CN111027974A - Identification code verification method, device, equipment and storage medium - Google Patents

Identification code verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN111027974A
CN111027974A CN201911276798.1A CN201911276798A CN111027974A CN 111027974 A CN111027974 A CN 111027974A CN 201911276798 A CN201911276798 A CN 201911276798A CN 111027974 A CN111027974 A CN 111027974A
Authority
CN
China
Prior art keywords
identification code
certificate
code certificate
verification
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911276798.1A
Other languages
Chinese (zh)
Inventor
吴文勤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911276798.1A priority Critical patent/CN111027974A/en
Publication of CN111027974A publication Critical patent/CN111027974A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides a verification method, a device, equipment and a storage medium of an identification code certificate; the method comprises the following steps: acquiring a first identification code certificate to be verified based on a request message sent by a terminal; verifying the first identification code certificate based on a discarding rule corresponding to the first identification code certificate to obtain a verification result; deleting the first identification code certificate when the verification result shows that the first identification code certificate needs to be discarded; and generating a new first identification code certificate and sending the new first identification code certificate to the terminal. Therefore, the identification certificate can be verified to ensure that the correct and available identification code is generated according to the identification code certificate.

Description

Identification code verification method, device, equipment and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method, an apparatus, a device, and a storage medium for verifying an identification code.
Background
With the continuous development of mobile communication technology and the popularization of mobile payment, people can almost solve various consumptions related to clothes and eating houses at present without carrying cash. Taking a trip as an example, a user can take a vehicle such as a bus, a subway and the like through a riding code integrated in a certain application of the mobile terminal. Furthermore, when a user takes a car, the user can display the car taking code, and the car fee payment is carried out after the code scanning device carried in the vehicle scans the car taking code.
The payment code in various applications may be generated by acquiring the card certificate online or by using an offline card certificate stored in the user terminal. And because the offline card certificate is stored in the user terminal, if the offline card certificate has problems or is abandoned, the offline card certificate not only occupies the storage space of the user terminal, but also needs the user to acquire the card certificate again and generate a payment code when in use, which wastes time and labor.
Disclosure of Invention
The embodiment of the application provides an identification code certificate verification method, an identification code certificate verification device and a storage medium, which can verify the identification code certificate to ensure that a correct and available identification code is generated according to the identification code certificate.
The technical scheme of the embodiment of the application is realized as follows:
the embodiment of the application provides a method for verifying an identification code certificate, which comprises the following steps:
acquiring a first identification code certificate to be verified based on a request message sent by a terminal;
verifying the first identification code certificate based on the abandonment rule corresponding to the first identification code certificate to obtain a verification result;
deleting the first identification code certificate when the verification result shows that the first identification code certificate needs to be discarded;
and generating a new first identification code certificate and sending the new first identification code certificate to the terminal.
The embodiment of the application provides a verification device of identification code certificate, includes:
the first acquisition module is used for acquiring a first identification code certificate to be verified based on a request message sent by a terminal;
the verification module is used for verifying the first identification code certificate based on the abandonment rule corresponding to the first identification code certificate to obtain a verification result;
the deleting module is used for deleting the first identification code certificate when the verification result shows that the first identification code certificate needs to be discarded;
and the first generation module is used for generating a new first identification code certificate and sending the new first identification code certificate to the terminal.
The embodiment of the application provides a verification device of an identification code certificate, which comprises:
a memory for storing executable instructions;
and the processor is used for realizing the method provided by the embodiment of the application when executing the executable instructions stored in the memory.
The embodiment of the application provides a storage medium, which stores executable instructions and is used for causing a processor to execute the executable instructions so as to realize the method provided by the embodiment of the application.
The embodiment of the application has the following beneficial effects:
in the method for verifying the identification code certificate provided by the embodiment of the application, after a code sending platform receives a request message sent by a terminal, a first identification code certificate to be verified is acquired and verified to determine whether the first identification code certificate needs to be abandoned, and when the first identification code certificate needs to be abandoned, the first identification code certificate is deleted, a new first identification code certificate is generated and sent to the terminal, so that the terminal is ensured to generate a correct and effective second identification code based on the correct and effective new first identification code certificate, and the payment efficiency is improved.
Drawings
FIG. 1A is a schematic diagram of a network architecture of an identification code verification method according to an embodiment of the present application;
fig. 1B is an alternative structural diagram of the method for verifying the identifier certificate applied to the blockchain system according to the embodiment of the present disclosure;
fig. 1C is an alternative schematic diagram of a block structure provided in the present application;
fig. 2 is a schematic structural diagram of a code sending platform 200 according to an embodiment of the present disclosure;
fig. 3 is a schematic flow chart of an implementation of a method for verifying an identification code according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another implementation flow of a verification method for an identification code according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a further implementation flow of a verification method for an identification code according to an embodiment of the present application;
fig. 6 is a schematic flow chart of an implementation of a method for verifying a vehicle code certificate according to an embodiment of the present application;
fig. 7 is a schematic flow chart of another implementation of a method for verifying a vehicle code certificate according to an embodiment of the present application.
Detailed Description
In order to make the objectives, technical solutions and advantages of the present application clearer, the present application will be described in further detail with reference to the attached drawings, the described embodiments should not be considered as limiting the present application, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
In the following description, references to the terms "first \ second \ third" are only to distinguish similar objects and do not denote a particular order, but rather the terms "first \ second \ third" are used to interchange specific orders or sequences, where appropriate, so as to enable the embodiments of the application described herein to be practiced in other than the order shown or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
Before further detailed description of the embodiments of the present application, terms and expressions referred to in the embodiments of the present application will be described, and the terms and expressions referred to in the embodiments of the present application will be used for the following explanation.
1) Identification code: a code for uniquely identifying an entity in a class of data based on element classification;
2) two-dimensional code: the identification code of data symbol information is recorded by black and white figures distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific geometric figure;
3) the small program: a web program that can be run in an installed application, that is, an applet is an application that can be used without downloading;
4) riding codes: a two-dimensional code which can be used for taking a bus or a subway;
5) a riding code small program: a small program for generating a two-dimensional code which can take a bus or a subway;
6) and (4) an offline card certificate: the bus code background system generates a card leaving card certificate and issues the card leaving card certificate to the bus code small program end, and the bus code small program end can generate a bus two-dimensional code locally in an off-line mode through the card certificate for bus taking.
An exemplary application of the apparatus implementing the embodiment of the present application is described below, and the apparatus provided in the embodiment of the present application may be implemented as a terminal device. In the following, exemplary applications covering terminal devices when the apparatus is implemented as a terminal device will be explained.
Referring to fig. 1A, fig. 1A is a schematic diagram of a network architecture of an identification code verification method according to an embodiment of the present application, and as shown in fig. 1A, the network architecture at least includes a user terminal 100, a code sending platform 200, a network 300, and a scanning device 400. To support an exemplary application, the user terminal 100 and the scanning device 400 are respectively connected to the code platform 200 through a network 300, and the network 300 may be a wide area network or a local area network, or a combination of the two, and the data transmission is realized by using a wireless link.
When a user opens an applet or opens an electronic card to display an identification code through the user terminal 100, a verification request message or a certificate generation request may be sent to the code sending platform 200 through the network 300, the code sending platform 200 acquires a first identification code certificate to be verified after receiving a corresponding request message, and invokes a discarding rule to determine whether the first identification code certificate needs to be discarded, and when it is determined that the first identification code certificate needs to be discarded, generates the first identification code certificate and sends the first identification code certificate to the user terminal 100. After receiving the first identification code certificate, the user terminal 100 generates and displays the first identification code based on the first identification code certificate, so that the scanning device 400 scans the first identification code, the scanning device 400 sends the scanned information to the code sending platform 200, so that the code sending platform 200 carries out deduction settlement, and after deduction, sends a deduction program message to the user terminal 100.
The code sending platform may be a background server of a payment application or an instant messaging application with a payment function, and may also be a third party code sending platform, which is not specifically limited in this embodiment of the application.
The network architecture related To the embodiment of the present application may also be a distributed system 101 of a blockchain system, referring To fig. 1B, where fig. 1B is an optional structural schematic diagram of applying the identification code certificate verification method provided in the embodiment of the present application To the blockchain system, where the distributed system 101 may be a distributed node formed by a plurality of nodes 102 (computing devices in any form in an access network, such as servers and user terminals) and clients 103, a Peer-To-Peer (P2P, Peer To Peer) network is formed between the nodes, and a P2P Protocol is an application layer Protocol operating on a Transmission Control Protocol (TCP). In a distributed system, any machine, such as a server or a terminal, can join to become a node, and the node comprises a hardware layer, a middle layer, an operating system layer and an application layer.
Referring to the functions of each node in the blockchain system shown in fig. 1B, the functions involved include:
1) routing, a basic function that a node has, is used to support communication between nodes.
Besides the routing function, the node may also have the following functions:
2) the application is used for being deployed in a block chain, realizing specific services according to actual service requirements, recording data related to the realization functions to form recording data, carrying a digital signature in the recording data to represent a source of task data, and sending the recording data to other nodes in the block chain system, so that the other nodes add the recording data to a temporary block when the source and integrity of the recording data are verified successfully.
For example, the services implemented by the application include:
2.1) wallet, for providing the function of transaction of electronic money, including initiating transaction (i.e. sending the transaction record of current transaction to other nodes in the blockchain system, after the other nodes are successfully verified, storing the record data of transaction in the temporary blocks of the blockchain as the response of confirming the transaction is valid; of course, the wallet also supports the querying of the electronic money remaining in the electronic money address.
And 2.2) sharing the account book, wherein the shared account book is used for providing functions of operations such as storage, query and modification of account data, record data of the operations on the account data are sent to other nodes in the block chain system, and after the other nodes verify the validity, the record data are stored in a temporary block as a response for acknowledging that the account data are valid, and confirmation can be sent to the node initiating the operations.
2.3) Intelligent contracts, computerized agreements, which can enforce the terms of a contract, implemented by codes deployed on a shared ledger for execution when certain conditions are met, for completing automated transactions according to actual business requirement codes, such as querying the logistics status of goods purchased by a buyer, transferring the buyer's electronic money to the merchant's address after the buyer signs for the goods; of course, smart contracts are not limited to executing contracts for trading, but may also execute contracts that process received information.
3) And the Block chain comprises a series of blocks (blocks) which are mutually connected according to the generated chronological order, new blocks cannot be removed once being added into the Block chain, and recorded data submitted by nodes in the Block chain system are recorded in the blocks.
4) Consensus (Consensus), a process in a blockchain network, is used to agree on transactions in a block among a plurality of nodes involved, the agreed block is to be appended to the end of the blockchain, and the mechanisms for achieving Consensus include Proof of workload (PoW, Proof of Work), Proof of rights and interests (PoS, Pr oof of stamp), Proof of equity authority (DPoS, released Proof of-of-stamp), Proof of Elapsed Time (PoET, Proof of Elapsed Time), and so on.
Referring to fig. 1C, fig. 1C is an optional schematic diagram of a Block Structure (Block Structure) provided in this embodiment, where each Block includes a hash value of a transaction record (hash value of the Block) stored in the Block and a hash value of a previous Block, and the blocks are connected by the hash values to form a Block chain. The block may include information such as a time stamp at the time of block generation. A block chain (Blockchain), which is essentially a decentralized database, is a string of data blocks associated by using cryptography, and each data block contains related information for verifying the validity (anti-counterfeiting) of the information and generating a next block.
The apparatus provided in the embodiments of the present application may be implemented as hardware or a combination of hardware and software, and various exemplary implementations of the apparatus provided in the embodiments of the present application are described below.
Other exemplary configurations of the code platform 200 are contemplated in view of the exemplary configuration of the code platform 200 shown in fig. 2, and thus the configuration described herein should not be considered limiting, e.g., some of the components described below may be omitted, or components not described below may be added to accommodate the particular needs of certain applications.
The code platform 200 shown in fig. 2 includes: at least one processor 210, memory 240, at least one network interface 220, and a user interface 230. Each of the components in the code platform 200 are coupled together by a bus system 250. It will be appreciated that the bus system 250 is used to enable communications among the components. The bus system 250 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 250 in fig. 2.
The user interface 230 may include a display, a keyboard, a mouse, a touch-sensitive pad, a touch screen, and the like.
The memory 240 may be either volatile memory or nonvolatile memory, and may include both volatile and nonvolatile memory. The nonvolatile Memory may be a Read Only Memory (ROM). The volatile Memory may be Random Access Memory (RAM). The memory 240 described in embodiments herein is intended to comprise any suitable type of memory.
The memory 240 in the embodiment of the present application is capable of storing data to support the operation of the code-transmitting platform 200. Examples of such data include: any computer program, such as an operating system and application programs, for operating on code-sending platform 200. The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application program may include various application programs.
As an example of the method provided by the embodiment of the present application implemented by software, the method provided by the embodiment of the present application may be directly embodied as a combination of software modules executed by the processor 210, the software modules may be located in a storage medium located in the memory 240, and the processor 210 reads executable instructions included in the software modules in the memory 240, and completes the method provided by the embodiment of the present application in combination with necessary hardware (for example, including the processor 210 and other components connected to the bus 250).
By way of example, the Processor 210 may be an integrated circuit chip having Signal processing capabilities, such as a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like, wherein the general purpose Processor may be a microprocessor or any conventional Processor or the like.
The statistical method for page loading duration provided by the embodiment of the present application will be described with reference to exemplary applications and implementations of the terminal provided by the embodiment of the present application.
Referring to fig. 3, fig. 3 is a schematic flow chart of an implementation of the identification code verification method provided in the embodiment of the present application, and the implementation will be described with reference to the steps shown in fig. 3.
Step S101, acquiring a first identification code certificate to be verified based on a request message sent by a terminal.
Here, step S101 may be performed by the code sending platform. The code sending platform may be a background server of a payment application or an instant messaging application with a payment function, and may also be a third party code sending platform, which is not specifically limited in this embodiment of the application.
The terminal can be a mobile intelligent terminal such as a mobile phone, a tablet computer and an intelligent wearable device, and at least comprises a display screen to display the first identification code generated based on the first identification code certificate. Various applications (App, Application) such as a social App, a shopping App, a riding App, and the like may be installed in the terminal.
The first identification code may be a two-dimensional code. In the embodiment of the present application, the first identification code certificate may be an offline identification code certificate, that is, the first identification code certificate is not generated online in real time. The first identification code certificate may include user information, certificate generation time, signature data, and the like, where the user information may include information such as a user identification number, a name, a user identifier, or a user identifier mask, and the signature data is signed by using a private key of the code platform.
The request message may be a certificate generation request or an authentication request message. When the terminal sends a certificate generation request, the request message may carry a certificate identifier of the requested certificate generation; when the terminal sends the verification request, the request message may carry the first identification code certificate, or may also carry related information of the first identification code certificate, for example, the generation time of the first identification code certificate, the city to which the terminal belongs, the merchant, and the like.
And step S102, verifying the first identification code certificate based on the abandonment rule corresponding to the first identification code certificate to obtain a verification result.
Here, step S102 may be implemented by a code sending platform. The method for verifying the first identification code certificate by the code sending platform mainly includes determining whether the first identification code certificate needs to be discarded, and when the step S102 is implemented, determining whether the first identification code certificate is generated within a set discarding time range based on the generation time of the first identification code certificate, where when the generation time of the first identification code certificate is within the discarding time range, a verification result that the verification fails can be obtained, and when the verification result indicates that the first identification code certificate needs to be discarded, the step S103 is entered. When the generation time of the first identification code certificate is not within the discarding time range, a verification result that the verification is passed can be obtained, and the first identification code certificate is valid.
In some embodiments, the verification of the first identification code certificate may further be based on a historical consumption record of the user to determine whether the user is a malicious user, thereby obtaining a verification result.
In some embodiments, before step S102, the discarding rule is further acquired by: and acquiring a abandonment rule corresponding to the first identification code certificate based on the identification information of the first identification code certificate. Here, since the discarding time range and the validity period of different identifier certificates are often different, different identifier certificates correspond to different discarding rules, and therefore, before verifying whether the first identifier certificate needs to be discarded, the corresponding discarding rule needs to be obtained based on the identification information of the first identifier certificate.
And step S103, deleting the first identification code certificate when the verification result shows that the first identification code certificate needs to be discarded.
Here, step S103 may be implemented by the code sending platform, or may be implemented by the terminal. When the first identification code certificate is an identification code certificate stored by the code sending platform, and the verification result indicates that the first identification code certificate needs to be discarded, the code sending platform deletes the first identification code certificate, and the step S104 is performed; when the first identification code certificate is stored in the terminal, and the verification result shows that the first identification code certificate needs to be discarded, the code sending platform sends a discarding notification message to the terminal, the terminal deletes the first identification code certificate, and the certificate generation request is sent to the code sending platform again.
Step S104, generating a new first identification code certificate and sending the new first identification code certificate to the terminal.
Here, step S104 may be implemented by a code sending platform, and step S104 may be triggered to be executed after step S103, or may be executed based on receiving a certificate generation request sent by the terminal.
In some embodiments, after receiving the new first identification code certificate, the terminal generates a second identification code based on the new first identification code certificate, so as to perform a subsequent payment process based on the second identification code.
In the identification code certificate verification method provided by the embodiment of the application, after a code sending platform receives a request message sent by a terminal, a first identification code certificate to be verified is acquired and verified to determine whether the first identification code certificate needs to be discarded, when the first identification code certificate needs to be discarded, the first identification code certificate is deleted, a new first identification code certificate is generated and sent to the terminal, the situation that a user finds that code scanning fails and needs to acquire the identification code certificate again and generate an identification code is avoided when scanning the code, operation can be simplified, and the terminal can generate a correct and effective second identification code based on the correct and effective new first identification code certificate, so that payment efficiency is improved.
In some embodiments, in step S101 "acquiring the first identification code certificate to be verified based on the request message sent by the terminal" shown in fig. 3, based on the difference between the request messages, there are two implementation manners:
in a first implementation manner, when the first identifier certificate is cached in the terminal, the request message is an authentication request message, and the authentication request message carries the first identifier certificate, the first implementation manner may be implemented by the following step S1011 a:
step S1011a, parsing the verification request message, and obtaining the first identification code certificate carried in the verification request message.
In the second implementation manner, when the first identifier certificate is not cached in the terminal, the request message is a certificate generation request, and the certificate generation request further carries a certificate identifier requested to be generated, the following step 1011b may be implemented:
step S1011b, based on the certificate identifier, determines whether the first identification code certificate corresponding to the certificate identifier is stored in the certificate.
Step S1012b, when the first identification code certificate is stored in the storage device, obtains the first identification code certificate to be verified from the storage space of the storage device.
Here, when the step S1011b is implemented, it is necessary to determine whether the storage space of the storage device stores the corresponding first identification code certificate according to the certificate identifier, and when the storage space of the storage device stores the corresponding first identification code certificate, the first identification code certificate to be verified is obtained from the storage space of the storage device. In some embodiments, when the storage space of the code sending platform does not have the corresponding first identification code certificate, the code sending platform generates the first identification code certificate based on the certificate identification and sends the first identification code certificate to the terminal.
In some embodiments, when the request message in step S101 is an authentication request message, and the authentication request message carries a first identification code certificate, as shown in fig. 4, after step S102, the code sending platform may further perform the following steps:
and step 21, judging whether the verification result indicates that the first identification code certificate needs to be discarded.
Here, when the verification result is that the first identification code certificate is valid, the process proceeds to step S24, where a response message of passing the verification is sent to the terminal to inform the terminal to generate the first identification code based on the first identification code certificate; when the verification result is that the verification is not passed, indicating that the first identification code certificate needs to be discarded, the process proceeds to step S22.
Step S22, sending a response message that the verification fails to the terminal, so as to inform the terminal to delete the first identification code certificate.
Here, when the request message in step S101 is an authentication request message, step S103 shown in fig. 3 may be implemented by step S22, that is, when the request message received by the code sending platform is an authentication request message, the deleting of the first identification code certificate is performed by the code sending platform sending a response message that the authentication is not passed to the terminal.
In step S23, the certificate generation request transmitted by the terminal is received.
As shown in fig. 4, after receiving the certificate generation request at step S23, the method proceeds to step S104, generates a new first identification code certificate, and transmits the new first identification code certificate to the terminal.
Step S24, sending a response message that the verification is passed to the terminal, so as to inform the terminal to generate the first identification code based on the first identification code certificate.
Here, after the terminal receives the response message that the verification passes, the first identification code is generated based on the first identification code certificate, and the first identification code is presented for the scanning equipment to scan the first identification code, so that the payment process is realized, and the identification code presented by the terminal can be ensured to be correct and effective, thereby improving the payment efficiency and the user experience.
In some embodiments, the discarding rule at least includes that the generation time of the first identification code certificate is within the discarding time range, and correspondingly, step S102 "shown in fig. 3 verifies the first identification code certificate based on the discarding rule corresponding to the first identification code certificate, and obtains the verification result" may be implemented in steps S1021a to S1023a, which will be described below in conjunction with the respective steps.
Step S1021a, acquiring the generation time of the first identification code certificate.
Step S1022a, based on the discarding rule, acquires the discarding time range of the first identification code certificate.
Here, the discarding time range of the first identification code certificate may be set by an administrator of the code issuing platform according to the user complaint information of the first identification code certificate, the alarm information of the code issuing platform.
Step S1023a, verifying the first identification code based on the generation time and the discarding time range to obtain a verification result.
Here, when the generation time is not within the discarding time range, a verification result that the verification is passed is obtained; and when the generation time is within the abandonment time range, obtaining a verification result of passing the verification.
For example, when the generation time of the first identification code certificate is 2019, month 1 and the discarding time range of the first identification code certificate is 2019, month 8, and 15 to 2019, month 8 and 30, the verified result is obtained at this time because the 2019, month 9 and 1 is within the discarding time range of 2019, month 8, month 15 to 2019, month 8 and 30.
In some embodiments, the discarding rule may further include that the number of overdue payments of the user corresponding to the terminal identifier is greater than the threshold number, and the overdue amount of the user corresponding to the terminal identifier is greater than the threshold amount, and correspondingly, step S102 "shown in fig. 3 may be implemented by the following steps S1021b to S1023b, where the step S102" is to verify the first identifier certificate based on the discarding rule corresponding to the first identifier certificate, and a verification result "is obtained, and the following description is related to each step.
Step S1021b, based on the terminal identifier, obtaining the historical consumption record corresponding to the terminal identifier.
Here, the terminal identification may be a user name of an App with a payment function that is logged in at the terminal, or a mailbox address, a telephone number, or the like when registering on the payment App.
The historical consumption record corresponding to the terminal identifier may be the historical consumption record of the merchant corresponding to the first identifier, or may be all the historical consumption records corresponding to the terminal identifier. For example, the terminal identifier is a user name of the payment App, the merchant corresponding to the first identifier is a west ampere subway, and the historical consumption record corresponding to the terminal identifier may be consumption records of all the west ampere subways taken corresponding to the terminal identifier, or may be consumption records of all the consumption records paid by using the terminal identifier, such as taxi taking consumption records, shopping consumption records, and dietary consumption records.
The historical consumption record can include consumption time, payment amount and other information.
In step S1022b, the overdue payment times and/or the overdue payment amount are determined according to the historical consumption records.
Here, the merchant may set a payment time range, for example, the payment may be made within two days after consumption, the payment may be made within 8 hours after consumption, and when the user does not make a payment within the payment time range set by the merchant, an overdue payment occurs, and at this time, the overdue payment amount and the number of overdue payments are recorded.
When the step S1022b is implemented, it may be determined whether the past due is due according to the consumption time, the payment time, and the payment time range in the historical consumption records, for example, the payment time range is 24 hours, and a certain historical consumption record: the consumption time is 2019, 10, 1, 17:00, the payment time is 2019, 10, 5, 12:00 and the consumption amount is 128 yuan, the payment can be obtained according to the consumption time and the payment time, at the time, payment is overdue, the overdue payment frequency is added by 1, and the consumption amount is accumulated to the overdue consumption amount.
And step S1023b, verifying the first identification code certificate based on the overdue payment times and/or the overdue payment amount to obtain a verification result.
Here, the step S1023b may be implemented by authenticating the first identification code certificate based only on the number of overdue payments, wherein the authentication result of the failed authentication is obtained when the number of overdue payments exceeds the threshold number of times, and the authentication result of the passed authentication is obtained when the number of overdue payments does not exceed the threshold number of times.
When the step S1023b is implemented, the first identification code certificate may be verified only based on the overdue payment amount, wherein when the overdue payment amount exceeds the amount threshold, a verification result that the verification fails is obtained, and when the overdue payment amount does not exceed the amount threshold, a verification result that the verification passes is obtained.
When the step S1023b is implemented, the first identification code certificate may also be verified based on the overdue payment number and the overdue payment amount, wherein when the overdue payment number exceeds the number threshold or the overdue payment amount exceeds the amount threshold, a verification result that the verification fails is obtained, and when the overdue payment number does not exceed the number threshold and the overdue payment amount does not exceed the amount threshold, a verification result that the verification passes is obtained.
In some embodiments, the discarding rule may further include that the generation time of the first identification code certificate is not within the specified validity period time range, and correspondingly, step S102 "shown in fig. 3 verifies the first identification code certificate based on the discarding rule corresponding to the first identification code certificate, and obtains the verification result" may be implemented in steps S1021c to S1023c, which will be described below in conjunction with the respective steps.
Step S1021c, acquiring the generation time of the first identification code certificate.
In step S1022c, based on the discarding rule, the validity period information of the first identification code certificate is acquired.
Here, after the first identification code certificate is generated, validity information of the first identification code certificate may be determined based on version information of the first identification code certificate, and in some embodiments, the validity information of the first identification code certificate may also be set by an administrator of the code issuing platform.
Step S1023c, verifying the first identification code based on the generation time and the validity period information to obtain a verification result.
Here, when the generation time is within the validity period information specified range, a verification result that the verification is passed is obtained; and when the generation time is not within the specified range of the validity period information, obtaining a verification result of failed verification.
For example, when the generation time of the first identification code certificate is 2019, month 1 and the validity period information of the first identification code certificate is 2019, month 8, month 15 and 2019, month 10 and month 15, since the validity period of the year 9, month 1 and 2019, month 8 and month 15 and 2019, month 10 and month 15 is within the specified time range, the verification result that the verification is passed is obtained at this time.
In some embodiments, the discarding rule may further include that the version number of the first identifier certificate is lower than a preset version number, and correspondingly, step S102 "shown in fig. 3 verifies the first identifier certificate based on the discarding rule corresponding to the first identifier certificate, and obtains the verification result" may be implemented in steps S1021d to S1023d, which will be described below in conjunction with the respective steps.
Step S1021d, acquiring a version number of the first identification code certificate.
In step S1022d, a preset version number specified in the discarding rule is acquired.
Here, the preset version number may be set by a manager of the code sending platform, and further, may be set by the manager according to the user complaint information of the first identification code certificate and the alarm information of the code sending platform.
And step S1023d, verifying the first identification code based on the version number and the preset version number of the first identification code certificate to obtain a verification result.
Here, when the version number of the first identification code certificate is higher than or equal to a preset version number, a verification result that the verification is passed is obtained, and when the version number of the first identification code certificate is lower than the preset version number, a verification result that the verification is not passed is obtained.
For example, the preset version number is v5.2.1, the version number of the first identification code certificate is v4.3.1, and since the version number of the first identification code certificate is lower than the preset version number, a verification result that the verification fails is obtained.
In addition, when the step S102 is implemented, it may be implemented by any one of the above manners, or may be implemented by a combination of any two or more of the above manners.
In some embodiments, the obsolete rules may also be updated by:
in step S31, an editing operation for the discarding rule is received.
Here, the editing operation on the discarding rule may be adding the discarding rule, deleting the discarding rule, modifying the discarding rule, or the like.
Step S32, updating the discarding rule in response to the editing operation.
Here, when implemented, the step S32 may be implemented by adding, deleting or modifying the original obsolete rule before the editing operation is received in response to the editing operation on the obsolete rule to obtain an updated obsolete rule.
Based on the foregoing embodiments, an embodiment of the present application further provides a method for verifying an identifier, which is applied to the network architecture shown in fig. 1, where fig. 5 is a schematic diagram of another implementation flow of the method for verifying an identifier according to the embodiment of the present application, and as shown in fig. 5, the method includes:
in step S501, the user terminal receives an operation of displaying the first identification code.
Here, in the embodiment of the present application, the first identification code is taken as a ride code for the related explanation. When the step S501 is implemented, the operation of displaying the first identification code may be an operation of opening a car code applet, and the car code applet may be a web program installed in a payment application, a map application, or an instant messaging application and capable of generating a car code. In some embodiments, the operation of displaying the first identification code may also be an operation of clicking on an electronic car card in a card package in the payment application, and an operation of turning on a car-specific App to display the first identification code.
Step S502, the user terminal determines whether the user terminal stores the first identification code certificate based on the operation.
Here, when the user terminal itself does not store the first identification code certificate, step S503 is entered, and a certificate generation request is sent to the code sending platform; when the user terminal itself stores the first identification code certificate, step S505 is entered, and a verification request is sent to the code sending platform.
Step S503, the user terminal sends a certificate generation request to the code sending platform.
Here, the certificate generation request carries a terminal identifier.
Step S504, the code sending platform determines whether the first identification code certificate is stored in the code sending platform.
Here, when the code sending platform itself stores the first identification code certificate, step S506 is entered; and when the code sending platform does not store the first identification code certificate, the step S510 is carried out, and the first identification code certificate is generated.
Step S505, the user terminal sends a verification request message to the code sending platform.
Here, the signature verification request message carries the first identification code certificate and the terminal identifier.
Step S506, the code sending platform obtains the abandon rule.
Here, the discarding rule may be preset, and for example, the generation time of the first identification code certificate may be within a discarding time range, the generation time of the first identification code certificate may not be within a time range specified by the validity information, the number of overdue payments in the consumption record corresponding to the terminal identifier may not be greater than a threshold number of times, the amount of overdue payments may not be greater than an amount threshold, and the like.
Step S507, the code sending platform verifies the first identification code certificate based on the abandonment rule corresponding to the first identification code certificate to obtain a verification result.
Here, when step S507 is implemented, when it is determined that the first identification code certificate does not satisfy the condition specified by the discarding rule, a verification result that the verification is passed is obtained, and this indicates that the first identification code certificate is valid; when the first identification code certificate is determined to meet the condition specified by the abandon rule, the verification result that the verification fails is obtained, and the condition indicates that the first identification code certificate needs to be abandoned.
Step S508, the code sending platform determines whether the first identification code certificate needs to be discarded based on the verification result.
Here, when it is determined that the first identification code certificate stored in the code sending platform itself needs to be discarded, the process proceeds to step S509, and when it is determined that the first identification code certificate stored in the code sending platform itself does not need to be discarded, the process proceeds to step S511; when determining that the first identification code certificate stored in the user terminal needs to be discarded, the method proceeds to step S509 ', and the code sending platform sends a response message indicating that the verification fails to pass to the user terminal, so as to notify the user terminal to delete the first identification code certificate, and when determining that the first identification code certificate stored in the code sending platform itself does not need to be discarded, the method proceeds to step S511'.
In step S509, the code sending platform deletes the first identification code certificate.
In step S509', the user terminal deletes the first identification code certificate based on the received response message indicating that the verification fails, and sends a certificate generation request to the code sending platform.
Step S510, the code sending platform generates a new first identification code certificate.
Step S511, the code sending platform sends the first identification code certificate to the user terminal.
Here, the first identification code certificate transmitted by the code transmitting platform to the user terminal is valid in step S511, so that the first identification code that can be normally recognized by the scanning device can be generated.
Step S511', the code sending platform sends a response message that the verification is passed to the user terminal.
Here, the code transmitting platform transmits a response message of passing the verification to the user terminal to inform the terminal that the first identification code certificate is valid, and the first identification code can be directly generated.
Step S512, the user terminal generates a first identification code based on the first identification code certificate, and displays the first identification code.
Here, the user terminal generates and displays the first identification code for scanning by the scanning device, and a subsequent payment process is performed.
Step S513, the scanning device scans the first identification code and obtains the scanned information.
Here, the scanned information may include payment information, user account information, and the like.
Step S514, the scanning device sends the scanned information to a code sending platform.
And step S515, the code sending platform deducts fees based on the scanned information.
Here, the code sending platform performs deduction and settlement on the user account information based on the payment amount in the payment information.
And step S516, the code sending platform sends the fee deduction success information to the user terminal.
Here, when the fee deduction of the user account information is successful, the code sending platform sends the fee deduction success information to the user terminal, in some embodiments, when the fee deduction of the user account information is failed, the code sending platform sends the fee deduction failure information to the user terminal, the code sending platform can also send the fee deduction failure information to the scanning device, and when the scanning device is a gate of a subway station, the scanning device can control the gate to be closed after receiving the fee deduction failure information, so as to prevent passengers from escaping the ticket.
In the method for verifying the identification code certificate provided by the embodiment of the application, regardless of whether the first identification code certificate is stored in the user terminal or the code sending platform, before the first identification code is generated based on the first identification code certificate, the code sending platform verifies the first identification code certificate according to the abandonment rule to determine whether the first identification code certificate needs to be abandoned or not and generate a new first identification code certificate, so that a correct and effective first identification code can be generated, the subsequent payment process can be smoothly executed, and the payment efficiency is improved.
Next, an exemplary application of the embodiment of the present application in a practical application scenario will be described.
In the embodiment of the present application, an identification code is taken as an example for explanation.
The user small program end stores a card certificate which can be used offline and is used for generating the two-dimensional code offline. The riding code background (namely the code sending platform) also caches the card certificate. When the user applet requests to generate the card certificate, the riding code background preferentially returns the card certificate in the cache of the user applet. However, in some scenarios, the card certificate cached in the vehicle code background or the user applet needs to be discarded in time, for example, the user is a high-risk user, the cached offline card certificate has a problem and needs to be triggered to generate a new card certificate, the offline card certificate needs to be functionally updated, and the like.
Fig. 6 is a schematic flow chart of an implementation of a method for verifying a vehicle code certificate according to an embodiment of the present application, where in the flowchart of the method shown in fig. 6, an apparatus for performing information interaction includes: user terminal and by bus code backstage, and user terminal includes by bus code applet 661, by bus code backstage includes: the system comprises a riding code card certificate management device 662, a riding code card certificate abandoning device 663, a card certificate storage device 664, a riding code card certificate generation device 665, a riding code card certificate abandoning rule storage device 666 and a riding code card certificate abandoning rule management platform 667. The respective steps will be described below with reference to fig. 6.
Step S601, the ride code applet sends a generation request to the ride code card certificate management apparatus when the card certificate is not locally stored or sends a determination request to the ride code card certificate management apparatus when the card certificate is locally stored.
Here, if the car applet has a card certificate, the user initiates a request for determining whether the offline card certificate is discarded to the car code card certificate management device each time the applet is opened, and then, after step S601, the process directly proceeds to step S603.
Step S602, the riding code card certificate management device inquires the card certificate storage device whether there is an available cache card certificate.
Here, if the card certificate storage device has a card certificate, proceed to step S603; if the card certificate storage device does not store the corresponding card certificate, the step S605 is entered, the riding code card certificate management background directly calls the card certificate generation device, and the generation device generates a new card certificate.
And step S603, the riding code card certificate management device sends the card certificate to a riding code card certificate abandoning device.
In step S604, the card certificate discarding apparatus reads the discarding rule and determines whether the cached card certificate has been discarded.
Here, it is determined that step S605 is entered if the cached card certificate is discarded; and if the cached card certificate is not discarded, the riding code card certificate management device directly returns the certificate to the applet end for use.
In this embodiment of the application, if the card certificate discarding apparatus determines that the card certificate requested to be determined by the ride code applet needs to be discarded, the card certificate discarding apparatus issues a discarding instruction to return to the ride code applet, the ride code applet deletes the locally cached offline card certificate, and initiates a generation request again to the ride code card certificate management apparatus to request generation of a new card certificate, so as to execute step S602 and subsequent steps. At this time, if the riding code card certificate management device determines that the card certificate cached in the card certificate storage device also hits the discarding rule, the riding code card certificate management device does not return the discarded cached card certificate to the riding code applet end, but calls the riding code card certificate generation device, and finally generates a new card certificate and returns the new card certificate to the riding code applet.
In step S605, the riding code card certificate management device invokes the riding code card certificate generation device to generate a new card certificate.
Step S606, the riding code card certificate generating device stores the newly generated card certificate in the card certificate storage device, and returns the new card certificate to the applet for use.
Step S607, the card certificate waste management platform carries out the addition, deletion, modification and check on the waste rules.
Fig. 7 is a schematic flow chart of another implementation of a method for verifying a vehicle code certificate according to an embodiment of the present application, and as shown in fig. 7, the method includes:
step S701, the user opens the small bus code program and judges whether the user stores the card certificate.
Here, in the embodiment of the present application, if the car code applet terminal already has a card certificate, the offline card certificate of the user at the car code applet terminal needs to be discarded in advance for some reasons, such as that there is a risk in the card certificate, or the card certificate needs to be updated, and when the card certificate does not exist, the process proceeds to step S702.
When the car code applet stores the card certificate, the process proceeds to step S713.
Step S702, the riding code applet sends an offline card certificate generation request to the riding code card certificate management device.
Step S703 is that after the vehicle code card certificate management apparatus receives the request for generating the offline card certificate, it first requests the card certificate storage apparatus to determine whether there is a valid cache card certificate.
In step S704, the card certificate storage device determines whether there is a cache card certificate available.
Here, if there is a card certificate available in the card certificate storage means, proceeding to step S705, the card certificate storage means transmits the card certificate to the riding code card certificate management means. If there is no cache card certificate available in the card certificate storage means, the flow proceeds to step S709.
In step S705, the card certificate storage device transmits the card certificate to the riding code card certificate management device.
Step S706, the riding code card certificate management device sends the card certificate to a riding code card certificate abandoning device so as to request the riding code card certificate abandoning device to judge whether the card certificate needs to be abandoned or not.
In step S707, the vehicle code card certificate discarding device reads the discarding rule from the vehicle code card certificate discarding rule storage device, and determines whether the cached card certificate needs to be discarded.
The abandonment rule can be added, deleted, modified and checked through the card certificate abandonment management platform.
Step S708, if the riding code card certificate discarding apparatus determines that the cached card certificate needs to be discarded, sends a notification message of discarding the card certificate to the riding code card certificate management apparatus.
Step S709, the riding code card certificate management device invokes the riding code card certificate generation device to generate a new card certificate.
Step S710, the riding code card certificate generating device stores the newly generated card certificate in the card certificate storage device and returns the new card certificate to the small program for use.
In step S711, if the riding code card certificate discarding means determines that the cached card certificate does not need to be discarded, a notification message that the card certificate is valid is sent to the riding code card certificate management means.
Step S712, the riding code card certificate management device directly returns the card certificate to the applet for use.
Step S713, the riding code small program end initiates a judgment request for judging whether the off-line card certificate is abandoned to the riding code card certificate management device.
Here, the request parameter may carry key information of the offline card certificate, such as the merchant belonging to the city, the start time of the validity period of the card certificate, and the result time.
Step S714, the riding code card certificate management device calls the riding code card certificate discarding device to determine whether the card certificate needs to be discarded.
Step S715, the riding code card certificate discarding device reads the discarding rule from the riding code card certificate discarding rule storage device to determine whether the cached card certificate needs to be discarded.
In step S716, if the riding code card certificate discarding apparatus determines that the cached card certificate needs to be discarded, a notification message of discarding the card certificate is sent to the riding code card certificate management apparatus.
In step S717, the vehicle code card certificate management device issues a discard command to return to the vehicle code applet.
Step S718, the car code applet deletes the locally cached offline card certificate.
Here, after the car code applet deletes the locally cached offline card certificate, the process proceeds to step S702, and a generation request is initiated to the car code card certificate management device to request generation of a new card certificate.
In the verification method of the riding code certificate, the riding code applet of the user caches the card certificate with the offline function, and the cached card certificate needs to be discarded in time in some special scenes, for example, the user is a high-risk user, the card certificate cached offline by the user has a problem and needs to be triggered to generate a new card certificate, the card certificate offline by the user needs to be functionally upgraded, and the like. Through the convenient operation management abandonment rule of the code card certificate abandonment rule management platform of riding, when the user opens the applet at every turn and uses, all can touch card certificate abandonment and judge the request, the request is through the code card certificate management device of riding, the code card certificate abandonment device of riding, under the reasonable function of a whole set of devices such as code card certificate generating device of riding, can realize the timely abandonment that the user applet end leaves the line card certificate, and issue new card certificate and return to the applet end, guarantee validity and the exactness of card certificate.
Continuing with the exemplary structure of the authentication device 80 (hereinafter referred to simply as the authentication device) of the identification code provided in the embodiment of the present application implemented as a software module, in some embodiments, as shown in fig. 2, the software module stored in the authentication device 80 of the memory 240 may include:
a first obtaining module 81, configured to obtain a first identifier certificate to be verified based on a request message sent by a terminal;
the verification module 82 is configured to verify the first identification code certificate based on a discarding rule corresponding to the first identification code certificate to obtain a verification result;
a deleting module 83, configured to delete the first identifier certificate when the verification result indicates that the first identifier certificate needs to be discarded;
a first generating module 84, configured to generate a new first identification code certificate and send the new first identification code certificate to the terminal.
In some embodiments, when the request message is an authentication request message and the authentication request message carries the first identification code certificate,
the first obtaining module 81 is further configured to:
and analyzing the verification request message to obtain a first identification code certificate carried in the verification request message.
In some embodiments, the request message is a certificate generation request, and the certificate generation request carries a certificate identifier requested to be generated,
the first obtaining module 81 is further configured to:
determining whether a first identification code certificate corresponding to the certificate identifier is stored in the certificate or not based on the certificate identifier;
when the first identification code certificate is stored in the self-identification code certificate, the first identification code certificate to be verified is obtained from the storage space of the self-identification code certificate.
In some embodiments, the authentication device further comprises:
the third generation module is used for generating a first identification code certificate based on the certificate identifier when the first identification code certificate is not stored in the third generation module;
and the third sending module is used for sending the first identification code certificate to the terminal.
In some embodiments, the authentication device further comprises:
a first sending module, configured to send, when the verification result indicates that the first identifier certificate needs to be discarded, a response message indicating that the verification fails to pass to the terminal, so as to notify the terminal to delete the first identifier certificate;
the first receiving module is used for receiving a certificate generation request sent by a terminal;
and the second generation module is used for generating a new first identification code certificate based on the certificate generation request and sending the new first identification code certificate to the terminal.
In some embodiments, the authentication device further comprises:
and the second sending module is used for sending a response message that the verification is passed to the terminal to inform the terminal to generate the first identification code based on the first identification code certificate when the verification result shows that the first identification code certificate is valid.
In some embodiments, the authentication device further comprises:
and the second acquisition module is used for acquiring the abandonment rule corresponding to the first identification code certificate based on the identification information of the first identification code certificate.
In some embodiments, the authentication device further comprises:
the second receiving module is used for receiving editing operation on the abandonment rule;
and the updating module is used for responding to the editing operation and updating the abandonment rule.
In some embodiments, the verification module 82 is further configured to:
acquiring the generation time of the first identification code certificate;
acquiring a discarding time range of the first identification code certificate based on the discarding rule;
verifying the first identification code based on the generation time and the abandonment time information, wherein when the generation time is within the abandonment time range, a verification result that the verification fails is obtained; and when the generation time is not within the abandonment time range, obtaining a verification result of passing the verification.
In some embodiments, the verification module 82 is further configured to:
acquiring a historical consumption record corresponding to the terminal, and acquiring a time threshold and/or a money threshold based on a abandon rule;
determining overdue payment times and/or overdue payment amount according to the historical consumption records;
and checking the first identification code certificate based on the overdue payment times and/or the overdue payment amount, wherein when the overdue payment times exceed a time threshold and/or the overdue payment amount exceed an amount threshold, a verification result that the verification fails is obtained.
In some embodiments, the verification module 82 is further configured to:
acquiring the generation time of the first identification code certificate;
acquiring validity period information of the first identification code certificate based on the abandonment rule;
verifying the first identification code based on the generation time and the validity period information to obtain a verification result, wherein when the generation time is within a specified range of the validity period information, a verification result passing the verification is obtained; and when the generation time is not within the specified range of the validity period information, obtaining a verification result of failed verification.
In some embodiments, the verification module 82 is further configured to:
acquiring the version number of the first identification code certificate;
acquiring a preset version number specified in the abandonment rule;
and verifying the first identification code based on the version number of the first identification code certificate and a preset version number to obtain a verification result, wherein the verification result of passing the verification is obtained when the version number of the first identification code certificate is higher than or equal to the preset version number, and the verification result of failing the verification is obtained when the version number of the first identification code certificate is lower than the preset version number.
Embodiments of the present application provide a storage medium having stored therein executable instructions that, when executed by a processor, will cause the processor to perform methods provided by embodiments of the present application, for example, as illustrated in fig. 3, 4, 5, 6, and 7.
In some embodiments, the storage medium may be a memory such as FRAM, ROM, PROM, EPROM, EE PROM, flash, magnetic surface memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories.
In some embodiments, executable instructions may be written in any form of programming language (including compiled or interpreted languages), in the form of programs, software modules, scripts or code, and may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
By way of example, executable instructions may correspond, but do not necessarily have to correspond, to files in a file system, may be stored in a portion of a file that holds other programs or data, e.g., in one or more scripts in a HyperText markup Language (H TML) document, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub-programs, or portions of code).
By way of example, executable instructions may be deployed to be executed on one computing device or on multiple computing devices at one site or distributed across multiple sites and interconnected by a communication network.
The above description is only an example of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, and improvement made within the spirit and scope of the present application are included in the protection scope of the present application.

Claims (15)

1. A method for verifying an identification code certificate, comprising:
acquiring a first identification code certificate to be verified based on a request message sent by a terminal;
verifying the first identification code certificate based on a discarding rule corresponding to the first identification code certificate to obtain a verification result;
deleting the first identification code certificate when the verification result shows that the first identification code certificate needs to be discarded;
and generating a new first identification code certificate and sending the new first identification code certificate to the terminal.
2. The method of claim 1, wherein when the request message is an authentication request message and the authentication request message carries a first identification code certificate,
the acquiring a first identification code certificate to be verified based on a request message sent by a terminal includes:
and analyzing the verification request message to obtain a first identification code certificate carried in the verification request message.
3. The method according to claim 1, wherein the request message is a certificate generation request, and the certificate generation request carries a certificate ID requested to be generated,
the acquiring a first identification code certificate to be verified based on a request message sent by a terminal includes:
determining whether a first identification code certificate corresponding to the certificate identifier is stored in the certificate or not based on the certificate identifier;
when the first identification code certificate is stored in the self-identification code certificate, the first identification code certificate to be verified is obtained from the storage space of the self-identification code certificate.
4. The method of claim 3, further comprising:
when the first identification code certificate is not stored, generating a first identification code certificate based on the certificate identifier;
and sending the first identification code certificate to the terminal.
5. The method of claim 2, further comprising:
when the verification result shows that the first identification code certificate needs to be discarded, sending a response message that the verification fails to pass to the terminal so as to inform the terminal to delete the first identification code certificate;
receiving a certificate generation request sent by a terminal;
and generating a first identification code certificate based on the certificate generation request, and sending the first identification code certificate to the terminal.
6. The method of claim 1, further comprising:
and when the verification result shows that the first identification code certificate is valid, sending a response message of passing the verification to the terminal so as to inform the terminal to generate the first identification code based on the first identification code certificate.
7. The method according to any one of claims 1 to 6, further comprising:
and acquiring a abandonment rule corresponding to the first identification code certificate based on the identification information of the first identification code certificate.
8. The method according to any one of claims 1 to 6, further comprising:
receiving an editing operation on a waste rule;
updating the obsolete rules in response to the editing operation.
9. The method according to any one of claims 1 to 6, wherein the verifying the first identification code certificate based on the discarding rule corresponding to the first identification code certificate comprises:
acquiring the generation time of the first identification code certificate;
acquiring a discarding time range of the first identification code certificate based on the discarding rule;
verifying the first identification code based on the generation time and the abandonment time information, wherein when the generation time is within the abandonment time range, a verification result that the verification fails is obtained; and when the generation time is not within the abandonment time range, obtaining a verification result of passing the verification.
10. The method according to any one of claims 1 to 6, wherein the verifying the first identification code certificate based on the discarding rule corresponding to the first identification code certificate comprises:
acquiring a historical consumption record corresponding to the terminal, and acquiring a time threshold and/or a money threshold based on a abandon rule;
determining overdue payment times and/or overdue payment amount according to the historical consumption records;
and checking the first identification code certificate based on the overdue payment times and/or the overdue payment amount, wherein when the overdue payment times exceed a time threshold and/or the overdue payment amount exceed an amount threshold, a verification result that the verification fails is obtained.
11. The method according to any one of claims 1 to 6, wherein the verifying the first identification code certificate based on the discarding rule corresponding to the first identification code certificate comprises:
acquiring the generation time of the first identification code certificate;
acquiring validity period information of the first identification code certificate based on the abandonment rule;
verifying the first identification code based on the generation time and the validity period information to obtain a verification result, wherein when the generation time is within a specified range of the validity period information, a verification result passing the verification is obtained; and when the generation time is not within the specified range of the validity period information, obtaining a verification result of failed verification.
12. The method according to any one of claims 1 to 6, wherein the verifying the first identification code certificate based on the discarding rule corresponding to the first identification code certificate comprises:
acquiring the version number of the first identification code certificate;
acquiring a preset version number specified in the abandonment rule;
and verifying the first identification code based on the version number of the first identification code certificate and a preset version number to obtain a verification result, wherein the verification result of passing the verification is obtained when the version number of the first identification code certificate is higher than or equal to the preset version number, and the verification result of failing the verification is obtained when the version number of the first identification code certificate is lower than the preset version number.
13. An apparatus for verifying an identification code, comprising:
the first acquisition module is used for acquiring a first identification code certificate to be verified based on a request message sent by a terminal;
the verification module is used for verifying the first identification code certificate based on the abandonment rule corresponding to the first identification code certificate to obtain a verification result;
the deleting module is used for deleting the first identification code certificate when the verification result shows that the first identification code certificate needs to be discarded;
and the first generation module is used for generating a new first identification code certificate and sending the new first identification code certificate to the terminal.
14. An apparatus for verifying an identification code, comprising:
a memory for storing executable instructions;
a processor for implementing the method of any one of claims 1 to 12 when executing executable instructions stored in the memory.
15. A storage medium having stored thereon executable instructions for causing a processor to perform the method of any one of claims 1 to 12 when executed.
CN201911276798.1A 2019-12-12 2019-12-12 Identification code verification method, device, equipment and storage medium Pending CN111027974A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911276798.1A CN111027974A (en) 2019-12-12 2019-12-12 Identification code verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911276798.1A CN111027974A (en) 2019-12-12 2019-12-12 Identification code verification method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111027974A true CN111027974A (en) 2020-04-17

Family

ID=70206602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911276798.1A Pending CN111027974A (en) 2019-12-12 2019-12-12 Identification code verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111027974A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868709A (en) * 2011-07-04 2013-01-09 中国移动通信集团公司 Certificate management method and certificate management device based on P2P (peer-to-peer)
CN107645381A (en) * 2016-07-21 2018-01-30 阿里巴巴集团控股有限公司 Safety verification implementation method and device
CN107835079A (en) * 2017-11-02 2018-03-23 广州佳都数据服务有限公司 A kind of two-dimentional code authentication method and equipment based on digital certificate
CN108696356A (en) * 2017-04-05 2018-10-23 中国移动通信有限公司研究院 A kind of digital certificate delet method, apparatus and system based on block chain
CN110535809A (en) * 2018-05-25 2019-12-03 腾讯科技(深圳)有限公司 A kind of identification code pulls method, storage medium and terminal device and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868709A (en) * 2011-07-04 2013-01-09 中国移动通信集团公司 Certificate management method and certificate management device based on P2P (peer-to-peer)
CN107645381A (en) * 2016-07-21 2018-01-30 阿里巴巴集团控股有限公司 Safety verification implementation method and device
CN108696356A (en) * 2017-04-05 2018-10-23 中国移动通信有限公司研究院 A kind of digital certificate delet method, apparatus and system based on block chain
CN107835079A (en) * 2017-11-02 2018-03-23 广州佳都数据服务有限公司 A kind of two-dimentional code authentication method and equipment based on digital certificate
CN110535809A (en) * 2018-05-25 2019-12-03 腾讯科技(深圳)有限公司 A kind of identification code pulls method, storage medium and terminal device and server

Similar Documents

Publication Publication Date Title
JP2021524088A (en) Resource migration data management method and equipment, and computer programs
CN109360077B (en) Information processing method, device, gateway server and medium in invoice reimbursement
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
AU2020202711A1 (en) Payment requests
TW202008290A (en) Blockchain-based service rental methods and devices
CN109523045B (en) Method and equipment for providing travel service
US20140214678A1 (en) Online payment
CN111934870B (en) Method, apparatus, device and medium for updating root certificate in block chain network
CN111488372A (en) Data processing method, device and storage medium
KR102317712B1 (en) Online registration sending method and system using i-PIN
CN111429191A (en) Block chain-based electronic invoice flow management method, device and system
CN110660466A (en) Personal health data chaining method and system of Internet of things by combining block chains
CN113255014A (en) Data processing method based on block chain and related equipment
CN110941840A (en) Data processing method, system and terminal
CN111311259A (en) Bill processing method, device, terminal and computer readable storage medium
CN111260421B (en) Electronic invoice management and control method and device based on block chain
CN112862589A (en) Identity verification method, device and system in financial scene
CN111027974A (en) Identification code verification method, device, equipment and storage medium
KR102107454B1 (en) System for multiplication of financial payment networks, method for financial services using the same and computer program for the same
CN111932326A (en) Data processing method based on block chain network and related equipment
CN111028027A (en) Service processing method and device
WO2024078109A1 (en) Multi-blockchain data processing method and apparatus, and device, system and medium
CN111598635B (en) Bill information processing method and device, equipment and readable storage medium
CN110912987B (en) Information processing method and related equipment
WO2024093593A1 (en) Multi-blockchain-based data processing method and apparatus, and electronic device, computer-readable storage medium and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40022172

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination