CN108900525B - Processing method and device for verification code request - Google Patents

Processing method and device for verification code request Download PDF

Info

Publication number
CN108900525B
CN108900525B CN201810797116.0A CN201810797116A CN108900525B CN 108900525 B CN108900525 B CN 108900525B CN 201810797116 A CN201810797116 A CN 201810797116A CN 108900525 B CN108900525 B CN 108900525B
Authority
CN
China
Prior art keywords
terminal
verification code
sending
user
scene
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810797116.0A
Other languages
Chinese (zh)
Other versions
CN108900525A (en
Inventor
王蓓蓓
赵友军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810797116.0A priority Critical patent/CN108900525B/en
Publication of CN108900525A publication Critical patent/CN108900525A/en
Application granted granted Critical
Publication of CN108900525B publication Critical patent/CN108900525B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention provides a processing method and a device of a verification code request, wherein the method comprises the following steps: receiving a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request; if the scene is a scene in which the first terminal pays, sending a verification code to the first terminal, wherein the first terminal is a terminal provided with a first Subscriber Identity Module (SIM) card corresponding to a first terminal number; and if the scene is a scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to the operation record of the user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to the close number, and the close number is a number meeting a preset condition with the first terminal number. The invention judges the transmitted verification code request and determines to transmit the verification code to the terminal corresponding to the terminal number or the close number thereof according to the judgment result, thereby effectively protecting the property safety of the user under the condition that the terminal is lost.

Description

Processing method and device for verification code request
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for processing a verification code request.
Background
With the progress of science and technology, the mobile terminal equipment is convenient to carry and is not limited by regions and popular with the majority of users. More and more people use terminals for payment and online shopping, and the terminals bring convenience to people and have certain defects, and various payment software exists on the terminals and can be bound with bank cards; after the terminal is lost, if the user does not lock the SIM card in the terminal in time, lawless persons may pull out the SIM card, insert the SIM card into a new terminal to log in an account such as a WeChat and a Payment treasure bound with the terminal number, and transfer money in the WeChat or Payment treasure, thereby causing property loss of the user.
At the present stage, if a user forgets the WeChat or the password of the Paobao, or logs in the WeChat or the Paobao on a new terminal, the user needs to input and issue the verification code on the number of the terminal for verification, and the user can successfully log in after the verification is passed.
However, in the prior art, the short message center sending the verification code cannot verify or judge the receiving object of the verification code, the verification code can be directly fed back to the terminal number sending the verification code request, and if the verification code is fed back to the terminal number in a state that the terminal is lost, the property safety of a user can be threatened.
Disclosure of Invention
The invention provides a processing method and a device of a verification code request, which can effectively protect the property safety of a user under the condition that a terminal is lost by judging the transmitted verification code request and determining to transmit the verification code to the terminal number or the close number thereof according to the judgment result.
The first aspect of the present invention provides a method for processing a request for a verification code, which is applied to an authentication server, and includes:
receiving a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request;
if the scene is a scene in which the first terminal pays, sending a verification code to the first terminal, wherein the first terminal is a terminal provided with a first Subscriber Identity Module (SIM) card corresponding to a first terminal number;
and if the scene is the scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to an operation record of a user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to an intimate number, and the intimate number is a number meeting a preset condition with the first terminal number.
Optionally, the sending a verification code to the first terminal or the second terminal according to the operation record of the user on the first terminal includes:
and sending the verification code to the second terminal according to the operation record of retrieving the password triggered by the user on the first terminal.
Optionally, the sending a verification code to the first terminal or the second terminal according to the operation record of the user on the first terminal includes:
judging whether the password error times input by the user are greater than the preset times or not according to the operation record of inputting the password on the first terminal by the user;
and if so, sending the verification code to the second terminal.
Optionally, the sending a verification code to the first terminal or the second terminal according to the operation record of the user on the first terminal includes:
judging whether the user inputs a correct original password or not according to the operation record of the password input by the user on the first terminal;
if so, sending the verification code to the first terminal;
and if not, sending the verification code to the second terminal.
Optionally, before sending the verification code to the first terminal or the second terminal, the method further includes: and acquiring the osculating number corresponding to the second terminal.
Optionally, the obtaining the affinity number corresponding to the second terminal includes:
inquiring an identification number corresponding to the first terminal number;
determining a second terminal number corresponding to the identity identification number as the close number according to the identity identification number; or the like, or, alternatively,
inquiring a first transaction record of the first terminal number, and acquiring a receiving address corresponding to the first terminal number;
inquiring a second transaction record according to the receiving address, and acquiring a third terminal number corresponding to the receiving address; the second transaction records are all transaction records corresponding to all terminals;
and determining the third terminal number as the close number.
Optionally, after sending the verification code to the second terminal, the method further includes:
and sending a reminding message to the first terminal, wherein the reminding message is used for indicating that the authentication server sends the verification code to the second terminal.
A second aspect of the present invention provides an authentication server comprising:
the verification code request receiving module is used for receiving a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request;
the verification code sending module is used for sending a verification code to the first terminal if the scene is a scene in which the first terminal carries out payment, and the first terminal is a terminal provided with a first Subscriber Identity Module (SIM) card corresponding to a first terminal number;
and if the scene is the scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to an operation record of a user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to an intimate number, and the intimate number is a number meeting a preset condition with the first terminal number.
A third aspect of the present invention provides an authentication server comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executes computer-executable instructions stored by the memory to cause the authentication server to perform the above-described method of processing a request for a verification code.
A fourth aspect of the present invention provides a computer-readable storage medium having stored thereon computer-executable instructions, which, when executed by a processor, implement the above-mentioned method for processing a request for an authentication code.
The invention provides a processing method and a device of a verification code request, wherein the method comprises the following steps: receiving a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request; if the scene is a scene in which the first terminal pays, sending a verification code to the first terminal, wherein the first terminal is a terminal provided with a first Subscriber Identity Module (SIM) card corresponding to a first terminal number; and if the scene is a scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to the operation record of the user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to the close number, and the close number is a number meeting a preset condition with the first terminal number. The invention judges the transmitted verification code request and determines to transmit the verification code to the terminal corresponding to the terminal number or the close number thereof according to the judgment result, thereby effectively protecting the property safety of the user under the condition that the terminal is lost.
Drawings
FIG. 1 is a schematic diagram of a system architecture of a method for processing an authentication code request according to the present invention;
FIG. 2 is a first flowchart illustrating a method for processing a request for an authentication code according to the present invention;
FIG. 3 is a second flowchart illustrating a method for processing a request for an authentication code according to the present invention;
fig. 4 is a first schematic structural diagram of an authentication server provided in the present invention;
fig. 5 is a schematic structural diagram of an authentication server according to the present invention;
fig. 6 is a schematic structural diagram of an authentication server provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic diagram of a system architecture of an application of a processing method for an authentication code request provided by the present invention, as shown in fig. 1, the processing method for an authentication code request provided by the present invention is applicable to a processing system for an authentication code request, and the system may include: the authentication server comprises a first terminal, an authentication server and a second terminal; the authentication server is used for determining whether a receiving end of the verification code is the first terminal or the second terminal; the second terminal is the terminal where the close number corresponding to the first terminal number is located.
Optionally, the system for processing the verification code request may further include: an information processing platform; specifically, the information processing platform is a platform that receives the verification code request, and may also be a platform that sends the verification code to the terminal. The information processing platform in the invention can be a short message processing platform or a mail processing platform, specifically, the mode of sending the verification code to the first terminal can be a short message mode, a mail mode or other conceivable modes of receiving the verification code, and the specific mode of sending the verification code in the invention is not limited.
Optionally, the system for processing the verification code request may further include: the authentication server is used for interacting with the authentication server, and an information list of a terminal serial number IMEI and a subscriber identity number IMSI bound with the terminal serial number is stored in the authentication server; the terminal number in the following embodiments corresponds to the subscriber identity IMSI.
Fig. 2 is a first schematic flow chart of a method for processing a request for a verification code according to the present invention, where an execution subject of the method flow shown in fig. 2 may be an authentication server, and the authentication server may be implemented by any software and/or hardware. As shown in fig. 2, the method for processing an authentication code request provided in this embodiment may include:
s101, receiving a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request.
In this embodiment, the authentication server receiving the verification code request sent by the first terminal may be: firstly, an information processing platform receives a verification code request sent by a first terminal, and an authentication server receives the verification code request forwarded by the information processing platform; the authentication server may also directly receive the verification code request sent by the first terminal, which is not limited in this embodiment.
The verification code request may carry a scene for sending the verification code request, that is, under what scene, the first terminal sends the verification code request. Specifically, the verification code request may carry an operation record of the user on the control displayed on the first terminal interface before the terminal sends the verification code request. Such as: and the user records the operation records of the payment verification code sending control, the password retrieving control, the password resetting control and the like displayed on the first terminal interface.
Specifically, in this embodiment, the operation of the control displayed on the first terminal interface of the user may be, but is not limited to, a click operation and a slide operation.
And S102, if the scene is a scene in which the first terminal carries out payment, sending a verification code to the first terminal, wherein the first terminal is a terminal provided with a first Subscriber Identity Module (SIM) card corresponding to a first terminal number.
The authentication server judges a scene for sending the verification code request according to the verification code request, and when the scene is a scene for payment of the first terminal, namely the scene of the terminal during transaction payment, specifically, a scene of a payment control or a payment password input control displayed on a first terminal interface by a user or an operation scene after the user inputs a payment password; at this time, the authentication server judges that the payment software on the first terminal is in the login state, and the scene of acquiring the payment verification code is reached during payment, and determines that the risk degree of the first terminal is low, namely the first terminal is not lost. The authentication server sends a verification code to the first terminal; in this embodiment, if the first terminal is a mobile phone, the first terminal number refers to a mobile phone number. The first terminal in this embodiment is a terminal equipped with a first subscriber identity module SIM card corresponding to the first terminal number.
Specifically, the specific way for the authentication server to send the verification code to the first terminal number may be: the verification code is directly sent to the first terminal, or the verification code is sent to the information processing platform first, and the information processing platform forwards the verification code to the first terminal.
And S103, if the scene is a scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to the operation record of the user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to an intimate number, and the intimate number is a number meeting a preset condition with the first terminal number.
The first terminal logs in, specifically, payment software or other communication software on the terminal is in an unregistered state, and the terminal is in a logging scene. In this embodiment, whether the verification code is sent to the first terminal or the second terminal is determined according to the operation record of the user on the first terminal. And the second terminal is a terminal provided with a second SIM card corresponding to the close number.
The operation record of the user on the first terminal may be an operation record of inputting a password in a login process, an operation of retrieving the password when the login fails, or an operation of forgetting the password and needing to reset the password, and the authentication server determines the risk level of the original terminal bound by the first terminal number according to the operation record, that is, whether the original terminal bound by the first terminal number is lost. The first terminal in this embodiment may be an original terminal bound by the first terminal number, or may be a terminal into which the first terminal number is newly inserted. And the authentication server further determines whether to send the verification code to the first terminal or the second terminal according to the risk of the terminal.
In this embodiment, the osculating number is a number that satisfies a preset condition with the first terminal number, specifically, the osculating number may be an emergency contact number set in advance by the first terminal number, and the number may be a number corresponding to another terminal of the user or a number corresponding to a terminal of a person having an intimate contact with the user.
The affinity number may also be a communication record of the first terminal number queried by the authentication server, and the number having the longest call duration with the first terminal number is determined as the affinity number. The specific manner how the authentication server obtains the osculating number is not limited in this embodiment.
In the embodiment, an authentication server receives a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request; if the scene is a scene in which the first terminal pays, sending a verification code to the first terminal, wherein the first terminal is a terminal provided with a first Subscriber Identity Module (SIM) card corresponding to a first terminal number; and if the scene is a scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to the operation record of the user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to the close number, and the close number is a number meeting a preset condition with the first terminal number. The invention judges the transmitted verification code request and determines to transmit the verification code to the terminal corresponding to the terminal number or the close number thereof according to the judgment result, thereby effectively protecting the property safety of the user under the condition that the terminal is lost.
An application scenario in the method for processing an authentication code request provided by the present invention is described in detail below with reference to fig. 3, where fig. 3 is a schematic flow diagram of the method for processing an authentication code request provided by the present invention, and as shown in fig. 3, the method for processing an authentication code request provided by the present invention may include:
s201, receiving a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request.
And S202, if the scene is a scene for payment of the first terminal, sending a verification code to the first terminal.
S203, acquiring the osculating number corresponding to the second terminal.
In this embodiment, an implementation manner of acquiring the osculating number is as follows: the identification server inquires an identification number corresponding to the first terminal number, specifically, the identification server accesses an operation support BOSS system of an operator corresponding to the first terminal number and inquires the identification number corresponding to the first terminal number, specifically, the identification number can be an identification number or other card numbers used for account opening of the first terminal number; the authentication server determines the second terminal number corresponding to the identification number as an affinity number, specifically, one identification number may have been opened many times, that is, the user corresponding to the identification number has multiple terminal numbers, and may determine multiple terminal numbers or any one terminal number corresponding to the identification number as an affinity number.
Yet another embodiment for obtaining the affinity number is: the authentication server inquires a first transaction record of the first terminal number to obtain a receiving address corresponding to the first terminal; specifically, the authentication server obtains a receiving address for trading by using the terminal number through an e-commerce platform (such as east B and C);
inquiring the second transaction record according to the receiving address, and acquiring a third terminal number corresponding to the receiving address; the second transaction record is all transaction records corresponding to all terminals; that is, all transaction records of the E-commerce platform (such as the E-Dong platform and the C-Bao platform) are inquired, a third terminal number corresponding to the receiving address which is the same as the first terminal number is obtained, and the authentication server determines that the third terminal number is an osculating number. In this embodiment, the third terminal number is the same as or different from the second terminal number in the above embodiment.
Such as: the first terminal number is the terminal number of the D user, and the second terminal number can be another terminal number of the D user; the third terminal number may be another terminal number of the D-subscriber, or may be a terminal number of an E-subscriber who is closely related to the D-subscriber and has a common delivery address.
And S204, if the scene is the scene for the first terminal to log in, sending the verification code to the first terminal or the second terminal according to the operation record of the user on the first terminal.
In the prior art, when a terminal enters an application program A, the application program A needs to be logged in; the user can input the correct account, password and verification code to log in, or the user forgets the password and logs in by retrieving the password, or the user logs in by resetting the password.
In this embodiment, a scenario in which the first terminal logs in is as follows: and sending the verification code to the intimate number according to the operation record of retrieving the password triggered by the user on the first terminal. Such as: when a first terminal logs in an application program A, a password forgetting control or a password retrieving control is displayed on a login interface of the first terminal, and a user clicks the password forgetting control or the password retrieving control to trigger a password retrieving process, wherein in the password retrieving process, an authentication server receives an authentication code request sent by the first terminal, the authentication code request carries an identifier or other representation modes of an operation record of a password retrieving triggered by the user, the authentication server determines that a user corresponding to the first terminal does not know a login password according to the authentication code request, and judges that a terminal bound with a first terminal number is possibly lost and has high risk, so that the authentication code is sent to a second terminal.
Another scenario for the first terminal to log in is as follows: judging whether the number of password errors input by a user is greater than a preset number of times or not according to the operation record of inputting the password on the first terminal by the user; and if the password error times input by the user are more than the preset times, the authentication server sends the verification code to the intimate number.
Such as: when the first terminal logs in the application program A, an interface for inputting an account number and a password is displayed on a login interface of the first terminal, if the password input by a user on the first terminal is always an error password and the number of times of inputting the error password reaches a preset number of times, when the authentication server receives an authentication code request, the authentication server determines that the user corresponding to the first terminal does not know the original login password according to the operation record of the user in the authentication code request, and judges that the terminal bound with the first terminal number is possibly lost and has high risk, so that the authentication code is sent to the second terminal.
Another scenario for the first terminal to log in is as follows: judging whether the user inputs a correct original password or not according to the operation record of the password input by the user on the first terminal; if the user inputs the correct original password, the verification code is sent to the first terminal; and if the user does not input the correct original password, sending the verification code to the second terminal.
Such as: when the first terminal logs in the application program A, an interface for inputting an account number and a password is displayed on the login interface of the first terminal, if a correct original password is input by a user when the password is input by the user on the first terminal, the authentication server determines that the user corresponding to the first terminal knows the original password according to the operation record of the user in the authentication code request, and judges that the terminal bound with the number of the first terminal is not lost and has low risk, so that the authentication code is sent to the first terminal.
If the user does not input the correct original password when inputting the password on the first terminal, the authentication server determines that the user corresponding to the first terminal does not know the original password according to the operation record of the user in the verification code request, and judges that the terminal bound by the first terminal number is possibly lost and has high risk, so that the verification code is sent to the second terminal.
S205, sending a reminding message to the first terminal, wherein the reminding message is used for indicating that the authentication server sends the verification code to the second terminal.
After the authentication server sends the verification code to the intimate number, if the original terminal bound by the first terminal number is not lost, the user forgets the password. The authentication server also sends a reminding message to the first terminal, wherein the reminding message is used for indicating that the authentication server sends the verification code to the second terminal.
If the authentication server sends a prompt message or a reminding mail to the first terminal after the second terminal sends the verification code, the content can be' to protect your account security, the verification code has been sent to the osculating number 1 x 1, please contact a request, thank you! ". On the premise that the user does not lose the original terminal, the user can ask for the verification code through the second terminal, and if the user loses the original terminal, the verification code cannot be revealed and falls into the hands of other people, so that the property safety of the user is effectively protected.
It is contemplated that the authentication server may also send the alert message by other means (e.g., voice, etc.), which is not limited in this embodiment.
S201 and S202 may refer to the description related to S101 and S102 in the above embodiments, and are not described herein again. In this embodiment, the sequence of S202 and S203 is not limited, as long as the authentication server obtains the affinity number before sending the verification code to the affinity number.
In the embodiment, the authentication server sends the verification code to the second terminal according to the operation record of retrieving the password triggered by the user on the first terminal; or judging whether the password error frequency input by the user is greater than the preset frequency according to the operation record of the password input by the user on the first terminal; if so, sending a verification code to the second terminal; or judging whether the user inputs the correct original password or not according to the operation record of the password input by the user on the first terminal; if so, sending a verification code to the first terminal; if not, sending a verification code to the second terminal; and the reminding message is sent to the first terminal after the identifying code is sent to the close number, so that the user can ask for the identifying code through the second terminal on the premise that the user does not lose the original terminal, and if the user loses the original terminal, the identifying code cannot be revealed, thereby effectively protecting the property safety of the user.
Fig. 4 is a schematic structural diagram of an authentication server according to the present invention, and as shown in fig. 4, the authentication server 300 includes: an identifying code request receiving module 301 and an identifying code sending module 302.
A verification code request receiving module 301, configured to receive a verification code request sent by a first terminal, where the verification code request is used to indicate a scene where the verification code request is sent;
the verification code sending module 302 is configured to send a verification code to the first terminal if the scene is a scene in which the first terminal performs payment, where the first terminal is a terminal on which a first subscriber identity module SIM card corresponding to the first terminal number is installed.
And if the scene is a scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to the operation record of the user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to the close number, and the close number is a number meeting a preset condition with the first terminal number.
The principle and technical effect of the authentication server provided in this embodiment are similar to those of the above verification request processing method, and are not described herein again.
Optionally, fig. 5 is a schematic structural diagram of an authentication server provided in the present invention, and as shown in fig. 5, the authentication server 300 may further include: an affinity number acquisition module 303 and a reminding message sending module 304.
And an affinity number obtaining module 303, configured to obtain an affinity number.
And a reminding message sending module 304, configured to send a reminding message to the first terminal, where the reminding message is used to indicate that the authentication server has sent the verification code to the second terminal.
Optionally, the close number obtaining module 303 is specifically configured to query an identification number corresponding to the first terminal number;
determining a second terminal number corresponding to the identity identification number as an intimate number according to the identity identification number; or the like, or, alternatively,
inquiring a first transaction record of the first terminal number, and acquiring a receiving address corresponding to the first terminal number;
inquiring the second transaction record according to the receiving address, and acquiring a third terminal number corresponding to the receiving address; the second transaction record is all transaction records corresponding to all terminals;
and determining the third terminal number as the close number.
Optionally, the verification code sending module 302 is specifically configured to send the verification code to the second terminal according to an operation record of retrieving the password triggered by the user on the first terminal.
Optionally, the verification code sending module 302 is specifically configured to determine whether the number of times of password errors input by the user is greater than a preset number of times according to an operation record of the user inputting the password on the first terminal; and if so, sending the verification code to the second terminal.
Optionally, the verification code sending module 302 is specifically configured to determine whether the user inputs a correct original password according to an operation record of the user inputting the password on the first terminal; if so, sending a verification code to the first terminal; and if not, sending the verification code to the second terminal.
Fig. 6 is a schematic structural diagram of a third authentication server provided in the present invention, where the authentication server may be a terminal device, such as a smart phone, a tablet computer, a computer, or the like. As shown in fig. 6, the authentication server 400 includes: a memory 401 and at least one processor 402.
A memory 401 for storing program instructions.
The processor 402 is configured to implement the method for processing the verification code request in this embodiment when the program instruction is executed, and specific implementation principles may be referred to in the foregoing embodiments, which are not described herein again.
The authentication server 400 may also include an input/output interface 403.
The input/output interface 403 may include a separate output interface and input interface, or may be an integrated interface that integrates input and output. The output interface is used for outputting data, the input interface is used for acquiring input data, the output data is a general name output in the method embodiment, and the input data is a general name input in the method embodiment.
The present invention also provides a readable storage medium, in which an execution instruction is stored, and when the execution instruction is executed by at least one processor of the authentication server, when the computer execution instruction is executed by the processor, the processing method of the request for the verification code in the above embodiment is implemented.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the authentication server may read the execution instruction from the readable storage medium, and the execution of the execution instruction by the at least one processor causes the authentication server to implement the method for processing the request for the passcode provided by the various embodiments described above.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the foregoing embodiments of the network device or the terminal device, it should be understood that the Processor may be a Central Processing Unit (CPU), or may be other general-purpose processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present application may be embodied directly in a hardware processor, or in a combination of the hardware and software modules in the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (8)

1. A processing method of a verification code request is applied to an authentication server, and is characterized by comprising the following steps:
receiving a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request;
if the scene is a scene in which the first terminal pays, sending a verification code to the first terminal, wherein the first terminal is a terminal provided with a first Subscriber Identity Module (SIM) card corresponding to a first terminal number;
if the scene is a scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to an operation record of a user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to an intimate number, and the intimate number is a number meeting a preset condition with the first terminal number;
before sending the verification code to the first terminal or the second terminal, the method further includes:
inquiring an identification number corresponding to the first terminal number;
determining a second terminal number corresponding to the identity identification number as the close number according to the identity identification number; or the like, or, alternatively,
inquiring a first transaction record of the first terminal number, and acquiring a receiving address corresponding to the first terminal number;
inquiring a second transaction record according to the receiving address, and acquiring a third terminal number corresponding to the receiving address; the second transaction records are all transaction records corresponding to all terminals;
and determining the third terminal number as the close number.
2. The processing method according to claim 1, wherein the sending the verification code to the first terminal or the second terminal according to the operation record of the user on the first terminal comprises:
and sending the verification code to the second terminal according to the operation record of retrieving the password triggered by the user on the first terminal.
3. The processing method according to claim 1, wherein the sending the verification code to the first terminal or the second terminal according to the operation record of the user on the first terminal comprises:
judging whether the password error times input by the user are greater than the preset times or not according to the operation record of inputting the password on the first terminal by the user;
and if so, sending the verification code to the second terminal.
4. The processing method according to claim 1, wherein the sending the verification code to the first terminal or the second terminal according to the operation record of the user on the first terminal comprises:
judging whether the user inputs a correct original password or not according to the operation record of the password input by the user on the first terminal;
if so, sending the verification code to the first terminal;
and if not, sending the verification code to the second terminal.
5. The processing method according to any of claims 2-4, wherein after sending the verification code to the second terminal, further comprising:
and sending a reminding message to the first terminal, wherein the reminding message is used for indicating that the authentication server sends the verification code to the second terminal.
6. An authentication server, comprising:
the verification code request receiving module is used for receiving a verification code request sent by a first terminal, wherein the verification code request is used for indicating a scene for sending the verification code request;
the verification code sending module is used for sending a verification code to the first terminal if the scene is a scene in which the first terminal carries out payment, and the first terminal is a terminal provided with a first Subscriber Identity Module (SIM) card corresponding to a first terminal number;
if the scene is a scene in which the first terminal logs in, sending a verification code to the first terminal or a second terminal according to an operation record of a user on the first terminal, wherein the second terminal is a terminal provided with a second SIM card corresponding to an intimate number, and the intimate number is a number meeting a preset condition with the first terminal number;
an osculation number obtaining module, configured to, before sending the verification code to the first terminal or the second terminal:
inquiring an identification number corresponding to the first terminal number;
determining a second terminal number corresponding to the identity identification number as an intimate number according to the identity identification number; or the like, or, alternatively,
inquiring a first transaction record of the first terminal number, and acquiring a receiving address corresponding to the first terminal number;
inquiring the second transaction record according to the receiving address, and acquiring a third terminal number corresponding to the receiving address; the second transaction record is all transaction records corresponding to all terminals;
and determining the third terminal number as the close number.
7. An authentication server, comprising: at least one processor and memory;
the memory stores computer-executable instructions;
the at least one processor executing the computer-executable instructions stored by the memory causes the authentication server to perform the method of any of claims 1-5.
8. A computer-readable storage medium having computer-executable instructions stored thereon which, when executed by a processor, implement the method of any one of claims 1-5.
CN201810797116.0A 2018-07-19 2018-07-19 Processing method and device for verification code request Active CN108900525B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810797116.0A CN108900525B (en) 2018-07-19 2018-07-19 Processing method and device for verification code request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810797116.0A CN108900525B (en) 2018-07-19 2018-07-19 Processing method and device for verification code request

Publications (2)

Publication Number Publication Date
CN108900525A CN108900525A (en) 2018-11-27
CN108900525B true CN108900525B (en) 2021-05-18

Family

ID=64351014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810797116.0A Active CN108900525B (en) 2018-07-19 2018-07-19 Processing method and device for verification code request

Country Status (1)

Country Link
CN (1) CN108900525B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111242605B (en) * 2018-11-29 2023-09-19 中国移动通信集团广东有限公司 Mobile payment method
CN109862562A (en) * 2019-01-02 2019-06-07 武汉极意网络科技有限公司 A kind of dynamic verification code choosing method and system
CN112866225A (en) * 2021-01-12 2021-05-28 中国工商银行股份有限公司 Authentication method, authentication device, electronic device, and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8490872B2 (en) * 2011-06-15 2013-07-23 Moon J. Kim Light-powered smart card for on-line transaction processing
CN103501292B (en) * 2013-09-24 2017-05-17 长沙裕邦软件开发有限公司 Method and system for achieving data safety protection by using standby mobile phone
CN103944737B (en) * 2014-05-06 2018-11-02 中国联合网络通信集团有限公司 Method for authenticating user identity, Third Party Authentication platform, carrier authorization platform
CN104639533B (en) * 2014-12-30 2018-09-04 小米科技有限责任公司 Method of controlling security based on terminal and device
WO2017143304A1 (en) * 2016-02-19 2017-08-24 Tata Communications (America) Inc. System and method for authentication with missed calls
CN106603241A (en) * 2016-12-11 2017-04-26 乐视控股(北京)有限公司 Unlocking method, apparatus and electronic device
CN107241336B (en) * 2017-06-19 2020-05-19 广州市百果园信息技术有限公司 Identity verification method and device

Also Published As

Publication number Publication date
CN108900525A (en) 2018-11-27

Similar Documents

Publication Publication Date Title
CN109784031B (en) Account identity verification processing method and device
CA2856801C (en) Peer-to-peer payment registration and activation
CN108460272B (en) Password changing method, device, terminal equipment and storage medium
CN108900525B (en) Processing method and device for verification code request
CN108243404B (en) Method, device and equipment for verifying binding state of mobile phone number
CN107347049B (en) Account authentication method and server
KR20080066956A (en) Remote activation of a user account in a telecommunication network
KR20140070606A (en) Transaction payment method and system
CN105989485B (en) Service management method and device
CN106559419B (en) The application and identification method and identification terminal of short message verification code
CN108055238A (en) A kind of account verification method and system
US20210406909A1 (en) Authorizing transactions using negative pin messages
CN106936802A (en) Mobile phone A PP information protecting methods and mobile phone A PP clients, system
CN113179282A (en) Method and device for merging account numbers and server
CN105830079A (en) Authentication information management system, authentication information management device, program, recording medium, and authentication information management method
CN107679383B (en) Identity verification method and device based on geographic position and touch area
CN103782564A (en) Authentication system and method therefor
CN111104653B (en) User operation processing method and device, electronic equipment and readable storage medium
CN109981585B (en) Business handling method and equipment
KR102121938B1 (en) Apparatus and method for providing a simple settlement service of a corporation account
CN110766388B (en) Virtual card generation method and system and electronic equipment
CN107507086B (en) Invoice processing method and invoice processing system
CN111314343B (en) Account management method and device and readable storage medium
CN109327814B (en) Short message processing method and device, electronic equipment and readable storage medium
CN106060791A (en) Method and system for sending and obtaining short message verification code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant