, first comparing unit includes:
First comparison subunit, for judge second terminal described in the current location information present coordinate values whether In the standard coordinate value range, the first comparison result is generated, first comparison result shows the second terminal Whether present coordinate values are in the standard coordinate value range.
Above-mentioned apparatus, it is preferred that the present coordinate values of the second terminal are the global positioning system of the second terminal GPS positioning coordinate value.
Above-mentioned apparatus, it is preferred that the standard location information identifies for multiple standard places;
Wherein, first comparing unit includes:
Second comparison subunit, for the current location of second terminal described in the current location information to be identified difference It is compared successively with each standard place mark, obtains the first comparison result, first comparison result shows described The current location of second terminal identifies whether that the one place mark in being identified with the multiple standard place is consistent.
Above-mentioned apparatus, it is preferred that second comparing unit includes:
First coupling subelement is obtained for matching the current user name with pre-set Standard User name To the first matching result;
Second coupling subelement is worked as existing in showing the Standard User name in first matching result with described When the user name that preceding user name matches, by the standard of the corresponding Standard User name of the current password, password is matched, Obtain the second matching result;
It compares and generates subelement, compared for generating second according to first matching result and second matching result As a result;
Second comparison result show the current user name and current password whether with the Standard User name and its Corresponding standard cipher is consistent.
By said program it is found that a kind of verification method provided by the present application and device, are provided with applied to second terminal In the first terminal of data connection, the application is by after the checking request instruction for receiving second terminal transmission, referring to this The current location information and current user name and current password of second terminal are compared respectively in order, obtain two and compare knot Fruit, then generate the whether successful verification result of user's checking in second terminal according to the two comparison results.The application by While realizing user name password authentification, legitimate verification is carried out to the location information of second terminal, realizes the finance to user The double verification of transaction does not go on financial transaction behavior when a verification is unsuccessful wherein, improves user's finance and hands over Easy safety.
Description of the drawings
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present application, for For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these attached drawings His attached drawing.
Fig. 1 is a kind of flow chart of verification method embodiment one provided by the present application;
Fig. 2 applies exemplary plot for the one of the embodiment of the present application;
Fig. 3 is the another application exemplary plot of the embodiment of the present application;
Fig. 4 is a kind of flow chart of verification method embodiment two provided by the present application;
Fig. 5 is that the another of the embodiment of the present application applies exemplary plot;
Fig. 6 is a kind of flow chart of verification method embodiment three provided by the present application;
Fig. 7 is the embodiment of the present application further using exemplary plot;
Fig. 8 is the flow chart of step 103 described in a kind of verification method example IV provided by the present application;
Fig. 9 is a kind of structural schematic diagram of verification device embodiment five provided by the present application;
Figure 10 is a kind of structural schematic diagram of verification device embodiment six provided by the present application;
Figure 11 is a kind of structural schematic diagram of verification device embodiment seven provided by the present application;
Figure 12 is a kind of part-structure schematic diagram of verification device embodiment eight provided by the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
With reference to figure 1, for a kind of flow chart of verification method embodiment one provided by the present application, wherein the method can be with Applied in first terminal, the first terminal can be that the server of financial service center such as bank etc. is realized.The method It may comprise steps of:
Step 101:Receive the checking request instruction that second terminal is sent.
Wherein, the current location information and current user name of the second terminal are included at least in the checking request instruction And current password.
It should be noted that the second terminal can be that the terminal with unique identification's attribute such as mobile phone, pad is real It is existing.The checking request instruction that the embodiment of the present application on the first terminal sends the second terminal obtains, such as Fig. 2 Shown in.
Wherein, the checking request instruction refers to that the user in the second terminal logs in or passes through when merchandising The instruction that the second terminal is operated and is generated, carried in the instruction second terminal current location information and Current user name and current password, the current user name are username information input by user in the second terminal, institute It is encrypted message input by user in the second terminal to state current password.
Step 102:The current location information is compared with pre-set standard location information, obtains the first ratio To result.
Wherein, the standard location information is pre-set licit traffic location information, and user only holds its second end The operations such as other identity/password authentifications could be carried out when holding position corresponding in the standard location information.In the step In 102, the current location information of the second terminal and the legal standard location information are compared, described is obtained with this Whether two terminals are in the first comparison result of licit traffic position.
Step 103:By the current user name and current password and pre-set Standard User name and its corresponding standard Password is compared, and obtains the second comparison result.
Wherein, refer to the current user name and its current password for inputting user by second terminal in the step 103 Compared with pre-stored legal Standard User name and its corresponding standard cipher in first terminal such as bank server terminal It is right, with this obtain user in the second terminal whether be first terminal validated user the second comparison result.
It should be noted that the execution step interchangeable between the step 102 and the step 103, after exchanging Technical solution is still fallen in the protection domain of the application.
Step 104:According to first comparison result and second comparison result, generation shows in the second terminal The verification result whether user is proved to be successful.
Wherein, the step 104 refers to, according to above two comparison result, judges in second terminal whether user is the Whether one terminal validated user and the user are in licit traffic position, generate whether user in second terminal verifies into this The verification result of work(.
Specifically, the step 104 can implement in the following manner:
Judging that first comparison result shows that the current location information is consistent with the standard location information, And second comparison result shows that the current user name and current password and the Standard User name and its corresponding standard are close When code is corresponding, successful first verification result of user's checking in the second terminal is generated;
Judging that first comparison result shows the current location information and the standard location information and differ It causes or second comparison result shows the current user name and current password and the Standard User name and its corresponding standard Password and non-corresponding it is consistent when, generate unsuccessful second verification result of user's checking in the second terminal.
It should be noted that when generating the first verification result in the step 104, illustrate in the second terminal at this time User be validated user and be in licit traffic position, allow in the second terminal user to log in first terminal or execution at this time The financial transaction behavior of next step, such as payment action.When generating the second verification result in the step 104, illustrate at this time User in the second terminal is disabled user or is in illegal transaction position, and user in second terminal is not allowed to step at this time It records first terminal or executes the financial transaction behavior of next step, such as payment, even if with this user in its user name and password It, all can terminal when being in the login of other illegal positions or transaction by second terminal when stolen or loss with the username and password Current financial is merchandised, and ensures the financial transaction safety of user as a result,.
By said program it is found that a kind of verification method embodiment one provided by the present application, is applied to be arranged with second terminal Have in the first terminal of data connection, the embodiment of the present application by receive second terminal transmission checking request instruction it Afterwards, the current location information to second terminal in the instruction and current user name and current password are compared respectively, obtain two A comparison result, then generate the whether successful verification result of user's checking in second terminal according to the two comparison results.This Shen Please embodiment by while realizing user name password authentification, legitimate verification is carried out to the location information of second terminal, it is real Now to the double verification of the financial transaction of user, financial transaction behavior is not gone on when a verification is unsuccessful wherein, Improve user's E-Security.
In the realization of above-described embodiment, the standard location information can be different type location information, for example, the standard Location information can be the standard coordinate value range that user is arranged according to its demand, such as office's coordinate range value of user and family Front yard coordinate range value, as shown in Figure 3.It is a kind of stream of verification method embodiment two provided by the present application at this point, with reference to figure 4 Cheng Tu, wherein the step 102 can be realized by following steps:
Step 121:Judge whether the present coordinate values of second terminal described in the current location information are in the mark In quasi coordinates value range, the first comparison result is generated.
Wherein, first comparison result shows whether the present coordinate values of the second terminal are in the standard coordinate In value range.
As shown in Figure 5, the present coordinate values X of the second terminal is in office's coordinate of user in the second terminal In value range, corresponding first comparison result shows that the second terminal is within the critical field value at this time, described The present coordinate values Y of two terminals is in the office's coordinate range value and its family's coordinate range value of user in the second terminal Outside, corresponding first comparison result shows that the second terminal is in except the critical field value at this time.
Wherein, the standard coordinate value range can correspond to global position system GPS elements of a fix value range, can also The relative coordinate value range being arranged with a certain preset is corresponded to, correspondingly, the present coordinate values of the second terminal can be GPS positioning coordinate value (is provided with the GPS positioning instrument that can obtain GPS coordinate) in the second terminal, or with institute State the relative coordinate values subject to preset.
In addition, the standard location information may be multiple standard place marks, such as office identification and household identification Deng the corresponding current location information includes being identified by the current location of the second terminal.For example, pre- in first terminal If multiple standard place marks, in the second terminal when generating the checking request instruction, by its present coordinate values foundation Preset location identifies and its coordinate range identifies the corresponding current location mark of the present coordinate values, the current location mark Can be the one place mark in the site identifications, the preset location mark includes being identified by the standard place, Therefore, the current location mark may be one in standard place mark, it is also possible to be identified for the preset location In in addition to these standard places identify other than some site identifications.
It is a kind of flow chart of verification method embodiment three provided by the present application, wherein the step as a result, with reference to figure 6 102 can be realized by following steps:
Step 122:By the current location of second terminal described in current location information mark respectively with it is each described Standard place mark is compared successively, obtains the first comparison result.
Wherein, first comparison result shows that the current location of the second terminal identifies whether and the multiple standard One place mark in site identifications is consistent.
As shown in Figure 7, the office place of current location the mark H and user in the second terminal of the second terminal Identify it is consistent, at this point, first comparison result shows the current location information and pre-set standard location information It is consistent;Office site identifications and its family of the current location mark K of the second terminal with user in the second terminal Site identifications are inconsistent, at this point, first comparison result shows the current location information and pre-set normal bit Confidence breath is not consistent.
It is the flow chart of step 103 described in a kind of verification method example IV provided by the present application with reference to figure 8, wherein The step 103 can be realized by following steps:
Step 131:The current user name is matched with pre-set Standard User name, obtains the first matching knot Fruit.
Specifically, being previously provided with multiple Standard User names in the first terminal, work as to described in above-mentioned steps 131 Preceding user name with the presence or absence of being judged in the Standard User name, specifically, by the current user name successively with it is each The Standard User name is matched one by one, obtains the first matching result, and first matching result shows the active user Whether name is consistent with one of Standard User name or matches.
Step 132:Judge whether first matching result shows to exist and the current use in the Standard User name The user name that name in an account book matches, if so, step 133 is executed, it is no to then follow the steps 134.
Step 133:The standard cipher of the corresponding Standard User name of the current password is matched, obtains second With as a result, executing step 134.
Step 134:The second comparison result is generated according to first matching result and/or second matching result.
Wherein, second comparison result show the current user name and current password whether with the Standard User name And its correspondence standard cipher is consistent.
Specifically, in the step 134 in first matching result shows the Standard User name exist with it is described When the user name that current user name matches, and second matching result shows the corresponding Standard User of the current password Name standard cipher it is consistent when, second comparison result show the current user name and current password with it is pre-set Standard User name and its corresponding standard cipher are consistent, show to be not present in the Standard User name in first matching result When the user name to match with the current user name, second comparison result shows that the current user name is not present, and needs It wants user to re-enter user name and password by second terminal, current user name described in as described second comparison result and works as Preceding password and pre-set Standard User name and its corresponding standard cipher are inconsistent.
With reference to figure 9, for a kind of structural schematic diagram of verification device embodiment five provided by the present application, wherein described device It can be applied in first terminal, the first terminal can be that the server of financial service center such as bank etc. is realized.It is described Device may include with lower structure:
Instruction reception unit 901, the checking request instruction sent for receiving the second terminal.
Wherein, the current location information and current user name of the second terminal are included at least in the checking request instruction And current password.
It should be noted that the second terminal can be that the terminal with unique identification's attribute such as mobile phone, pad is real It is existing.The checking request instruction that the embodiment of the present application on the first terminal sends the second terminal obtains, such as Fig. 2 Shown in.
Wherein, the checking request instruction refers to that the user in the second terminal logs in or passes through when merchandising The instruction that the second terminal is operated and is generated, carried in the instruction second terminal current location information and Current user name and current password, the current user name are username information input by user in the second terminal, institute It is encrypted message input by user in the second terminal to state current password.
First comparing unit 902, for comparing the current location information and pre-set standard location information It is right, obtain the first comparison result.
Wherein, the standard location information is pre-set licit traffic location information, and user only holds its second end The operations such as other identity/password authentifications could be carried out when holding position corresponding in the standard location information.Described first In comparing unit 902, the current location information of the second terminal and the legal standard location information are compared, obtained with this The first comparison result of licit traffic position whether is in the second terminal.
Second comparing unit 903 is used for the current user name and current password and pre-set Standard User name And its corresponding standard cipher is compared, and obtains the second comparison result.
Wherein, second comparing unit 903 refers to, by current user name that user is inputted by second terminal and its works as Preceding password and pre-stored legal Standard User name and its corresponding standard cipher in first terminal such as bank server terminal Be compared, with this obtain user in the second terminal whether be first terminal validated user the second comparison result.
As a result generation unit 904, for according to first comparison result and second comparison result, generation to show institute The verification result that whether user is proved to be successful in second terminal stated.
Wherein, the result generation unit 904 refers to, according to above two comparison result, judging user in second terminal Whether it is whether first terminal validated user and the user are in licit traffic position, generating user in second terminal with this is The no verification result being proved to be successful.
Specifically, the result generation unit 904 can implement in the following manner:
Judging that first comparison result shows that the current location information is consistent with the standard location information, And second comparison result shows that the current user name and current password and the Standard User name and its corresponding standard are close When code is corresponding, successful first verification result of user's checking in the second terminal is generated;
Judging that first comparison result shows the current location information and the standard location information and differ It causes or second comparison result shows the current user name and current password and the Standard User name and its corresponding standard Password and non-corresponding it is consistent when, generate unsuccessful second verification result of user's checking in the second terminal.
It should be noted that when generating the first verification result in the result generation unit 904, illustrate described at this time User in two terminals is validated user and is in licit traffic position, and user in the second terminal is allowed to log in first eventually at this time End or the financial transaction behavior for executing next step, such as payment action.The second verification is generated in the result generation unit 904 When as a result, illustrates that the user in the second terminal at this time is disabled user or is in illegal transaction position, do not allow at this time User logs in first terminal or executes the financial transaction behavior of next step in second terminal, such as payment, with this user at it Even if being in other illegal positions by second terminal when user name and password are stolen or lose with the username and password to log in Or transaction when, all can terminal current financial transaction, as a result, ensure user financial transaction safety.
By said program it is found that a kind of verification device embodiment five provided by the present application, is applied to be arranged with second terminal Have in the first terminal of data connection, the embodiment of the present application by receive second terminal transmission checking request instruction it Afterwards, the current location information to second terminal in the instruction and current user name and current password are compared respectively, obtain two A comparison result, then generate the whether successful verification result of user's checking in second terminal according to the two comparison results.This Shen Please embodiment by while realizing user name password authentification, legitimate verification is carried out to the location information of second terminal, it is real Now to the double verification of the financial transaction of user, financial transaction behavior is not gone on when a verification is unsuccessful wherein, Improve user's E-Security.
In the realization of above-described embodiment, the standard location information can be different type location information, for example, the standard Location information can be the standard coordinate value range that user is arranged according to its demand, such as office's coordinate range value of user and family Front yard coordinate range value, as shown in Figure 3.At this point, with reference to figure 10, for a kind of knot of verification device embodiment six provided by the present application Structure schematic diagram, wherein first comparing unit 902 may include being realized with lower structure:
First comparison subunit 921, the present coordinate values for judging second terminal described in the current location information Whether in the standard coordinate value range, the first comparison result is generated.
Wherein, first comparison result shows whether the present coordinate values of the second terminal are in the standard coordinate In value range.
As shown in Figure 5, the present coordinate values X of the second terminal is in office's coordinate of user in the second terminal In value range, corresponding first comparison result shows that the second terminal is within the critical field value at this time, described The present coordinate values Y of two terminals is in the office's coordinate range value and its family's coordinate range value of user in the second terminal Outside, corresponding first comparison result shows that the second terminal is in except the critical field value at this time.
Wherein, the standard coordinate value range can correspond to global position system GPS elements of a fix value range, can also The relative coordinate value range being arranged with a certain preset is corresponded to, correspondingly, the present coordinate values of the second terminal can be GPS positioning coordinate value (is provided with the GPS positioning instrument that can obtain GPS coordinate) in the second terminal, or with institute State the relative coordinate values subject to preset.
In addition, the standard location information may be multiple standard place marks, such as office identification and household identification Deng the corresponding current location information includes being identified by the current location of the second terminal.For example, pre- in first terminal If multiple standard place marks, in the second terminal when generating the checking request instruction, by its present coordinate values foundation Preset location identifies and its coordinate range identifies the corresponding current location mark of the present coordinate values, the current location mark Can be the one place mark in the site identifications, the preset location mark includes being identified by the standard place, Therefore, the current location mark may be one in standard place mark, it is also possible to be identified for the preset location In in addition to these standard places identify other than some site identifications.
As a result, with reference to figure 11, for a kind of structural schematic diagram of verification device embodiment seven provided by the present application, wherein institute State the first comparing unit 902 can also be by being realized with lower structure:
Second comparison subunit 922, for identifying the current location of second terminal described in the current location information It is compared successively with each standard place mark respectively, obtains the first comparison result.
Wherein, first comparison result shows that the current location of the second terminal identifies whether and the multiple standard One place mark in site identifications is consistent.
As shown in Figure 7, the office place of current location the mark H and user in the second terminal of the second terminal Identify it is consistent, at this point, first comparison result shows the current location information and pre-set standard location information It is consistent;Office site identifications and its family of the current location mark K of the second terminal with user in the second terminal Site identifications are inconsistent, at this point, first comparison result shows the current location information and pre-set normal bit Confidence breath is not consistent.
With reference to figure 12, for a kind of knot for verifying the second comparing unit 903 described in device embodiment eight provided by the present application Structure schematic diagram, wherein second comparing unit 903 may include being realized with lower structure:
First coupling subelement 931, for the current user name to be matched with pre-set Standard User name, Obtain the first matching result.
Specifically, multiple Standard User names are previously provided in the first terminal, in first coupling subelement 931 In the current user name whether there is judge in the Standard User name, specifically, by the current user name It is matched one by one with each Standard User name successively, obtains the first matching result, first matching result shows institute It is whether consistent with one of Standard User name or match to state current user name.
Second coupling subelement 932, for existing and institute in showing the Standard User name in first matching result When stating the user name that current user name matches, by the standard of the corresponding Standard User name of the current password, password carries out Matching, obtains the second matching result.
It compares and generates subelement 933, for generating second according to first matching result and second matching result Comparison result.
Wherein, second comparison result show the current user name and current password whether with the Standard User name And its correspondence standard cipher is consistent.
Specifically, the comparison generates in subelement 933, in first matching result shows the Standard User name When in the presence of the user name to match with the current user name, and second matching result shows that the current password is right with it When answering the standard cipher of Standard User name consistent, second comparison result show the current user name and current password with Pre-set Standard User name and its corresponding standard cipher are consistent, show the Standard User in first matching result There is no when the user name to match with the current user name in name, second comparison result shows the current user name It is not present, user is needed to re-enter user name and password by second terminal, it is current described in as described second comparison result User name and current password and pre-set Standard User name and its corresponding standard cipher are inconsistent.
It should be noted that each embodiment in this specification is described in a progressive manner, each embodiment weight Point explanation is all difference from other examples, and the same or similar parts between the embodiments can be referred to each other.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment including a series of elements includes not only that A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.
A kind of verification method provided herein and device are described in detail above, it is used herein specifically The principle and implementation of this application are described for a example, and the explanation of above example is only intended to help to understand the application Method and its core concept;Meanwhile for those of ordinary skill in the art, according to the thought of the application, it is being embodied There will be changes in mode and application range, in conclusion the contents of this specification should not be construed as limiting the present application.

Claims (10)

1. a kind of verification method, which is characterized in that be applied to first terminal, the verification includes that user is logged in by second terminal Its Web bank carries out its article of consumption verification when amount of money payment;The method includes:
The checking request instruction that second terminal is sent is received, working as the second terminal is included at least in the checking request instruction Front position information and current user name and current password;The second terminal be user hold with unique identification's attribute Mobile terminal;The checking request instruction refers to when the user in the second terminal logs in or merchandises by institute State second terminal operated and the instruction that generates;
The current location information is compared with pre-set standard location information, obtains the first comparison result;
The current user name and current password are compared with pre-set Standard User name and its corresponding standard cipher, Obtain the second comparison result;
According to first comparison result and second comparison result, generation shows whether user verifies in the second terminal Successful verification result.
2. according to the method described in claim 1, it is characterized in that, the standard location information is standard coordinate value range;
Wherein, described that the current location information is compared with pre-set standard location information, obtain the first comparison As a result, including:
Judge whether the present coordinate values of second terminal described in the current location information are in the standard coordinate value range It is interior, the first comparison result is generated, first comparison result shows the present coordinate values of the second terminal whether in described In standard coordinate value range.
3. according to the method described in claim 2, it is characterized in that, the present coordinate values of the second terminal are described second whole The global position system GPS elements of a fix value at end.
4. according to the method described in claim 1, it is characterized in that, the standard location information identifies for multiple standard places;
Wherein, described that the current location information is compared with pre-set standard location information, obtain the first comparison As a result, including:
The current location mark of second terminal described in the current location information is identified with each standard place respectively It is compared successively, obtains the first comparison result, first comparison result shows the current location mark of the second terminal One place mark in whether being identified with the multiple standard place is consistent.
5. method according to claim 1,2,3 or 4, which is characterized in that described by the current user name and current close Code is compared with pre-set Standard User name and its corresponding standard cipher, obtains the second comparison result, including:
The current user name is matched with pre-set Standard User name, obtains the first matching result;
There is the user name to match with the current user name in first matching result shows the Standard User name When, the standard cipher of the corresponding Standard User name of the current password is matched, the second matching result is obtained;
The second comparison result is generated according to first matching result and/or second matching result;
Second comparison result show the current user name and current password whether with the Standard User name and its corresponding Standard cipher is consistent;
There is no the users to match with the current user name in first matching result shows the Standard User name When name, the second comparison result is generated according to first matching result.
6. a kind of verification device, which is characterized in that be applied to first terminal, the verification includes that user is logged in by second terminal Its Web bank carries out its article of consumption verification when amount of money payment;Described device includes:
Instruction reception unit, the checking request instruction for receiving second terminal transmission are at least wrapped in the checking request instruction Include the current location information and current user name and current password of the second terminal;The second terminal is the tool that user holds There is the mobile terminal of unique identification's attribute;The checking request instruction refers to that the user in the second terminal steps on The instruction generated by being operated to the second terminal when land or transaction;First comparing unit, being used for will be described current Location information is compared with pre-set standard location information, obtains the first comparison result;
Second comparing unit, for by the current user name and current password and pre-set Standard User name and its corresponding Standard cipher is compared, and obtains the second comparison result;
As a result generation unit, for according to first comparison result and second comparison result, generation to show described second The verification result that whether user is proved to be successful in terminal.
7. device according to claim 6, which is characterized in that the standard location information is standard coordinate value range;
Wherein, first comparing unit includes:
First comparison subunit, for judging whether the present coordinate values of second terminal described in the current location information are in In the standard coordinate value range, the first comparison result is generated, first comparison result shows the current of the second terminal Whether coordinate value is in the standard coordinate value range.
8. device according to claim 7, which is characterized in that the present coordinate values of the second terminal are described second whole The global position system GPS elements of a fix value at end.
9. device according to claim 6, which is characterized in that the standard location information identifies for multiple standard places;
Wherein, first comparing unit includes:
Second comparison subunit, for by the current location of second terminal described in current location information mark respectively with often A standard place mark is compared successively, obtains the first comparison result, first comparison result shows described second The current location of terminal identifies whether that the one place mark in being identified with the multiple standard place is consistent.
10. according to the device described in claim 6,7,8 or 9, which is characterized in that second comparing unit includes:
First coupling subelement obtains for matching the current user name with pre-set Standard User name One matching result;
Second coupling subelement, for existing and the current use in showing the Standard User name in first matching result When the user name that name in an account book matches, by the standard of the corresponding Standard User name of the current password, password is matched, is obtained Second matching result;
It compares and generates subelement, compared for generating second according to first matching result and/or second matching result As a result;
Second comparison result show the current user name and current password whether with the Standard User name and its corresponding Standard cipher is consistent.
CN201410230960.7A 2014-05-28 2014-05-28 A kind of verification method and device Active CN103973711B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410230960.7A CN103973711B (en) 2014-05-28 2014-05-28 A kind of verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410230960.7A CN103973711B (en) 2014-05-28 2014-05-28 A kind of verification method and device

Publications (2)

Publication Number Publication Date
CN103973711A CN103973711A (en) 2014-08-06
CN103973711B true CN103973711B (en) 2018-07-24

Family

ID=51242757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410230960.7A Active CN103973711B (en) 2014-05-28 2014-05-28 A kind of verification method and device

Country Status (1)

Country Link
CN (1) CN103973711B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105634739B (en) * 2015-04-21 2019-03-22 宇龙计算机通信科技(深圳)有限公司 The processing method of payment request, the processing unit of payment request and terminal
CN104794616A (en) * 2015-05-11 2015-07-22 易联支付有限公司 Safety verification method for mobile phone payment
CN104794615A (en) * 2015-05-11 2015-07-22 易联支付有限公司 Safety verification method for mobile phone payment
CN105162775A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Logging method and device of virtual machine
CN106529248B (en) * 2016-10-20 2020-02-07 广东小天才科技有限公司 User terminal unlocking method and device and user terminal
CN107995587B (en) * 2016-10-25 2021-03-16 中国电信股份有限公司 Authentication method, authentication platform, authentication system and service provider platform
CN107995150B (en) * 2016-10-27 2020-08-28 腾讯科技(深圳)有限公司 Identity verification method and device
CN107241348A (en) * 2017-07-13 2017-10-10 上海斐讯数据通信技术有限公司 Alarming method and system that a kind of router is logged in
CN107516207A (en) * 2017-08-15 2017-12-26 上海与德科技有限公司 A kind of data identification method and device
CN110378695A (en) * 2019-06-19 2019-10-25 深圳壹账通智能科技有限公司 Bank card payment method, device, equipment and computer storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103035078A (en) * 2012-11-30 2013-04-10 深圳天源迪科信息技术股份有限公司 Payment security monitoring method based on position

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101374046B (en) * 2007-08-23 2011-01-05 中兴通讯股份有限公司 Method for implementing user port orientation on wideband access equipment
CN101582769B (en) * 2009-07-03 2012-07-04 杭州华三通信技术有限公司 Authority setting method of user access network and equipment
CN101945412A (en) * 2009-07-07 2011-01-12 中兴通讯股份有限公司 Service protection method and device based on user level
JP5372254B2 (en) * 2010-07-21 2013-12-18 楽天株式会社 Server apparatus, posting information processing method, posting information processing program, and recording medium
CN102664989A (en) * 2012-03-26 2012-09-12 中国联合网络通信集团有限公司 Data processing method of terminal lexicon, apparatus and terminal thereof
CN102685106B (en) * 2012-03-27 2015-09-30 北京百纳威尔科技有限公司 A kind of safe verification method and equipment
CN103077458A (en) * 2012-09-24 2013-05-01 安徽杨凌科技有限公司 ATM (automated teller machine) secure transaction authentication method based on position

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103035078A (en) * 2012-11-30 2013-04-10 深圳天源迪科信息技术股份有限公司 Payment security monitoring method based on position

Also Published As

Publication number Publication date
CN103973711A (en) 2014-08-06

Similar Documents

Publication Publication Date Title
CN103973711B (en) A kind of verification method and device
US9235695B2 (en) Alias-based social media identity verification
TWI530894B (en) Method and related apparatus for information verification and apparatus thereof
CN102164141B (en) Method for protecting security of account
CN106357640A (en) Method, system and server for authenticating identities on basis of block chain networks
JP6481038B2 (en) Service processing method and apparatus, and service server
CN103123706A (en) Management method, device and system of bill payment for another
CN103971239A (en) Verification method and device
CN103023638A (en) Identity verification method and device based on mobile terminal
CN105281908A (en) USB Key and USB Key digital certificate write-in method and device
CN105184567A (en) Information processing method, processing device and mobile terminal
US20170076285A1 (en) Payment Method and Apparatus and Payment Factor Processing Method and Apparatus
CN102739667A (en) Verification method, device and system based on verification prompt message and server
CN104901924A (en) Internet account verifying method and device
JP2014106593A (en) Transaction authentication method and system
CN105741116A (en) Fast payment method, apparatus and system
CN102413146B (en) Client authorized logon method based on dynamic codes
CN105871903A (en) Information security control method and system as well as mobile terminal
TWI786039B (en) Offline payment method, terminal equipment, backstage payment device and offline payment system
CN105790952A (en) Verification system and verification method of user information
KR101603963B1 (en) Authentication method using fingerprint information and certification number, user terminal and financial institution server
CN105591746B (en) A kind of processing method and processing system of online binding accepting terminal
CN110351672A (en) Information-pushing method, device and electronic equipment
JP2006155547A (en) Individual authentication system, terminal device and server
CN107040497A (en) Network account theft preventing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant