CN110248356B - Information acquisition method and device - Google Patents

Information acquisition method and device Download PDF

Info

Publication number
CN110248356B
CN110248356B CN201910493099.6A CN201910493099A CN110248356B CN 110248356 B CN110248356 B CN 110248356B CN 201910493099 A CN201910493099 A CN 201910493099A CN 110248356 B CN110248356 B CN 110248356B
Authority
CN
China
Prior art keywords
application
information
mobile phone
phone number
user identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910493099.6A
Other languages
Chinese (zh)
Other versions
CN110248356A (en
Inventor
宫天翔
杜锋
刘志健
顾平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN201910493099.6A priority Critical patent/CN110248356B/en
Publication of CN110248356A publication Critical patent/CN110248356A/en
Application granted granted Critical
Publication of CN110248356B publication Critical patent/CN110248356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the disclosure provides an information acquisition method and device, which are applied to the technical field of internet, wherein the method comprises the following steps: sending a mobile phone number acquisition request to a second application in the terminal equipment; receiving encryption information returned by the second application, wherein the encryption information comprises user identification information and a mobile phone number of the terminal equipment; and sending the user identification information and the encryption information of the terminal equipment to an application server so that the application server verifies the first application and the mobile phone number. The method and the device can improve the efficiency of acquiring the mobile phone number.

Description

Information acquisition method and device
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to an information obtaining method and apparatus.
Background
In internet application, according to the national requirement for the real-name system of an internet user, all APPs need to be directly or indirectly bound to the mobile phone number of the user, for example, the user can log in the APP after registering through the mobile phone number. At present, the APP can issue a short message to the mobile phone number of a user, and the user backfill verification code verifies that the user receives the short message, so that the mobile phone number of the user is bound. Due to the problems of sending rate and sending time in short message sending, the user may not receive the short message and cannot verify the short message, and then the short message needs to be sent again for verification, so that the binding efficiency is low. Moreover, if multiple APPs of the same enterprise are all bound to the mobile phone number of the user, the user needs to refill the verification code for multiple times, the operation is complex, and the efficiency of acquiring the mobile phone number of the user by the enterprise is low.
Disclosure of Invention
An object of the embodiments of the present disclosure is to provide an information acquisition method and apparatus, so as to improve information acquisition efficiency. The specific technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided an information acquisition method applied to a first application in a terminal device, the method including:
sending a mobile phone number acquisition request to a second application in the terminal equipment;
receiving encryption information returned by the second application, wherein the encryption information comprises user identification information and a mobile phone number of the terminal equipment;
and sending the user identification information and the encryption information of the terminal equipment to an application server so that the application server verifies the first application and the mobile phone number.
Optionally, the first application and the second application have the same signature information.
Optionally, before sending the mobile phone number obtaining request to the second application in the terminal device, the method further includes:
and receiving an indication message which is sent by the application server and used for acquiring the mobile phone number from the second application.
Optionally, the encrypted information is sent to the second application by the application server after the second application and the mobile phone number are successfully verified.
Optionally, the user identifier information of the terminal device is an IMSI number.
According to a second aspect of the embodiments of the present disclosure, there is provided an information acquisition method, the method including:
receiving user identification information and encryption information of terminal equipment, which are sent by a first application, wherein the encryption information comprises the user identification information and a mobile phone number of the terminal equipment, and the first application obtains the user identification information and the mobile phone number from a second application of the terminal equipment;
judging whether the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application;
and if the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application, finishing the verification of the first application and the mobile phone number.
Optionally, before the receiving the user identification information and the encryption information of the terminal device sent by the first application, the method includes:
receiving a mobile phone number verification request sent by a first application, determining a second application according to the verification request, wherein the second application and the first application have the same signature information, and sending an indication message for acquiring a mobile phone number from the second application to the first application so that the first application acquires encrypted information stored in the second application.
Optionally, before receiving the mobile phone number verification request sent by the first application, the method further includes:
receiving a verification code sent by the second application, wherein the verification code is issued based on a short message form through the mobile phone number;
and verifying the second application and the mobile phone number based on the verification code, and sending encryption information to the second application after the second application and the mobile phone number are verified, wherein the encryption information comprises user identification information of the terminal equipment and the mobile phone number.
According to a third aspect of the embodiments of the present disclosure, there is provided an information acquisition method applied to a second application in a terminal device, the method including:
receiving a mobile phone number acquisition request sent by a first application in the terminal equipment;
judging whether the signature information of the first application is the same as the signature information of the second application according to the mobile phone number acquisition request;
and when the signature information of the first application is the same as the signature information of the second application, sending encryption information to the first application, wherein the encryption information comprises user identification information of the terminal equipment and the mobile phone number.
Optionally, before the receiving the mobile phone number acquisition request sent by the first application in the terminal device, the method further includes:
and receiving encryption information sent by an application server, wherein the encryption information is sent to the second application after the application server successfully verifies the second application and the mobile phone number.
Optionally, before the receiving the encrypted information sent by the application server, the method further includes:
when receiving an operation of verifying a mobile phone number by a user, sending a mobile phone number verification request carrying the mobile phone number to an application server;
and sending a verification code input by a user to the application server so that the application server verifies the second application and the mobile phone number, wherein the verification code is issued in a short message form through the mobile phone number.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an information acquisition apparatus applied to a first application in a terminal device, the apparatus including:
the mobile phone number acquisition request sending module is configured to execute sending of a mobile phone number acquisition request to a second application in the terminal device;
the encrypted information receiving module is configured to execute receiving of encrypted information returned by the second application, wherein the encrypted information comprises user identification information and a mobile phone number of the terminal device;
a user identification information and encryption information sending module configured to execute sending of the user identification information and the encryption information of the terminal device to an application server to cause the application server to verify the first application and the mobile phone number.
Optionally, the first application and the second application have the same signature information.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
and the indication message receiving module is configured to execute receiving of an indication message sent by the application server to acquire the mobile phone number from the second application.
Optionally, the encrypted information is sent to the second application by the application server after the second application and the mobile phone number are successfully verified.
Optionally, the user identifier information of the terminal device is an IMSI number.
According to a fifth aspect of the embodiments of the present disclosure, there is provided an information acquisition apparatus, the apparatus:
the terminal equipment comprises a user identification information and encrypted information receiving module, a first application and a second application, wherein the user identification information and encrypted information receiving module is configured to receive user identification information and encrypted information of the terminal equipment, which are sent by the first application, the encrypted information comprises user identification information and a mobile phone number of the terminal equipment, and the first application obtains the user identification information and the encrypted information from the second application of the terminal equipment;
a user identification information judgment module configured to perform judgment on whether the user identification information of the terminal device included in the encrypted information is the same as the user identification information of the terminal device sent by the first application;
and the verification module is configured to execute verification of the first application and the mobile phone number if the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
the indication message sending module is configured to execute receiving of a mobile phone number verification request sent by a first application, determine a second application according to the verification request, and send an indication message for obtaining a mobile phone number from the second application to the first application so that the first application obtains encrypted information stored in the second application.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
the verification code receiving module is configured to execute receiving of the verification code sent by the second application, and the verification code is issued based on a short message form through the mobile phone number;
and the verification and sending module is configured to verify the second application and the mobile phone number based on the verification code, and send encrypted information to the second application after the second application and the mobile phone number are verified, wherein the encrypted information comprises user identification information of the terminal equipment and the mobile phone number.
According to a sixth aspect of the embodiments of the present disclosure, there is provided an information acquisition apparatus applied to a second application in a terminal device, the apparatus including:
the mobile phone number acquisition request receiving module is configured to execute receiving of a mobile phone number acquisition request sent by a first application in the terminal equipment;
the signature information judging module is configured to execute judgment on whether the signature information of the first application is the same as the signature information of the second application according to the mobile phone number obtaining request;
and the encrypted information sending module is configured to execute sending encrypted information to the first application when the signature information of the first application is the same as the signature information of the second application, wherein the encrypted information comprises user identification information of the terminal equipment and the mobile phone number.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
and the encrypted information receiving module is configured to execute receiving of encrypted information sent by an application server, and the encrypted information is sent to the second application after the application server successfully verifies the second application and the mobile phone number.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
the mobile phone number verification request sending module is configured to send a mobile phone number verification request carrying a mobile phone number to an application server when receiving an operation of verifying the mobile phone number by a user;
and the verification code sending module is configured to send the verification code input by the user to the application server so that the application server verifies the second application and the mobile phone number, wherein the verification code is issued in a short message form through the mobile phone number.
According to a seventh aspect of the embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to perform the steps of the information acquisition method of any one of the above first aspects.
According to an eighth aspect of embodiments of the present disclosure, there is provided a server including:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to perform the steps of the information acquisition method according to any one of the second aspects.
According to a ninth aspect of embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to perform the steps of the information acquisition method according to any one of the third aspect.
According to a tenth aspect of embodiments of the present disclosure, there is provided a storage medium, wherein instructions that, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the steps of the information acquisition method according to any one of the first aspect.
According to an eleventh aspect of embodiments of the present disclosure, there is provided a storage medium, wherein instructions of the storage medium, when executed by a processor of a server, enable the server to perform the steps of the information acquisition method according to any one of the second aspects.
According to a twelfth aspect of the embodiments of the present disclosure, there is provided a storage medium, wherein instructions that, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the steps of the information acquisition method according to any one of the third aspects.
According to a thirteenth aspect of embodiments of the present disclosure, there is provided a computer program product, which when executed on a processor, implements the steps of the information acquisition method of any one of the above first aspects.
According to a fourteenth aspect of the embodiments of the present disclosure, there is provided a computer program product, which when executed on a processor, implements the steps of the information acquisition method according to any one of the above-mentioned second aspects.
According to a fifteenth aspect of embodiments of the present disclosure, there is provided a computer program product which, when executed on a processor, implements the steps of the information acquisition method of any one of the above-mentioned third aspects.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: a first application in the terminal equipment sends a mobile phone number acquisition request to a second application, and can obtain encrypted information returned by the second application, wherein the encrypted information comprises user identification information and a mobile phone number of the terminal equipment; the first application sends the user identification information and the encryption information of the terminal device to the application server, so that the application server can verify the first application and the mobile phone number. Therefore, the first application can acquire the mobile phone number through the encrypted information returned by the second application without the processes of sending the verification code by the application server and inputting the verification code by the user, and the efficiency of acquiring the mobile phone number is improved. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an information acquisition method according to an embodiment of the present disclosure;
fig. 2 is another flowchart of an information acquisition method according to an embodiment of the present disclosure;
FIG. 3 is another flow chart of an information acquisition method of an embodiment of the present disclosure;
FIG. 4 is another flow chart of an information acquisition method of an embodiment of the present disclosure;
FIG. 5 is a block diagram of an information acquisition device according to an embodiment of the present disclosure;
fig. 6 is another structural diagram of an information acquisition apparatus according to an embodiment of the present disclosure;
fig. 7 is another structural diagram of an information acquisition apparatus according to an embodiment of the present disclosure;
FIG. 8 is a schematic view of an electronic device according to an embodiment of the disclosure;
FIG. 9 is a schematic diagram of an application server according to an embodiment of the present disclosure;
FIG. 10 is a schematic view of an electronic device according to an embodiment of the disclosure;
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Referring to fig. 1, fig. 1 is a flowchart of an information obtaining method according to an embodiment of the present disclosure, applied to a first application in a terminal device, and including the following steps:
s101, a mobile phone number acquisition request is sent to a second application in the terminal equipment.
And S102, receiving the encryption information returned by the second application, wherein the encryption information comprises the user identification information and the mobile phone number of the terminal equipment.
S103, sending the user identification information and the encryption information of the terminal equipment to the application server so that the application server verifies the first application and the mobile phone number.
The embodiment of fig. 1 has the beneficial effects that the first application in the terminal device sends a mobile phone number acquisition request to the second application, so as to obtain the encrypted information returned by the second application, wherein the encrypted information includes the user identification information and the mobile phone number of the terminal device; the first application sends the user identification information and the encryption information of the terminal device to the application server, so that the application server can verify the first application and the mobile phone number. Therefore, the first application can acquire the mobile phone number through the encrypted information returned by the second application without the processes of sending the verification code by the application server and inputting the verification code by the user, and the efficiency of acquiring the mobile phone number is improved.
Referring to fig. 2, fig. 2 is another flowchart of an information obtaining method according to an embodiment of the present disclosure, applied to an application server, and including the following steps:
s201, receiving user identification information and encryption information of the terminal equipment, which are sent by the first application, wherein the encryption information comprises the user identification information and the mobile phone number of the terminal equipment, and the first application obtains the user identification information and the mobile phone number from the second application of the terminal equipment.
S202, judging whether the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application. If the user identification information of the terminal device included in the encrypted information is the same as the user identification information of the terminal device sent by the first application, S203 is executed.
S203, the verification of the first application and the mobile phone number is completed.
The embodiment shown in fig. 2 has the beneficial effects that after receiving the user identification information of the terminal device and the encrypted information sent by the first application, the application server can judge whether the user identification information of the terminal device included in the encrypted information is the same as the user identification information of the terminal device sent by the first application, and if the user identification information is the same as the user identification information of the terminal device sent by the first application, the verification of the first application and the mobile phone number is completed, which indicates that the first application can acquire the mobile phone number in the encrypted information. Therefore, the first application acquires the mobile phone number from the encrypted information acquired from the second application without the processes of issuing the verification code by the application server and inputting the verification code by the user, and the efficiency of acquiring the mobile phone number is improved.
Referring to fig. 3, fig. 3 is another flowchart of an information obtaining method according to an embodiment of the present disclosure, which is applied to a second application in a terminal device, and includes the following steps:
s301, receiving a mobile phone number acquisition request sent by a first application in the terminal equipment.
S302, judging whether the signature information of the first application is the same as the signature information of the second application according to the mobile phone number acquisition request. When the signature information of the first application is the same as the signature information of the second application, S303 is performed.
S303, sending encryption information to the first application, wherein the encryption information comprises user identification information and a mobile phone number of the terminal equipment.
The embodiment of fig. 3 has the beneficial effects that after receiving the mobile phone number acquisition request sent by the first application, the second application in the terminal device can judge whether the signature information of the first application is the same as the signature information of the second application according to the mobile phone number acquisition request, and if so, sends the encrypted information to the first application. After the first application obtains the encrypted information sent by the second application, the mobile phone number in the encrypted information can be obtained, the processes of sending the verification code by the application server and inputting the verification code by the user are not needed, and the efficiency of obtaining the mobile phone number is improved.
Referring to fig. 4, fig. 4 is another flowchart of an information obtaining method according to an embodiment of the present disclosure, including the following steps:
s401, when receiving the operation of verifying the mobile phone number by the user, the second application sends a mobile phone number verification request carrying the mobile phone number to the application server.
In the internet application, a user can install a plurality of applications in a terminal device used, and the second application may be any one of the applications in the terminal device. Typically, the mobile phone number may be verified in the second application when the user uses the second application. Thus, when receiving the operation of verifying the mobile phone number by the user, the second application sends a mobile phone number verification request carrying the mobile phone number to the application server. The application server refers to a server built for the second application, and can provide services for the second application.
S402, after receiving the mobile phone number verification request, the application server sends a verification code in a short message form through the mobile phone number.
Wherein, the verification code can be 6 numbers or other symbols.
And S403, sending the verification code input by the user to the application server.
Specifically, after receiving the verification code, the user may input the verification code in the second application, and the second application sends the verification code input by the user to the application server.
S404, the application server verifies the second application and the mobile phone number based on the verification code, and sends encryption information to the second application after the second application and the mobile phone number are verified, wherein the encryption information comprises user identification information and the mobile phone number of the terminal equipment.
In the embodiment of the disclosure, the application server may verify the second application and the mobile phone number based on the verification code, and when the verification code input by the user is the same as the verification code issued by the application server, the second application and the mobile phone number pass verification. The verification may be to bind the second application with the mobile phone number, or to register the mobile phone number in the second application, or to use the mobile phone number in other scenarios. The application server sends the encrypted information to the second application after successfully verifying the second application and the Mobile phone Number, wherein the encrypted information comprises user Identification information and a Mobile phone Number of the terminal equipment, and the user Identification information of the terminal equipment is an International Mobile Subscriber Identity (IMSI) code.
S405, the second application stores the encrypted information to the local.
S406, the first application sends a mobile phone number verification request to the application server.
Specifically, the first application may be an application in the terminal device, and when the user uses the first application, the user may verify the mobile phone number, and the first application may send a mobile phone number verification request to the application server. The application server in this step and the application server in S401 may be the same server or different servers. Therefore, the two application servers in fig. 4 may be the same server or different servers. The first application may obtain an application list installed in the terminal device after the user authorization, and the mobile phone number verification request may include identification information of the first application and the application list.
S407, the application server determines the second application according to the mobile phone number verification request sent by the first application, and sends an indication message for acquiring the mobile phone number from the second application to the first application.
In the embodiment of the present disclosure, the application server locally stores an authorization list, where the authorization list includes applications authorized for the first application, that is, information may be shared between the applications in the authorization list and the first application. In this way, the application server may determine the second application according to the authorization list and the application list in the mobile phone number verification request, and the number of the second application may be one or multiple. After determining the second application, the application server may send an indication message for acquiring the mobile phone number from the second application to the first application, so that the first application may send a mobile phone number acquisition request to the second application according to the indication message. In general, two applications that can share information can belong to the same company or be authorized by each other. The first application and the second application may be two different applications of the same company, optionally the first application and the second application have the same signature information.
S408, the first application sends a mobile phone number acquisition request to the second application.
In this embodiment of the disclosure, the first application may send a mobile phone number acquisition request to the second application according to the identification information of the second application carried in the indication message.
And S409, judging whether the signature information of the first application is the same as the signature information of the second application according to the mobile phone number acquisition request. When the signature information of the first application is the same as the signature information of the second application, sending the encrypted information to the first application.
Specifically, after receiving the mobile phone number acquisition request sent by the first application, the second application may determine whether the signature information of the first application is the same as the signature information of the second application, and if the signature information of the first application is the same as the signature information of the second application, send the locally stored encryption information to the first application.
S410, the first application sends the user identification information and the encryption information of the terminal device to the application server.
In the embodiment of the disclosure, the first application may obtain the user identifier of the terminal device, and send the user identifier of the terminal device and the encryption information to the application server.
S411, judging whether the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application; and if the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application, the verification of the first application and the mobile phone number is completed.
Specifically, after receiving the user identification information and the encrypted information of the terminal device sent by the first application, the application server may analyze the encrypted information through an obtained key, where the key may be preset, or may be obtained by accessing a shared file, and the like, and is not limited herein. Since the encrypted information includes the user Identification information and the phone number of the terminal device, if the user Identification information of the terminal device obtained by analyzing the encrypted information is the same as the user Identification information of the terminal device sent by the first application, it indicates that the user does not replace a SIM (Subscriber identity Module) card, that is, it indicates that the user does not replace the phone number. Then the verification of the first application and the cell phone number may be completed.
Fig. 4 is an interaction flowchart among the first application, the second application, and the application server, and it can be seen that when the first application acquires the mobile phone number, the mobile phone number may be acquired from the second application without using the short message verification code, so that the efficiency of acquiring the mobile phone number is improved. Meanwhile, the number of short messages issued by enterprises is reduced, and the operation cost of issuing the short messages is reduced; the user loss caused by the short message delivery failure time is reduced. And the process that the application server issues the verification code and the user inputs the verification code is not needed, the operation is simple, and the user experience is improved.
Corresponding to the above method embodiment, an embodiment of the present disclosure provides an information obtaining apparatus, which is applied to a first application in a terminal device, and referring to fig. 5, fig. 5 is a structural diagram of the information obtaining apparatus in the embodiment of the present disclosure, and includes:
a mobile phone number obtaining request sending module 501 configured to execute sending a mobile phone number obtaining request to a second application in the terminal device;
an encrypted information receiving module 502 configured to execute receiving encrypted information returned by the second application, where the encrypted information includes user identification information and a mobile phone number of the terminal device;
a user identification information and encryption information sending module 503 configured to execute sending the user identification information and encryption information of the terminal device to the application server to make the application server verify the first application and the mobile phone number.
In the information acquisition device of the embodiment of the disclosure, a first application in a terminal device sends a mobile phone number acquisition request to a second application, and can obtain encrypted information returned by the second application, wherein the encrypted information comprises user identification information and a mobile phone number of the terminal device; the first application sends the user identification information and the encryption information of the terminal device to the application server, so that the application server can verify the first application and the mobile phone number. Therefore, the first application can acquire the mobile phone number through the encrypted information returned by the second application without the processes of sending the verification code by the application server and inputting the verification code by the user, and the efficiency of acquiring the mobile phone number is improved.
Optionally, the first application and the second application have the same signature information.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
and the indication message receiving module is configured to execute receiving of an indication message sent by the application server and used for acquiring the mobile phone number from the second application.
Optionally, the encrypted information is sent to the second application by the application server after the second application and the mobile phone number are successfully verified.
Optionally, the user identification information of the terminal device is an IMSI number.
Referring to fig. 6, fig. 6 is another structural diagram of an information acquisition apparatus according to an embodiment of the present disclosure, including:
a user identification information and encryption information receiving module 601 configured to perform receiving user identification information and encryption information of the terminal device sent by the first application, where the encryption information includes user identification information and a mobile phone number of the terminal device and is obtained by the first application from a second application of the terminal device;
a user identification information determination module 602 configured to perform determination of whether the user identification information of the terminal device included in the encrypted information is the same as the user identification information of the terminal device sent by the first application;
the verification module 603 is configured to perform verification of the first application and the mobile phone number if the user identification information of the terminal device included in the encrypted information is the same as the user identification information of the terminal device sent by the first application.
In the information obtaining apparatus of the embodiment of the present disclosure, after receiving the user identification information of the terminal device and the encrypted information sent by the first application, the application server may determine whether the user identification information of the terminal device included in the encrypted information is the same as the user identification information of the terminal device sent by the first application, and if the user identification information is the same as the user identification information of the terminal device sent by the first application, complete verification of the first application and the mobile phone number, which indicates that the first application may obtain the mobile phone number in the encrypted information. Therefore, the first application acquires the mobile phone number from the encrypted information acquired from the second application without the processes of issuing the verification code by the application server and inputting the verification code by the user, and the efficiency of acquiring the mobile phone number is improved.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
and the indication message sending module is configured to execute receiving of a mobile phone number verification request sent by the first application, determine the second application according to the verification request, and send an indication message for acquiring the mobile phone number from the second application to the first application so that the first application acquires the encrypted information stored in the second application.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
the verification code receiving module is configured to execute receiving of a verification code sent by a second application, and the verification code is issued based on a short message form through a mobile phone number;
and the verification and sending module is configured to verify the second application and the mobile phone number based on the verification code, and send encrypted information to the second application after the second application and the mobile phone number are verified, wherein the encrypted information comprises user identification information and the mobile phone number of the terminal equipment.
Referring to fig. 7, fig. 7 is another structural diagram of an information acquiring apparatus according to an embodiment of the present disclosure, which is applied to a second application in a terminal device, and includes:
a mobile phone number acquisition request receiving module 701 configured to execute a mobile phone number acquisition request sent by a first application in a receiving terminal device;
a signature information determination module 702 configured to perform determination, according to the mobile phone number acquisition request, whether the signature information of the first application is the same as the signature information of the second application;
the encrypted information sending module 703 is configured to perform sending, to the first application, encrypted information when the signature information of the first application is the same as the signature information of the second application, where the encrypted information includes user identification information and a mobile phone number of the terminal device.
In the information acquisition apparatus of the embodiment of the present disclosure, after receiving the mobile phone number acquisition request sent by the first application, the second application in the terminal device may determine whether the signature information of the first application is the same as the signature information of the second application according to the mobile phone number acquisition request, and if so, send the encrypted information to the first application. After the first application obtains the encrypted information sent by the second application, the mobile phone number in the encrypted information can be obtained, the processes of sending the verification code by the application server and inputting the verification code by the user are not needed, and the efficiency of obtaining the mobile phone number is improved.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
and the encrypted information receiving module is configured to execute receiving of the encrypted information sent by the application server, and the encrypted information is sent to the second application after the application server successfully verifies the second application and the mobile phone number.
Optionally, the information acquiring apparatus according to the embodiment of the present disclosure further includes:
the mobile phone number verification request sending module is configured to execute the mobile phone number verification request carrying the mobile phone number to the application server when receiving the operation of verifying the mobile phone number by the user;
and the verification code sending module is configured to send the verification code input by the user to the application server so that the application server verifies the second application and the mobile phone number, and the verification code is issued in a short message form through the mobile phone number.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
An embodiment of the present disclosure provides an electronic device, referring to fig. 8, where fig. 8 is a schematic diagram of the electronic device according to the embodiment of the present disclosure, and includes:
a processor 801;
a memory 802 for storing instructions executable by the processor 801;
wherein the processor 801 is configured to perform the steps of the first application-side information acquisition method described above at runtime.
An embodiment of the present disclosure provides a server, referring to fig. 9, where fig. 9 is a schematic diagram of an application server according to an embodiment of the present disclosure, and includes:
a processor 901;
a memory 902 for storing instructions executable by the processor 901;
wherein the processor 901 is configured to perform the steps of the above-mentioned information acquisition method on the application server side when running.
An electronic device is provided in an embodiment of the present disclosure, referring to fig. 10, where fig. 10 is a schematic diagram of the electronic device in the embodiment of the present disclosure, and includes:
a processor 1001;
a memory 1002 for storing instructions executable by the processor 1001;
wherein the processor 1001 is configured to execute the steps of the above-described second application-side information acquisition method at runtime.
The disclosed embodiments provide a storage medium, such as the memory 802, comprising instructions executable by the processor 801 of fig. 8 to perform the steps of the above-described information acquisition method of the first application side. Alternatively, the storage medium may be a non-transitory computer readable storage medium, for example, a ROM (read only memory), a RAM (random access memory), a CD-ROM (compact disc read only memory), a magnetic tape, a floppy disk, an optical data storage device, and the like.
The embodiment of the present disclosure provides a storage medium, for example, a memory 902 including instructions, which may be executed by a processor 901 of fig. 9 to perform the steps of the information acquisition method on the application server side. Alternatively, the storage medium may be a non-transitory computer readable storage medium, for example, the non-transitory computer readable storage medium may be a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present disclosure provides a storage medium, such as the memory 1002 including instructions that can be executed by the processor 1001 of fig. 10 to perform the steps of the information acquisition method of the second application side. Alternatively, the storage medium may be a non-transitory computer readable storage medium, for example, the non-transitory computer readable storage medium may be a ROM, a RAM, a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The embodiment of the present disclosure provides a computer program product, which when executed on a processor, implements the steps of the above-mentioned information acquisition method on the first application side.
The embodiment of the present disclosure provides a computer program product, which when executed on a processor, implements the steps of the above-mentioned information acquisition method on the application server side.
The embodiment of the present disclosure provides a computer program product, which when executed on a processor, implements the steps of the information acquisition method of the second application side.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (28)

1. An information acquisition method is applied to a first application in a terminal device, and the method comprises the following steps:
sending a mobile phone number acquisition request to a second application in the terminal equipment; the second application is an application which is verified by the application server based on the verification code;
receiving encryption information returned by the second application, wherein the encryption information comprises user identification information and a mobile phone number of the terminal equipment;
and sending the user identification information and the encryption information of the terminal equipment to the application server so that the application server verifies the first application and the mobile phone number.
2. The information acquisition method according to claim 1, wherein the first application and the second application have the same signature information.
3. The information acquisition method according to claim 1, wherein before the sending of the mobile phone number acquisition request to the second application in the terminal device, the method further comprises:
and receiving an indication message which is sent by the application server and used for acquiring the mobile phone number from the second application.
4. The information acquisition method according to claim 3, wherein the encrypted information is sent to the second application by the application server after the second application and the mobile phone number are successfully verified.
5. The information acquisition method according to any one of claims 1 to 4, wherein the subscriber identity information of the terminal device is an International Mobile Subscriber Identity (IMSI) code.
6. An information acquisition method, characterized in that the method comprises:
receiving user identification information and encryption information of terminal equipment, which are sent by a first application, wherein the encryption information comprises the user identification information and a mobile phone number of the terminal equipment, and the first application obtains the user identification information and the mobile phone number from a second application of the terminal equipment; the second application is an application which is verified by the application server based on the verification code;
judging whether the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application;
and if the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application, finishing the verification of the first application and the mobile phone number.
7. The information acquisition method according to claim 6, wherein before said receiving the user identification information and the encryption information of the terminal device transmitted by the first application, the method comprises:
receiving a mobile phone number verification request sent by a first application, determining a second application according to the verification request, wherein the second application and the first application have the same signature information, and sending an indication message for acquiring a mobile phone number from the second application to the first application so that the first application acquires encrypted information stored in the second application.
8. The information acquisition method according to claim 7, wherein before receiving the mobile phone number authentication request sent by the first application, the method further comprises:
receiving a verification code sent by the second application, wherein the verification code is issued based on a short message form through the mobile phone number;
and verifying the second application and the mobile phone number based on the verification code, and sending encryption information to the second application after the second application and the mobile phone number are verified, wherein the encryption information comprises user identification information of the terminal equipment and the mobile phone number.
9. The information acquisition method is characterized by being applied to a second application in terminal equipment, wherein the second application is an application which is verified by an application server based on a verification code; the method comprises the following steps:
receiving a mobile phone number acquisition request sent by a first application in the terminal equipment;
judging whether the signature information of the first application is the same as the signature information of the second application according to the mobile phone number acquisition request;
and when the signature information of the first application is the same as the signature information of the second application, sending encryption information to the first application, wherein the encryption information comprises user identification information of the terminal equipment and the mobile phone number.
10. The information acquisition method according to claim 9, wherein before the receiving of the mobile phone number acquisition request sent by the first application in the terminal device, the method further comprises:
and receiving encryption information sent by the application server, wherein the encryption information is sent to the second application after the application server successfully verifies the second application and the mobile phone number.
11. The information acquisition method according to claim 10, wherein before said receiving the encrypted information sent by the application server, the method further comprises:
when receiving an operation of verifying a mobile phone number by a user, sending a mobile phone number verification request carrying the mobile phone number to the application server;
and sending a verification code input by a user to the application server so that the application server verifies the second application and the mobile phone number, wherein the verification code is issued in a short message form through the mobile phone number.
12. An information acquisition apparatus, applied to a first application in a terminal device, the apparatus comprising:
the mobile phone number acquisition request sending module is configured to execute sending of a mobile phone number acquisition request to a second application in the terminal device; the second application is an application which is verified by the application server based on the verification code;
the encrypted information receiving module is configured to execute receiving of encrypted information returned by the second application, wherein the encrypted information comprises user identification information and a mobile phone number of the terminal device;
a user identification information and encryption information sending module configured to execute sending of the user identification information and the encryption information of the terminal device to the application server to cause the application server to verify the first application and the mobile phone number.
13. The information acquisition apparatus according to claim 12, wherein the first application and the second application have the same signature information.
14. The information acquisition apparatus according to claim 12, characterized in that the apparatus further comprises:
and the indication message receiving module is configured to execute receiving of an indication message sent by the application server to acquire the mobile phone number from the second application.
15. The information acquisition apparatus according to claim 14, wherein the encrypted information is sent to the second application by the application server after successful authentication of the second application and the mobile phone number.
16. The information acquisition apparatus according to any one of claims 12 to 15, wherein the subscriber identity information of the terminal device is an international mobile subscriber identity, IMSI, code.
17. An information acquisition apparatus, characterized in that the apparatus comprises:
the terminal equipment comprises a user identification information and encrypted information receiving module, a first application and a second application, wherein the user identification information and encrypted information receiving module is configured to receive user identification information and encrypted information of the terminal equipment, which are sent by the first application, the encrypted information comprises user identification information and a mobile phone number of the terminal equipment, and the first application obtains the user identification information and the encrypted information from the second application of the terminal equipment; the second application is an application which is verified by the application server based on the verification code;
a user identification information judgment module configured to perform judgment on whether the user identification information of the terminal device included in the encrypted information is the same as the user identification information of the terminal device sent by the first application;
and the verification module is configured to execute verification of the first application and the mobile phone number if the user identification information of the terminal equipment included in the encrypted information is the same as the user identification information of the terminal equipment sent by the first application.
18. The information acquisition apparatus according to claim 17, characterized in that the apparatus comprises:
the indication message sending module is configured to execute receiving of a mobile phone number verification request sent by a first application, determine a second application according to the verification request, and send an indication message for obtaining a mobile phone number from the second application to the first application so that the first application obtains encrypted information stored in the second application.
19. The information acquisition apparatus according to claim 18, characterized in that the apparatus further comprises:
the verification code receiving module is configured to execute receiving of the verification code sent by the second application, and the verification code is issued based on a short message form through the mobile phone number;
and the verification and sending module is configured to verify the second application and the mobile phone number based on the verification code, and send encrypted information to the second application after the second application and the mobile phone number are verified, wherein the encrypted information comprises user identification information of the terminal equipment and the mobile phone number.
20. The information acquisition device is characterized by being applied to a second application in terminal equipment, wherein the second application is an application which is verified by an application server based on a verification code; the device comprises:
the mobile phone number acquisition request receiving module is configured to execute receiving of a mobile phone number acquisition request sent by a first application in the terminal equipment;
the signature information judging module is configured to execute judgment on whether the signature information of the first application is the same as the signature information of the second application according to the mobile phone number obtaining request;
and the encrypted information sending module is configured to execute sending encrypted information to the first application when the signature information of the first application is the same as the signature information of the second application, wherein the encrypted information comprises user identification information of the terminal equipment and the mobile phone number.
21. The information acquisition apparatus according to claim 20, characterized in that the apparatus further comprises:
and the encrypted information receiving module is configured to execute receiving of encrypted information sent by the application server, and the encrypted information is sent to the second application after the application server successfully verifies the second application and the mobile phone number.
22. The information acquisition apparatus according to claim 21, characterized in that the apparatus further comprises:
the mobile phone number verification request sending module is configured to execute sending a mobile phone number verification request carrying the mobile phone number to the application server when receiving an operation of verifying the mobile phone number by a user;
and the verification code sending module is configured to send the verification code input by the user to the application server so that the application server verifies the second application and the mobile phone number, wherein the verification code is issued in a short message form through the mobile phone number.
23. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to perform the steps of the information acquisition method of any one of claims 1 to 5 when running.
24. A server, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to perform the steps of the information acquisition method of any one of claims 6 to 8 when running.
25. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to perform the steps of the information acquisition method of any one of claims 9 to 11 when running.
26. A storage medium, wherein instructions in the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the steps of the information acquisition method of any one of claims 1 to 5.
27. A storage medium, wherein instructions in the storage medium, when executed by a processor of a server, enable the server to perform the steps of the information acquisition method of any one of claims 6 to 8.
28. A storage medium, wherein instructions in the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the steps of the information acquisition method according to any one of claims 9 to 11.
CN201910493099.6A 2019-06-06 2019-06-06 Information acquisition method and device Active CN110248356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910493099.6A CN110248356B (en) 2019-06-06 2019-06-06 Information acquisition method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910493099.6A CN110248356B (en) 2019-06-06 2019-06-06 Information acquisition method and device

Publications (2)

Publication Number Publication Date
CN110248356A CN110248356A (en) 2019-09-17
CN110248356B true CN110248356B (en) 2022-03-25

Family

ID=67886383

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910493099.6A Active CN110248356B (en) 2019-06-06 2019-06-06 Information acquisition method and device

Country Status (1)

Country Link
CN (1) CN110248356B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111049822B (en) * 2019-12-10 2022-04-22 北京达佳互联信息技术有限公司 Short message verification code sending method and device, short message server and storage medium
CN111314901B (en) * 2020-02-10 2021-08-31 成都雅信安科技服务有限公司 Association method of application program and IMEI (International Mobile Equipment identity) carrying mobile terminal thereof
CN113159784A (en) * 2021-04-29 2021-07-23 北京达佳互联信息技术有限公司 Method and device for sending verification code, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917727A (en) * 2014-03-12 2015-09-16 中国移动通信集团福建有限公司 Account authentication method, system and apparatus
CN108990059A (en) * 2017-06-02 2018-12-11 阿里巴巴集团控股有限公司 A kind of verification method and device
CN109413096A (en) * 2018-11-30 2019-03-01 北京海泰方圆科技股份有限公司 A kind of login method and device more applied
CN110099029A (en) * 2018-01-30 2019-08-06 阿里健康信息技术有限公司 A kind of auth method, terminal device and server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8131278B2 (en) * 2008-12-05 2012-03-06 Nokia Corporation Method, apparatus, and computer program product for application-based communications
US10104228B2 (en) * 2015-05-01 2018-10-16 Vyng, Inc. Methods and systems for management of media content associated with message context on mobile computing devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917727A (en) * 2014-03-12 2015-09-16 中国移动通信集团福建有限公司 Account authentication method, system and apparatus
CN108990059A (en) * 2017-06-02 2018-12-11 阿里巴巴集团控股有限公司 A kind of verification method and device
CN110099029A (en) * 2018-01-30 2019-08-06 阿里健康信息技术有限公司 A kind of auth method, terminal device and server
CN109413096A (en) * 2018-11-30 2019-03-01 北京海泰方圆科技股份有限公司 A kind of login method and device more applied

Also Published As

Publication number Publication date
CN110248356A (en) 2019-09-17

Similar Documents

Publication Publication Date Title
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
CN110248356B (en) Information acquisition method and device
CN109462601B (en) Multi-platform access method and device based on eSIM
CN103139182B (en) A kind of method that user of permission accesses, client, server and system
CN105308907B (en) Installation package authorization method and device
KR102372571B1 (en) Mobile payment methods, devices and systems
CN111163467B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN109086596B (en) Authentication method, device and system for application program
CN106130998A (en) A kind of identifying code transmission method and device
KR20120010230A (en) Mobile content delivery on a mobile network
CN110555681B (en) Bank card signing method, device, server and medium
CN103780396A (en) Token obtaining method and device
CN110545272B (en) Identity authentication method, authority authentication method, device, user management system and storage medium
CN102857394B (en) Dynamic number allocation method and Internet of Things management platform
EP3851983B1 (en) Authorization method, auxiliary authorization component, management server and computer readable medium
CN111241523B (en) Authentication processing method, device, equipment and storage medium
CN106530025B (en) Mobile invoicing method and device
CN105187399A (en) Resource processing method and device
CN109558710B (en) User login method, device, system and storage medium
CN109150864B (en) Anti-cheating method and device based on secondary authentication
CN108280024B (en) Flow distribution strategy testing method and device and electronic equipment
CN110798544A (en) Method and device for verifying validity of mobile terminal, terminal and storage medium
CN113852639A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN105471920A (en) Identifying code processing method and device
CN103095735A (en) Method, movable terminal, cloud server and system for reading data information on subscriber identification module (SIM) card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant