CN107222861A - Auth method, authentication means, terminal and non-volatile memory medium - Google Patents
Auth method, authentication means, terminal and non-volatile memory medium Download PDFInfo
- Publication number
- CN107222861A CN107222861A CN201710359434.4A CN201710359434A CN107222861A CN 107222861 A CN107222861 A CN 107222861A CN 201710359434 A CN201710359434 A CN 201710359434A CN 107222861 A CN107222861 A CN 107222861A
- Authority
- CN
- China
- Prior art keywords
- authentication
- terminal
- contact number
- application software
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
A kind of auth method, applied to the terminal for being provided with application software, the application software sends authentication request to the terminal when calling authentication interface, methods described includes:The authentication request is received, the authentication request includes the contact number for user's input that the application software is received when carrying out Information Authentication;Obtain the contact number of user's input in the authentication request;Obtain the contact number of the terminal;Authentication is carried out to terminal user according to the contact number of the input and the contact number of the terminal;Authentication result is fed back into the application software.The present invention also provides a kind of authentication means, a kind of terminal and a kind of computer-readable recording medium so that the application software, which need not pay short message expense, can carry out Information Authentication, and cost is relatively low.
Description
Technical field
The present invention relates to field of terminal, and in particular to a kind of auth method, authentication means, terminal and non-volatile
Property storage medium.
Background technology
At present, can be provided with the terminal such as mobile phone various needs short message verification code to enter when registering or updating phone number etc.
The application software of row information checking., should when carrying out Information Authentication, it is necessary to which user is in the interface input handset number of application software
Short message verification code can be sent by common carrier to terminal with the server of software, so that user can be at the interface of application software
Short message verification code is inputted to carry out authentication.But the short message service that common carrier is provided when sending short message verification code
Need to collect certain expense, cost is higher.
The content of the invention
In consideration of it, being necessary that providing a kind of auth method, authentication means, terminal and non-volatile memories is situated between
Matter so that application software, which need not pay short message expense, can carry out Information Authentication, and cost is relatively low.
The first aspect of the application provides a kind of auth method, described applied to the terminal for being provided with application software
Application software sends authentication request to the terminal when calling authentication interface, methods described includes:
The authentication request is received, the authentication request includes the application software and carrying out Information Authentication
When received user input contact number;
Obtain the contact number of user's input in the authentication request;
Obtain the contact number of the terminal;
Authentication is carried out to terminal user according to the contact number of the input and the contact number of the terminal;
Authentication result is fed back into the application software.
In alternatively possible implementation, the contact number and the contact number of the terminal according to the input
Authentication is carried out to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is matched with the contact number of the terminal, the successful identity of authentication is tested
Card result feeds back to the application software.
In alternatively possible implementation, it is described according to the contact number of the input and the contact number of terminal to end
End subscriber carries out authentication;Returning to authentication result to the application software includes:
When the contact number of the input is mismatched with the contact number of the terminal, by the identity of authentication failure
The result feeds back to the application software.
In alternatively possible implementation, subscriber identification card, the acquisition end are installed in the terminal
The contact number at end includes:
The contact number of the terminal is obtained by the hardware information of the subscriber identification card information or the terminal.
In alternatively possible implementation, the subscriber identification card information includes subscriber identification card
At least one of ICCID information and the IMSI information of subscriber identification card.
The second aspect of the application provides a kind of authentication means, described applied to the terminal for being provided with application software
Application software sends authentication request to the terminal when calling authentication interface, described device includes:
Receiving module, for receiving the authentication request, the authentication request includes the application software
The contact number of the user's input received when carrying out Information Authentication;
Acquisition module, the contact number for obtaining the input of the user in the authentication request;
The acquisition module, is additionally operable to obtain the contact number of the terminal;
Authentication module, for the contact number according to the input and the contact number of the terminal to terminal user
Carry out authentication;
Module is returned to, for authentication result to be fed back into the application software.
In alternatively possible implementation, the contact number and the contact number of the terminal according to the input
Authentication is carried out to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is matched with the contact number of the terminal, the successful identity of authentication is tested
Card result feeds back to the application software.
In alternatively possible implementation, it is described according to the contact number of the input and the contact number of terminal to end
End subscriber carries out authentication;Returning to authentication result to the application software includes:
When the contact number of the input is mismatched with the contact number of the terminal, by the identity of authentication failure
The result feeds back to the application software.
In alternatively possible implementation, subscriber identification card, the acquisition end are installed in the terminal
The contact number at end includes:
The contact number of the terminal is obtained by the hardware information of the subscriber identification card information or the terminal.
In alternatively possible implementation, the subscriber identification card information includes subscriber identification card
At least one of ICCID information and the IMSI information of subscriber identification card.
The third aspect of the application provides a kind of terminal, and the terminal includes memory and processor, and the memory is used
In storing at least one instruction, the processor is used to perform at least one described instruction to realize body described in as above any one
The step of part verification method.
The fourth aspect of the application provides a kind of non-volatile memory medium, the non-volatile memory medium be stored with to
A few instruction, the step of auth method is as above realized described in any one when at least one described instruction is executed by processor
Suddenly.
The embodiment of the present invention by the authentication means by the application software receive input contact number
Code is matched with the contact number of the terminal to carry out authentication, and authentication result is fed back into the application software,
So that the application software can carry out Information Authentication according to the authentication result, without using third-party operator come
Charge short message is sent to the terminal, cost is relatively low.
Brief description of the drawings
Technical scheme, is used required in being described below to embodiment in order to illustrate the embodiments of the present invention more clearly
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart for the auth method that the embodiment of the present invention one is provided;
Fig. 2 is the structural representation of the preferred embodiment for the terminal that the present invention realizes auth method;
Fig. 3 is the structure chart for the authentication means that the embodiment of the present invention three is provided.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention
Applying example, the present invention will be described in detail.It should be noted that in the case where not conflicting, embodiments herein and embodiment
In feature can be mutually combined.
Elaborate many details in the following description to facilitate a thorough understanding of the present invention, described embodiment only
Only it is a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill
The every other embodiment that personnel are obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention
The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Embodiment one
Fig. 1 is the schematic flow diagram for the auth method that the embodiment of the present invention one is provided.Methods described is applied to terminal
In, the terminal can be provided with the device of application software for mobile phone, flat board etc..The application software can be wechat, Alipay
And official's application on site (such as safety pocket bank, Mobile banking of China Merchants Bank) of each big bank.As shown in figure 1, the body
Part verification method may include following steps:
S101:The authentication request is received, the authentication request includes the application software and believed
The contact number of the user's input received during breath checking.
The application software needs progress Information Authentication to carry out binding terminal in contact number of registration or more new terminal etc.
Contact number.The application software produces prompting frame to point out user to input contact number when carrying out Information Authentication.With
After family input contact number, the application software receives the contact number of user's input, and responds user's input contact number
Operation or the authentication interface for clicking on the operation calls present invention for determining virtual box.The authentication interface includes program generation
Code.The authentication interface can be downloaded in the terminal in advance before the auth method using the present invention, so that
The application software can directly invoke the authentication interface of the present invention when meeting preparatory condition.The application software is being called
The authentication request for including the contact number that user inputs is sent during the authentication interface to the terminal.Answered described
After authentication interface described in software transfer, auth method described in the terminal operating.In the authentication request
It may also include other necessary informations.
S102:Obtain the contact number of user's input in the authentication request.
The contact number of the user's input obtained in the authentication request includes:Parsing the authentication please
Ask, and the contact number that extraction user inputs from the authentication request after the parsing.
S103:Obtain the contact number of the terminal.
Subscriber identification card is installed in the terminal.Wherein, the subscriber identification card information or logical can be passed through
The hardware information of the terminal is crossed to obtain the contact number of the terminal.The subscriber identification card information includes user's body
At least one of the ICCID information of part identification card and the IMSI information of subscriber identification card.Known by the user identity
Other card information or obtained by the hardware information of the terminal terminal contact number be prior art, herein without
Repeat.
S104:Identity is carried out according to the contact number of the input and the contact number of the terminal to terminal user to test
Card.
The terminal user is the user for operating the terminal.It is described that authentication is carried out to terminal user for operation institute
The identity for stating the user of terminal is determined.It is described according to the contact number of the input and the contact number of the terminal to end
End subscriber, which carries out authentication, to be included:The contact number of the input is matched with the contact number of the terminal;Work as institute
When the contact number for stating input is matched with the contact number of the terminal, it is authentication success to determine authentication result;When
When the contact number of the input and the contact number of the terminal are mismatched, determine that authentication result is lost for authentication
Lose.Wherein, when the authentication result is authentication success, the identity for operating the user of the terminal is the terminal
Holder, when the authentication result is that authentication fails, the identity for operating the user of the terminal is not described
The holder of terminal.
S105:Authentication result is fed back into the application software.
The authentication result includes the identity of the successful authentication result of authentication or authentication failure
The result.Authentication result is fed back to after the application software, the application software is according to the authentication result
To carry out Information Authentication.When the authentication result is authentication success, described information the result is Information Authentication
Success, the contact number of the terminal successfully binds the application software.When the authentication result fails for authentication
When, described information the result fails for Information Authentication, and the contact number of the terminal binds the application software failure.At this
In embodiment, when Information Authentication fails, the application software also produces prompt message, to point out the information of terminal user to test
Card failure.
In other embodiments, the step S104 and step S105 may include:Contact number and institute when the input
When stating the contact number matching of terminal, the successful authentication result of authentication is fed back into the application software;When described
When the contact number of input and the contact number of the terminal are mismatched, the authentication result of authentication failure is fed back to
The application software.
The embodiment of the present invention one includes the application by receiving the authentication request, the authentication request
The contact number for user's input that software is received when carrying out Information Authentication;The user obtained in the authentication request is defeated
The contact number entered;Obtain the contact number of the terminal;According to the contact number of the contact number of the input and the terminal
Code carries out authentication to terminal user;Authentication result is fed back into the application software.Due to the embodiment of the present invention one
Described in authentication interface it is called when application software carries out Information Authentication so that the auth method will be from described
The contact number of the input received at application software matches to carry out authentication with the contact number of the terminal, and by identity
The result feeds back to the application software so that the application software can be tested according to the authentication result to enter row information
Card, without sending charge short message using third-party operator to the terminal, cost is relatively low.
Above is the detailed description carried out to method provided by the present invention.According to different demands, in shown flow chart
The execution sequence of square can change, and some squares can be omitted, and the method that optimization aim is applied is also in above-mentioned optimization method
Selective is applied in combination, or is applied in combination with other above-mentioned NM optimization methods.Below to provided by the present invention
Device is described.
Embodiment two
As shown in Fig. 2 the present invention realizes the structural representation of the terminal of the preferred embodiment of auth method.The body
Part checking device is applied in terminal, and the terminal can be provided with the device of application software for mobile phone, flat board etc..The application
Software can be official's application on site (such as safety pocket bank, Mobile banking of China Merchants Bank) of wechat, Alipay and each big bank
Deng.The terminal 10 includes authentication means 20.The terminal 10 also include non-volatile memory medium 30, processor 40 and
Display device 50.
Preferably, auth method of the invention is realized by the authentication means 20 in the terminal 10.
The terminal 10 be it is a kind of can be automatic to carry out numerical computations and/or letter according to the instruction for being previously set or storing
The equipment of processing is ceased, its hardware includes but is not limited to microprocessor, application specific integrated circuit (Application Specific
Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate Array, FPGA), number
Word processing device (Digital Signal Processor, DSP), embedded device etc..
The terminal 10, which may be, but not limited to, any one, to pass through keyboard, mouse, remote control, touch pad with user
Or the mode such as voice-operated device carries out the electronic product of man-machine interaction, for example, tablet personal computer, smart mobile phone, personal digital assistant
(Personal Digital Assistant, PDA), game machine, intellectual Wearable etc..
Network residing for the terminal 10 includes, but are not limited to internet, wide area network, Metropolitan Area Network (MAN), LAN, virtual private
Network (Virtual Private Network, VPN) etc..
The authentication means 20 can receive the authentication request, and the authentication request includes described answer
The contact number of the user's input received with software when carrying out Information Authentication;Obtain the user in the authentication request
The contact number of input;Obtain the contact number of the terminal;According to the contact of the contact number of the input and the terminal
Number carries out authentication to terminal user;Authentication result is fed back into the application software, so as to may be such that described answer
Short message expense need not be paid with software can carry out Information Authentication, and cost is relatively low.
The non-volatile memory medium 30 is used to store at least one instruction.At least one described instruction includes the body
The program code of each program segment in part checking device 20.The non-volatile memory medium 30 can be smart media card
(smart media card), safe digital card (secure digital card), flash memory cards (flash card) etc.
Storage facilities.
The processor 40 can include one or more microprocessor, digital processing unit.The processor 40 is used for
At least one described instruction is performed to realize the auth method.
The display device 50 can be touch-screen or display screen etc. other be used for display picture equipment.
Embodiment three
Fig. 3 is the schematic diagram for the authentication means that the embodiment of the present invention three is provided.The authentication means are applied to
In terminal, the terminal can be provided with the device of application software for mobile phone, flat board etc..The application software can be wechat, branch
Official's application on site (such as safety pocket bank, Mobile banking of China Merchants Bank) of Fu Baojige big banks.As shown in figure 3, institute
Stating authentication means 20 may include receiving module 310, acquisition module 320, authentication module 330 and returns to module 340.This
The alleged module of invention refers to a kind of performed by processor and can to complete the series of computation machine journey of fixing function
Sequence section, it is stored in non-volatile memory medium.
The receiving module 310, for receiving the authentication request, the authentication request includes described answer
The contact number of the user's input received with software when carrying out Information Authentication.
The application software needs progress Information Authentication to carry out binding terminal in contact number of registration or more new terminal etc.
Contact number.The application software produces prompting frame to point out user to input contact number when carrying out Information Authentication.With
After family input contact number, the application software receives the contact number of user's input, and responds user's input contact number
Operation or the authentication interface for clicking on the operation calls present invention for determining virtual box.The authentication interface includes program generation
Code.The authentication interface can be downloaded in the terminal in advance before the auth method using the present invention, so that
The application software can directly invoke the authentication interface of the present invention when meeting preparatory condition.The application software is being called
The authentication request for including the contact number that user inputs is sent during the authentication interface to the terminal.Answered described
After authentication interface described in software transfer, auth method described in the terminal operating.In the authentication request
It may also include other necessary informations.
The acquisition module 320, the contact number for obtaining the input of the user in the authentication request.
The contact number of the user's input obtained in the authentication request includes:Parsing the authentication please
Ask, and the contact number that extraction user inputs from the authentication request after the parsing.
The acquisition module 320, is additionally operable to obtain the contact number of the terminal.
Subscriber identification card is installed in the terminal.Wherein, the subscriber identification card information or logical can be passed through
The hardware information of the terminal is crossed to obtain the contact number of the terminal.The subscriber identification card information includes user's body
At least one of the ICCID information of part identification card and the IMSI information of subscriber identification card.Known by the user identity
Other card information or obtained by the hardware information of the terminal terminal contact number be prior art, herein without
Repeat.
The authentication module 330, for the contact number according to the input and the contact number pair of the terminal
Terminal user carries out authentication.
The terminal user is the user for operating the terminal.It is described that authentication is carried out to terminal user for operation institute
The identity for stating the user of terminal is determined.It is described according to the contact number of the input and the contact number of the terminal to end
End subscriber, which carries out authentication, to be included:The contact number of the input is matched with the contact number of the terminal;Work as institute
When the contact number for stating input is matched with the contact number of the terminal, it is authentication success to determine authentication result;When
When the contact number of the input and the contact number of the terminal are mismatched, determine that authentication result is lost for authentication
Lose.Wherein, when the authentication result is authentication success, the identity for operating the user of the terminal is the terminal
Holder, when the authentication result is that authentication fails, the identity for operating the user of the terminal is not described
The holder of terminal.
The return module 340, for authentication result to be fed back into the application software.
The authentication result includes the identity of the successful authentication result of authentication or authentication failure
The result.Authentication result is fed back to after the application software, the application software is according to the authentication result
To carry out Information Authentication.When the authentication result is authentication success, described information the result is Information Authentication
Success, the contact number of the terminal successfully binds the application software.When the authentication result fails for authentication
When, described information the result fails for Information Authentication, and the contact number of the terminal binds the application software failure.At this
In embodiment, when Information Authentication fails, the application software also produces prompt message, to point out the information of terminal user to test
Card failure.
In other embodiments, the authentication module 330 and the return module 340 may include:When the input
Contact number when being matched with the contact number of the terminal, by the successful authentication result of authentication feed back to it is described should
Use software;When the contact number of the input is mismatched with the contact number of the terminal, by the identity of authentication failure
The result feeds back to the application software.
The embodiment of the present invention three receives the authentication request, and the authentication request includes the application software
The contact number of the user's input received when carrying out Information Authentication;Obtain what the user in the authentication request inputted
Contact number;Obtain the contact number of the terminal;According to the contact number of the input and the contact number pair of the terminal
Terminal user carries out authentication;Authentication result is fed back into the application software.By institute in the embodiment of the present invention three
Authentication interface is stated called when application software carries out Information Authentication, so that the authentication means will be from the application
The contact number of the input received at software matches to carry out authentication with the contact number of the terminal, and by authentication
As a result the application software is fed back to so that the application software can carry out Information Authentication according to the authentication result,
Without sending charge short message using third-party operator to the terminal, cost is relatively low.
, can in several embodiments provided by the present invention, it should be understood that disclosed auth method and device
To realize by another way.For example, the embodiment of authentication means described above is only schematical, example
Such as, the division of the module, only a kind of division of logic function, can there is other dividing mode when actually realizing.
In addition, each functional module in each embodiment of the invention can be integrated in same treatment module, can also
That modules are individually physically present, can also two or more modules be integrated in equal modules.Above-mentioned integrated mould
Block can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of software function module to realize.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Any reference in claim should not be considered as to the claim involved by limitation.This
Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple
Unit or device can also be realized by same unit or device by software or hardware.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although reference
The present invention is described in detail for preferred embodiment, it will be understood by those within the art that, can be to the present invention's
Technical scheme is modified or equivalent substitution, without departing from the spirit and scope of technical solution of the present invention.
Claims (12)
1. a kind of auth method, applied to the terminal for being provided with application software, the application software calls authentication to connect
Authentication request is sent during mouth to the terminal, it is characterised in that methods described includes:
The authentication request is received, the authentication request includes the application software and carrying out Information Authentication when institute
The contact number of user's input of reception;
Obtain the contact number of user's input in the authentication request;
Obtain the contact number of the terminal;
Authentication is carried out to terminal user according to the contact number of the input and the contact number of the terminal;
Authentication result is fed back into the application software.
2. auth method as claimed in claim 1, it is characterised in that the contact number and institute according to the input
The contact number for stating terminal carries out authentication to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is matched with the contact number of the terminal, by the successful authentication knot of authentication
Fruit feeds back to the application software.
3. auth method as claimed in claim 1, it is characterised in that the contact number and end according to the input
The contact number at end carries out authentication to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is mismatched with the contact number of the terminal, by the authentication of authentication failure
As a result the application software is fed back to.
4. being provided with subscriber identification card in the auth method as described in claim 1 or 2 or 3, the terminal, it is special
Levy and be, the contact number for obtaining the terminal includes:
The contact number of the terminal is obtained by the hardware information of the subscriber identification card information or the terminal.
5. auth method as claimed in claim 4, it is characterised in that:
The subscriber identification card information includes the ICCID information of subscriber identification card and the IMSI of subscriber identification card
At least one of information.
6. a kind of authentication means, applied to the terminal for being provided with application software, the application software calls authentication to connect
Authentication request is sent during mouth to the terminal, it is characterised in that described device includes:
Receiving module, for receiving the authentication request, the authentication request includes the application software and entered
The contact number for user's input that row information is received when verifying;
Acquisition module, the contact number for obtaining the input of the user in the authentication request;
The acquisition module, is additionally operable to obtain the contact number of the terminal;
Authentication module, is carried out for the contact number according to the input and the contact number of the terminal to terminal user
Authentication;
Module is returned to, for authentication result to be fed back into the application software.
7. authentication means as claimed in claim 6, it is characterised in that the contact number and institute according to the input
The contact number for stating terminal carries out authentication to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is matched with the contact number of the terminal, by the successful authentication knot of authentication
Fruit feeds back to the application software.
8. authentication means as claimed in claim 6, it is characterised in that the contact number and end according to the input
The contact number at end carries out authentication to terminal user;Returning to authentication result to the application software includes:
When the contact number of the input is mismatched with the contact number of the terminal, by the authentication of authentication failure
As a result the application software is fed back to.
9. being provided with subscriber identification card in the authentication means as described in claim 6 or 7 or 8, the terminal, it is special
Levy and be, the contact number for obtaining the terminal includes:
The contact number of the terminal is obtained by the hardware information of the subscriber identification card information or the terminal.
10. authentication means as claimed in claim 9, it is characterised in that:
The subscriber identification card information includes the ICCID information of subscriber identification card and the IMSI of subscriber identification card
At least one of information.
11. a kind of terminal, it is characterised in that the terminal includes non-volatile memory medium and processor, described non-volatile
Storage medium is used to store at least one instruction, and the processor is used to perform at least one described instruction to realize claim
Described in 1 to 5 any one the step of auth method.
12. a kind of non-volatile memory medium, it is characterised in that the non-volatile memory medium is stored with, and at least one refers to
Order, realizes the step of auth method described in claim 1 to 5 any one when at least one described instruction is executed by processor
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710359434.4A CN107222861B (en) | 2017-05-19 | 2017-05-19 | Identity authentication method, identity authentication device, terminal and nonvolatile storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710359434.4A CN107222861B (en) | 2017-05-19 | 2017-05-19 | Identity authentication method, identity authentication device, terminal and nonvolatile storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107222861A true CN107222861A (en) | 2017-09-29 |
CN107222861B CN107222861B (en) | 2020-10-09 |
Family
ID=59945374
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710359434.4A Active CN107222861B (en) | 2017-05-19 | 2017-05-19 | Identity authentication method, identity authentication device, terminal and nonvolatile storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107222861B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019134494A1 (en) * | 2018-01-08 | 2019-07-11 | 中国移动通信有限公司研究院 | Verification information processing method, communication device, service platform, and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231746A (en) * | 2011-07-11 | 2011-11-02 | 华为技术有限公司 | Method for validating identification information and terminal thereof |
CN103167444A (en) * | 2011-12-19 | 2013-06-19 | 中国电信股份有限公司 | Method, system, client and server of acquiring user cell phone number from website |
WO2014075511A1 (en) * | 2012-11-19 | 2014-05-22 | 中兴通讯股份有限公司 | Attendance recording method, device and system |
CN104320756A (en) * | 2014-11-18 | 2015-01-28 | 广东欧珀移动通信有限公司 | Account information changing method and device |
CN105471920A (en) * | 2016-01-15 | 2016-04-06 | 天脉聚源(北京)科技有限公司 | Identifying code processing method and device |
CN105472596A (en) * | 2015-11-23 | 2016-04-06 | 小米科技有限责任公司 | Binding method of communication number, apparatus and terminal thereof |
CN105744520A (en) * | 2016-03-30 | 2016-07-06 | 华为技术有限公司 | Application service provisioning verification methods, apparatuses and system |
CN106453263A (en) * | 2016-09-19 | 2017-02-22 | 惠州Tcl移动通信有限公司 | Method and system of binding cellphone number with APP |
-
2017
- 2017-05-19 CN CN201710359434.4A patent/CN107222861B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102231746A (en) * | 2011-07-11 | 2011-11-02 | 华为技术有限公司 | Method for validating identification information and terminal thereof |
CN103167444A (en) * | 2011-12-19 | 2013-06-19 | 中国电信股份有限公司 | Method, system, client and server of acquiring user cell phone number from website |
WO2014075511A1 (en) * | 2012-11-19 | 2014-05-22 | 中兴通讯股份有限公司 | Attendance recording method, device and system |
CN104320756A (en) * | 2014-11-18 | 2015-01-28 | 广东欧珀移动通信有限公司 | Account information changing method and device |
CN105472596A (en) * | 2015-11-23 | 2016-04-06 | 小米科技有限责任公司 | Binding method of communication number, apparatus and terminal thereof |
CN105471920A (en) * | 2016-01-15 | 2016-04-06 | 天脉聚源(北京)科技有限公司 | Identifying code processing method and device |
CN105744520A (en) * | 2016-03-30 | 2016-07-06 | 华为技术有限公司 | Application service provisioning verification methods, apparatuses and system |
CN106453263A (en) * | 2016-09-19 | 2017-02-22 | 惠州Tcl移动通信有限公司 | Method and system of binding cellphone number with APP |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019134494A1 (en) * | 2018-01-08 | 2019-07-11 | 中国移动通信有限公司研究院 | Verification information processing method, communication device, service platform, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107222861B (en) | 2020-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8213906B2 (en) | Communication server and method for generating a one-time password using a mobile phone | |
CN105320864A (en) | Method and apparatus for processing event operation | |
CN103841171B (en) | A kind of method for processing business and equipment | |
US11113684B2 (en) | Device, system, and method for creating virtual credit card | |
CN107231234A (en) | A kind of identity registration method and device | |
CN105989485B (en) | Service management method and device | |
US20110145146A1 (en) | Off-Line Account Recharging | |
CN111010487B (en) | Business handling method and device | |
CN106529955A (en) | Payment method and device | |
CN107886320A (en) | It is a kind of to handle the method, equipment and computer-readable storage medium for tying up card | |
CN105187368B (en) | A kind of access method and access system of mobile terminal application | |
CN106470109A (en) | A kind of personal identification method and equipment | |
CN106709730A (en) | Bio-feature identification-based transaction method and apparatus | |
CN107657441A (en) | Self-service dealing method, system, server and mobile terminal | |
CN111145762B (en) | Electronic certificate verification method and system based on voiceprint recognition | |
CN105989259A (en) | User identity authentication method and device as well as system | |
CN107464184A (en) | A kind of account opens method and its device | |
CN107040497A (en) | Network account theft preventing method and device | |
CN107222861A (en) | Auth method, authentication means, terminal and non-volatile memory medium | |
CN107231343B (en) | A kind of U-shield Activiation method, client and system | |
CN105898734A (en) | Network operator switching method and system for virtual SIM card | |
CN103198428A (en) | System and method for air depositing and withdrawing of bank | |
CN112819508B (en) | Electronic resource allocation method and device | |
CN117172786A (en) | Identity authentication method, device, equipment, medium and program product | |
CN109446840A (en) | Check method, apparatus, electronic equipment and the storage medium of policy information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |