CN107222861A - Auth method, authentication means, terminal and non-volatile memory medium - Google Patents

Auth method, authentication means, terminal and non-volatile memory medium Download PDF

Info

Publication number
CN107222861A
CN107222861A CN201710359434.4A CN201710359434A CN107222861A CN 107222861 A CN107222861 A CN 107222861A CN 201710359434 A CN201710359434 A CN 201710359434A CN 107222861 A CN107222861 A CN 107222861A
Authority
CN
China
Prior art keywords
authentication
terminal
contact number
application software
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710359434.4A
Other languages
Chinese (zh)
Other versions
CN107222861B (en
Inventor
陆羽凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201710359434.4A priority Critical patent/CN107222861B/en
Publication of CN107222861A publication Critical patent/CN107222861A/en
Application granted granted Critical
Publication of CN107222861B publication Critical patent/CN107222861B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

A kind of auth method, applied to the terminal for being provided with application software, the application software sends authentication request to the terminal when calling authentication interface, methods described includes:The authentication request is received, the authentication request includes the contact number for user's input that the application software is received when carrying out Information Authentication;Obtain the contact number of user's input in the authentication request;Obtain the contact number of the terminal;Authentication is carried out to terminal user according to the contact number of the input and the contact number of the terminal;Authentication result is fed back into the application software.The present invention also provides a kind of authentication means, a kind of terminal and a kind of computer-readable recording medium so that the application software, which need not pay short message expense, can carry out Information Authentication, and cost is relatively low.

Description

Auth method, authentication means, terminal and non-volatile memory medium
Technical field
The present invention relates to field of terminal, and in particular to a kind of auth method, authentication means, terminal and non-volatile Property storage medium.
Background technology
At present, can be provided with the terminal such as mobile phone various needs short message verification code to enter when registering or updating phone number etc. The application software of row information checking., should when carrying out Information Authentication, it is necessary to which user is in the interface input handset number of application software Short message verification code can be sent by common carrier to terminal with the server of software, so that user can be at the interface of application software Short message verification code is inputted to carry out authentication.But the short message service that common carrier is provided when sending short message verification code Need to collect certain expense, cost is higher.
The content of the invention
In consideration of it, being necessary that providing a kind of auth method, authentication means, terminal and non-volatile memories is situated between Matter so that application software, which need not pay short message expense, can carry out Information Authentication, and cost is relatively low.
The first aspect of the application provides a kind of auth method, described applied to the terminal for being provided with application software Application software sends authentication request to the terminal when calling authentication interface, methods described includes:
The authentication request is received, the authentication request includes the application software and carrying out Information Authentication When received user input contact number;
Obtain the contact number of user's input in the authentication request;
Obtain the contact number of the terminal;
Authentication is carried out to terminal user according to the contact number of the input and the contact number of the terminal;
Authentication result is fed back into the application software.
In alternatively possible implementation, the contact number and the contact number of the terminal according to the input Authentication is carried out to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is matched with the contact number of the terminal, the successful identity of authentication is tested Card result feeds back to the application software.
In alternatively possible implementation, it is described according to the contact number of the input and the contact number of terminal to end End subscriber carries out authentication;Returning to authentication result to the application software includes:
When the contact number of the input is mismatched with the contact number of the terminal, by the identity of authentication failure The result feeds back to the application software.
In alternatively possible implementation, subscriber identification card, the acquisition end are installed in the terminal The contact number at end includes:
The contact number of the terminal is obtained by the hardware information of the subscriber identification card information or the terminal.
In alternatively possible implementation, the subscriber identification card information includes subscriber identification card At least one of ICCID information and the IMSI information of subscriber identification card.
The second aspect of the application provides a kind of authentication means, described applied to the terminal for being provided with application software Application software sends authentication request to the terminal when calling authentication interface, described device includes:
Receiving module, for receiving the authentication request, the authentication request includes the application software The contact number of the user's input received when carrying out Information Authentication;
Acquisition module, the contact number for obtaining the input of the user in the authentication request;
The acquisition module, is additionally operable to obtain the contact number of the terminal;
Authentication module, for the contact number according to the input and the contact number of the terminal to terminal user Carry out authentication;
Module is returned to, for authentication result to be fed back into the application software.
In alternatively possible implementation, the contact number and the contact number of the terminal according to the input Authentication is carried out to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is matched with the contact number of the terminal, the successful identity of authentication is tested Card result feeds back to the application software.
In alternatively possible implementation, it is described according to the contact number of the input and the contact number of terminal to end End subscriber carries out authentication;Returning to authentication result to the application software includes:
When the contact number of the input is mismatched with the contact number of the terminal, by the identity of authentication failure The result feeds back to the application software.
In alternatively possible implementation, subscriber identification card, the acquisition end are installed in the terminal The contact number at end includes:
The contact number of the terminal is obtained by the hardware information of the subscriber identification card information or the terminal.
In alternatively possible implementation, the subscriber identification card information includes subscriber identification card At least one of ICCID information and the IMSI information of subscriber identification card.
The third aspect of the application provides a kind of terminal, and the terminal includes memory and processor, and the memory is used In storing at least one instruction, the processor is used to perform at least one described instruction to realize body described in as above any one The step of part verification method.
The fourth aspect of the application provides a kind of non-volatile memory medium, the non-volatile memory medium be stored with to A few instruction, the step of auth method is as above realized described in any one when at least one described instruction is executed by processor Suddenly.
The embodiment of the present invention by the authentication means by the application software receive input contact number Code is matched with the contact number of the terminal to carry out authentication, and authentication result is fed back into the application software, So that the application software can carry out Information Authentication according to the authentication result, without using third-party operator come Charge short message is sent to the terminal, cost is relatively low.
Brief description of the drawings
Technical scheme, is used required in being described below to embodiment in order to illustrate the embodiments of the present invention more clearly Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart for the auth method that the embodiment of the present invention one is provided;
Fig. 2 is the structural representation of the preferred embodiment for the terminal that the present invention realizes auth method;
Fig. 3 is the structure chart for the authentication means that the embodiment of the present invention three is provided.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Applying example, the present invention will be described in detail.It should be noted that in the case where not conflicting, embodiments herein and embodiment In feature can be mutually combined.
Elaborate many details in the following description to facilitate a thorough understanding of the present invention, described embodiment only Only it is a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill The every other embodiment that personnel are obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Embodiment one
Fig. 1 is the schematic flow diagram for the auth method that the embodiment of the present invention one is provided.Methods described is applied to terminal In, the terminal can be provided with the device of application software for mobile phone, flat board etc..The application software can be wechat, Alipay And official's application on site (such as safety pocket bank, Mobile banking of China Merchants Bank) of each big bank.As shown in figure 1, the body Part verification method may include following steps:
S101:The authentication request is received, the authentication request includes the application software and believed The contact number of the user's input received during breath checking.
The application software needs progress Information Authentication to carry out binding terminal in contact number of registration or more new terminal etc. Contact number.The application software produces prompting frame to point out user to input contact number when carrying out Information Authentication.With After family input contact number, the application software receives the contact number of user's input, and responds user's input contact number Operation or the authentication interface for clicking on the operation calls present invention for determining virtual box.The authentication interface includes program generation Code.The authentication interface can be downloaded in the terminal in advance before the auth method using the present invention, so that The application software can directly invoke the authentication interface of the present invention when meeting preparatory condition.The application software is being called The authentication request for including the contact number that user inputs is sent during the authentication interface to the terminal.Answered described After authentication interface described in software transfer, auth method described in the terminal operating.In the authentication request It may also include other necessary informations.
S102:Obtain the contact number of user's input in the authentication request.
The contact number of the user's input obtained in the authentication request includes:Parsing the authentication please Ask, and the contact number that extraction user inputs from the authentication request after the parsing.
S103:Obtain the contact number of the terminal.
Subscriber identification card is installed in the terminal.Wherein, the subscriber identification card information or logical can be passed through The hardware information of the terminal is crossed to obtain the contact number of the terminal.The subscriber identification card information includes user's body At least one of the ICCID information of part identification card and the IMSI information of subscriber identification card.Known by the user identity Other card information or obtained by the hardware information of the terminal terminal contact number be prior art, herein without Repeat.
S104:Identity is carried out according to the contact number of the input and the contact number of the terminal to terminal user to test Card.
The terminal user is the user for operating the terminal.It is described that authentication is carried out to terminal user for operation institute The identity for stating the user of terminal is determined.It is described according to the contact number of the input and the contact number of the terminal to end End subscriber, which carries out authentication, to be included:The contact number of the input is matched with the contact number of the terminal;Work as institute When the contact number for stating input is matched with the contact number of the terminal, it is authentication success to determine authentication result;When When the contact number of the input and the contact number of the terminal are mismatched, determine that authentication result is lost for authentication Lose.Wherein, when the authentication result is authentication success, the identity for operating the user of the terminal is the terminal Holder, when the authentication result is that authentication fails, the identity for operating the user of the terminal is not described The holder of terminal.
S105:Authentication result is fed back into the application software.
The authentication result includes the identity of the successful authentication result of authentication or authentication failure The result.Authentication result is fed back to after the application software, the application software is according to the authentication result To carry out Information Authentication.When the authentication result is authentication success, described information the result is Information Authentication Success, the contact number of the terminal successfully binds the application software.When the authentication result fails for authentication When, described information the result fails for Information Authentication, and the contact number of the terminal binds the application software failure.At this In embodiment, when Information Authentication fails, the application software also produces prompt message, to point out the information of terminal user to test Card failure.
In other embodiments, the step S104 and step S105 may include:Contact number and institute when the input When stating the contact number matching of terminal, the successful authentication result of authentication is fed back into the application software;When described When the contact number of input and the contact number of the terminal are mismatched, the authentication result of authentication failure is fed back to The application software.
The embodiment of the present invention one includes the application by receiving the authentication request, the authentication request The contact number for user's input that software is received when carrying out Information Authentication;The user obtained in the authentication request is defeated The contact number entered;Obtain the contact number of the terminal;According to the contact number of the contact number of the input and the terminal Code carries out authentication to terminal user;Authentication result is fed back into the application software.Due to the embodiment of the present invention one Described in authentication interface it is called when application software carries out Information Authentication so that the auth method will be from described The contact number of the input received at application software matches to carry out authentication with the contact number of the terminal, and by identity The result feeds back to the application software so that the application software can be tested according to the authentication result to enter row information Card, without sending charge short message using third-party operator to the terminal, cost is relatively low.
Above is the detailed description carried out to method provided by the present invention.According to different demands, in shown flow chart The execution sequence of square can change, and some squares can be omitted, and the method that optimization aim is applied is also in above-mentioned optimization method Selective is applied in combination, or is applied in combination with other above-mentioned NM optimization methods.Below to provided by the present invention Device is described.
Embodiment two
As shown in Fig. 2 the present invention realizes the structural representation of the terminal of the preferred embodiment of auth method.The body Part checking device is applied in terminal, and the terminal can be provided with the device of application software for mobile phone, flat board etc..The application Software can be official's application on site (such as safety pocket bank, Mobile banking of China Merchants Bank) of wechat, Alipay and each big bank Deng.The terminal 10 includes authentication means 20.The terminal 10 also include non-volatile memory medium 30, processor 40 and Display device 50.
Preferably, auth method of the invention is realized by the authentication means 20 in the terminal 10.
The terminal 10 be it is a kind of can be automatic to carry out numerical computations and/or letter according to the instruction for being previously set or storing The equipment of processing is ceased, its hardware includes but is not limited to microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate Array, FPGA), number Word processing device (Digital Signal Processor, DSP), embedded device etc..
The terminal 10, which may be, but not limited to, any one, to pass through keyboard, mouse, remote control, touch pad with user Or the mode such as voice-operated device carries out the electronic product of man-machine interaction, for example, tablet personal computer, smart mobile phone, personal digital assistant (Personal Digital Assistant, PDA), game machine, intellectual Wearable etc..
Network residing for the terminal 10 includes, but are not limited to internet, wide area network, Metropolitan Area Network (MAN), LAN, virtual private Network (Virtual Private Network, VPN) etc..
The authentication means 20 can receive the authentication request, and the authentication request includes described answer The contact number of the user's input received with software when carrying out Information Authentication;Obtain the user in the authentication request The contact number of input;Obtain the contact number of the terminal;According to the contact of the contact number of the input and the terminal Number carries out authentication to terminal user;Authentication result is fed back into the application software, so as to may be such that described answer Short message expense need not be paid with software can carry out Information Authentication, and cost is relatively low.
The non-volatile memory medium 30 is used to store at least one instruction.At least one described instruction includes the body The program code of each program segment in part checking device 20.The non-volatile memory medium 30 can be smart media card (smart media card), safe digital card (secure digital card), flash memory cards (flash card) etc. Storage facilities.
The processor 40 can include one or more microprocessor, digital processing unit.The processor 40 is used for At least one described instruction is performed to realize the auth method.
The display device 50 can be touch-screen or display screen etc. other be used for display picture equipment.
Embodiment three
Fig. 3 is the schematic diagram for the authentication means that the embodiment of the present invention three is provided.The authentication means are applied to In terminal, the terminal can be provided with the device of application software for mobile phone, flat board etc..The application software can be wechat, branch Official's application on site (such as safety pocket bank, Mobile banking of China Merchants Bank) of Fu Baojige big banks.As shown in figure 3, institute Stating authentication means 20 may include receiving module 310, acquisition module 320, authentication module 330 and returns to module 340.This The alleged module of invention refers to a kind of performed by processor and can to complete the series of computation machine journey of fixing function Sequence section, it is stored in non-volatile memory medium.
The receiving module 310, for receiving the authentication request, the authentication request includes described answer The contact number of the user's input received with software when carrying out Information Authentication.
The application software needs progress Information Authentication to carry out binding terminal in contact number of registration or more new terminal etc. Contact number.The application software produces prompting frame to point out user to input contact number when carrying out Information Authentication.With After family input contact number, the application software receives the contact number of user's input, and responds user's input contact number Operation or the authentication interface for clicking on the operation calls present invention for determining virtual box.The authentication interface includes program generation Code.The authentication interface can be downloaded in the terminal in advance before the auth method using the present invention, so that The application software can directly invoke the authentication interface of the present invention when meeting preparatory condition.The application software is being called The authentication request for including the contact number that user inputs is sent during the authentication interface to the terminal.Answered described After authentication interface described in software transfer, auth method described in the terminal operating.In the authentication request It may also include other necessary informations.
The acquisition module 320, the contact number for obtaining the input of the user in the authentication request.
The contact number of the user's input obtained in the authentication request includes:Parsing the authentication please Ask, and the contact number that extraction user inputs from the authentication request after the parsing.
The acquisition module 320, is additionally operable to obtain the contact number of the terminal.
Subscriber identification card is installed in the terminal.Wherein, the subscriber identification card information or logical can be passed through The hardware information of the terminal is crossed to obtain the contact number of the terminal.The subscriber identification card information includes user's body At least one of the ICCID information of part identification card and the IMSI information of subscriber identification card.Known by the user identity Other card information or obtained by the hardware information of the terminal terminal contact number be prior art, herein without Repeat.
The authentication module 330, for the contact number according to the input and the contact number pair of the terminal Terminal user carries out authentication.
The terminal user is the user for operating the terminal.It is described that authentication is carried out to terminal user for operation institute The identity for stating the user of terminal is determined.It is described according to the contact number of the input and the contact number of the terminal to end End subscriber, which carries out authentication, to be included:The contact number of the input is matched with the contact number of the terminal;Work as institute When the contact number for stating input is matched with the contact number of the terminal, it is authentication success to determine authentication result;When When the contact number of the input and the contact number of the terminal are mismatched, determine that authentication result is lost for authentication Lose.Wherein, when the authentication result is authentication success, the identity for operating the user of the terminal is the terminal Holder, when the authentication result is that authentication fails, the identity for operating the user of the terminal is not described The holder of terminal.
The return module 340, for authentication result to be fed back into the application software.
The authentication result includes the identity of the successful authentication result of authentication or authentication failure The result.Authentication result is fed back to after the application software, the application software is according to the authentication result To carry out Information Authentication.When the authentication result is authentication success, described information the result is Information Authentication Success, the contact number of the terminal successfully binds the application software.When the authentication result fails for authentication When, described information the result fails for Information Authentication, and the contact number of the terminal binds the application software failure.At this In embodiment, when Information Authentication fails, the application software also produces prompt message, to point out the information of terminal user to test Card failure.
In other embodiments, the authentication module 330 and the return module 340 may include:When the input Contact number when being matched with the contact number of the terminal, by the successful authentication result of authentication feed back to it is described should Use software;When the contact number of the input is mismatched with the contact number of the terminal, by the identity of authentication failure The result feeds back to the application software.
The embodiment of the present invention three receives the authentication request, and the authentication request includes the application software The contact number of the user's input received when carrying out Information Authentication;Obtain what the user in the authentication request inputted Contact number;Obtain the contact number of the terminal;According to the contact number of the input and the contact number pair of the terminal Terminal user carries out authentication;Authentication result is fed back into the application software.By institute in the embodiment of the present invention three Authentication interface is stated called when application software carries out Information Authentication, so that the authentication means will be from the application The contact number of the input received at software matches to carry out authentication with the contact number of the terminal, and by authentication As a result the application software is fed back to so that the application software can carry out Information Authentication according to the authentication result, Without sending charge short message using third-party operator to the terminal, cost is relatively low.
, can in several embodiments provided by the present invention, it should be understood that disclosed auth method and device To realize by another way.For example, the embodiment of authentication means described above is only schematical, example Such as, the division of the module, only a kind of division of logic function, can there is other dividing mode when actually realizing.
In addition, each functional module in each embodiment of the invention can be integrated in same treatment module, can also That modules are individually physically present, can also two or more modules be integrated in equal modules.Above-mentioned integrated mould Block can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of software function module to realize.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.Any reference in claim should not be considered as to the claim involved by limitation.This Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple Unit or device can also be realized by same unit or device by software or hardware.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although reference The present invention is described in detail for preferred embodiment, it will be understood by those within the art that, can be to the present invention's Technical scheme is modified or equivalent substitution, without departing from the spirit and scope of technical solution of the present invention.

Claims (12)

1. a kind of auth method, applied to the terminal for being provided with application software, the application software calls authentication to connect Authentication request is sent during mouth to the terminal, it is characterised in that methods described includes:
The authentication request is received, the authentication request includes the application software and carrying out Information Authentication when institute The contact number of user's input of reception;
Obtain the contact number of user's input in the authentication request;
Obtain the contact number of the terminal;
Authentication is carried out to terminal user according to the contact number of the input and the contact number of the terminal;
Authentication result is fed back into the application software.
2. auth method as claimed in claim 1, it is characterised in that the contact number and institute according to the input The contact number for stating terminal carries out authentication to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is matched with the contact number of the terminal, by the successful authentication knot of authentication Fruit feeds back to the application software.
3. auth method as claimed in claim 1, it is characterised in that the contact number and end according to the input The contact number at end carries out authentication to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is mismatched with the contact number of the terminal, by the authentication of authentication failure As a result the application software is fed back to.
4. being provided with subscriber identification card in the auth method as described in claim 1 or 2 or 3, the terminal, it is special Levy and be, the contact number for obtaining the terminal includes:
The contact number of the terminal is obtained by the hardware information of the subscriber identification card information or the terminal.
5. auth method as claimed in claim 4, it is characterised in that:
The subscriber identification card information includes the ICCID information of subscriber identification card and the IMSI of subscriber identification card At least one of information.
6. a kind of authentication means, applied to the terminal for being provided with application software, the application software calls authentication to connect Authentication request is sent during mouth to the terminal, it is characterised in that described device includes:
Receiving module, for receiving the authentication request, the authentication request includes the application software and entered The contact number for user's input that row information is received when verifying;
Acquisition module, the contact number for obtaining the input of the user in the authentication request;
The acquisition module, is additionally operable to obtain the contact number of the terminal;
Authentication module, is carried out for the contact number according to the input and the contact number of the terminal to terminal user Authentication;
Module is returned to, for authentication result to be fed back into the application software.
7. authentication means as claimed in claim 6, it is characterised in that the contact number and institute according to the input The contact number for stating terminal carries out authentication to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is matched with the contact number of the terminal, by the successful authentication knot of authentication Fruit feeds back to the application software.
8. authentication means as claimed in claim 6, it is characterised in that the contact number and end according to the input The contact number at end carries out authentication to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is mismatched with the contact number of the terminal, by the authentication of authentication failure As a result the application software is fed back to.
9. being provided with subscriber identification card in the authentication means as described in claim 6 or 7 or 8, the terminal, it is special Levy and be, the contact number for obtaining the terminal includes:
The contact number of the terminal is obtained by the hardware information of the subscriber identification card information or the terminal.
10. authentication means as claimed in claim 9, it is characterised in that:
The subscriber identification card information includes the ICCID information of subscriber identification card and the IMSI of subscriber identification card At least one of information.
11. a kind of terminal, it is characterised in that the terminal includes non-volatile memory medium and processor, described non-volatile Storage medium is used to store at least one instruction, and the processor is used to perform at least one described instruction to realize claim Described in 1 to 5 any one the step of auth method.
12. a kind of non-volatile memory medium, it is characterised in that the non-volatile memory medium is stored with, and at least one refers to Order, realizes the step of auth method described in claim 1 to 5 any one when at least one described instruction is executed by processor Suddenly.
CN201710359434.4A 2017-05-19 2017-05-19 Identity authentication method, identity authentication device, terminal and nonvolatile storage medium Active CN107222861B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710359434.4A CN107222861B (en) 2017-05-19 2017-05-19 Identity authentication method, identity authentication device, terminal and nonvolatile storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710359434.4A CN107222861B (en) 2017-05-19 2017-05-19 Identity authentication method, identity authentication device, terminal and nonvolatile storage medium

Publications (2)

Publication Number Publication Date
CN107222861A true CN107222861A (en) 2017-09-29
CN107222861B CN107222861B (en) 2020-10-09

Family

ID=59945374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710359434.4A Active CN107222861B (en) 2017-05-19 2017-05-19 Identity authentication method, identity authentication device, terminal and nonvolatile storage medium

Country Status (1)

Country Link
CN (1) CN107222861B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019134494A1 (en) * 2018-01-08 2019-07-11 中国移动通信有限公司研究院 Verification information processing method, communication device, service platform, and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231746A (en) * 2011-07-11 2011-11-02 华为技术有限公司 Method for validating identification information and terminal thereof
CN103167444A (en) * 2011-12-19 2013-06-19 中国电信股份有限公司 Method, system, client and server of acquiring user cell phone number from website
WO2014075511A1 (en) * 2012-11-19 2014-05-22 中兴通讯股份有限公司 Attendance recording method, device and system
CN104320756A (en) * 2014-11-18 2015-01-28 广东欧珀移动通信有限公司 Account information changing method and device
CN105471920A (en) * 2016-01-15 2016-04-06 天脉聚源(北京)科技有限公司 Identifying code processing method and device
CN105472596A (en) * 2015-11-23 2016-04-06 小米科技有限责任公司 Binding method of communication number, apparatus and terminal thereof
CN105744520A (en) * 2016-03-30 2016-07-06 华为技术有限公司 Application service provisioning verification methods, apparatuses and system
CN106453263A (en) * 2016-09-19 2017-02-22 惠州Tcl移动通信有限公司 Method and system of binding cellphone number with APP

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231746A (en) * 2011-07-11 2011-11-02 华为技术有限公司 Method for validating identification information and terminal thereof
CN103167444A (en) * 2011-12-19 2013-06-19 中国电信股份有限公司 Method, system, client and server of acquiring user cell phone number from website
WO2014075511A1 (en) * 2012-11-19 2014-05-22 中兴通讯股份有限公司 Attendance recording method, device and system
CN104320756A (en) * 2014-11-18 2015-01-28 广东欧珀移动通信有限公司 Account information changing method and device
CN105472596A (en) * 2015-11-23 2016-04-06 小米科技有限责任公司 Binding method of communication number, apparatus and terminal thereof
CN105471920A (en) * 2016-01-15 2016-04-06 天脉聚源(北京)科技有限公司 Identifying code processing method and device
CN105744520A (en) * 2016-03-30 2016-07-06 华为技术有限公司 Application service provisioning verification methods, apparatuses and system
CN106453263A (en) * 2016-09-19 2017-02-22 惠州Tcl移动通信有限公司 Method and system of binding cellphone number with APP

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019134494A1 (en) * 2018-01-08 2019-07-11 中国移动通信有限公司研究院 Verification information processing method, communication device, service platform, and storage medium

Also Published As

Publication number Publication date
CN107222861B (en) 2020-10-09

Similar Documents

Publication Publication Date Title
US8213906B2 (en) Communication server and method for generating a one-time password using a mobile phone
CN105320864A (en) Method and apparatus for processing event operation
CN103841171B (en) A kind of method for processing business and equipment
US11113684B2 (en) Device, system, and method for creating virtual credit card
CN107231234A (en) A kind of identity registration method and device
CN105989485B (en) Service management method and device
US20110145146A1 (en) Off-Line Account Recharging
CN111010487B (en) Business handling method and device
CN106529955A (en) Payment method and device
CN107886320A (en) It is a kind of to handle the method, equipment and computer-readable storage medium for tying up card
CN105187368B (en) A kind of access method and access system of mobile terminal application
CN106470109A (en) A kind of personal identification method and equipment
CN106709730A (en) Bio-feature identification-based transaction method and apparatus
CN107657441A (en) Self-service dealing method, system, server and mobile terminal
CN111145762B (en) Electronic certificate verification method and system based on voiceprint recognition
CN105989259A (en) User identity authentication method and device as well as system
CN107464184A (en) A kind of account opens method and its device
CN107040497A (en) Network account theft preventing method and device
CN107222861A (en) Auth method, authentication means, terminal and non-volatile memory medium
CN107231343B (en) A kind of U-shield Activiation method, client and system
CN105898734A (en) Network operator switching method and system for virtual SIM card
CN103198428A (en) System and method for air depositing and withdrawing of bank
CN112819508B (en) Electronic resource allocation method and device
CN117172786A (en) Identity authentication method, device, equipment, medium and program product
CN109446840A (en) Check method, apparatus, electronic equipment and the storage medium of policy information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant