CN111491281A - Information processing method, device and system based on near field communication signal - Google Patents

Information processing method, device and system based on near field communication signal Download PDF

Info

Publication number
CN111491281A
CN111491281A CN202010215229.2A CN202010215229A CN111491281A CN 111491281 A CN111491281 A CN 111491281A CN 202010215229 A CN202010215229 A CN 202010215229A CN 111491281 A CN111491281 A CN 111491281A
Authority
CN
China
Prior art keywords
information
communication signal
attribute information
identification information
near field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010215229.2A
Other languages
Chinese (zh)
Other versions
CN111491281B (en
Inventor
窦方钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202211124595.2A priority Critical patent/CN115499816A/en
Priority to CN202010215229.2A priority patent/CN111491281B/en
Publication of CN111491281A publication Critical patent/CN111491281A/en
Application granted granted Critical
Publication of CN111491281B publication Critical patent/CN111491281B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/35Services specially adapted for particular environments, situations or purposes for the management of goods or merchandise

Abstract

The embodiment of the specification provides an information processing method, device and system based on a near field communication signal. The method comprises the following steps: receiving authentication request information sent by a target client and scanned identification information, wherein the authentication request information comprises first attribute information and identification information, and the first attribute information and the identification information in the authentication request information are obtained by analyzing a received near field communication signal by the target client; acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information, and acquiring first attribute information from authentication request information including the scanned identification information; comparing whether the acquired first attribute information and the acquired second attribute information are consistent; if the obtained first attribute information and the obtained second attribute information are consistent, authentication success information is generated; and if the obtained first attribute information and the obtained second attribute information are not consistent, generating authentication failure information.

Description

Information processing method, device and system based on near field communication signal
[ technical field ] A method for producing a semiconductor device
The embodiment of the specification relates to the technical field of internet, in particular to a method, a device and a system for processing information based on near field communication signals.
[ background of the invention ]
With the popularization of mobile payment and the continuous expansion of online scenes, more and more users can pay, check and sell and the like through mobile phones. For example, the merchant directly purchases the goods through mobile phone payment, or after a group purchase is carried out on a goods at a group purchase website, the two-dimensional code is displayed at the store for verification and sale.
The risk of mobile payment also comes along, for example, some wool parties can pay off-line scenes remotely to obtain high-volume marketing subsidies, or fraud molecules cheat the two-dimensional code pictures and pay off-line or check and sell commodities by using the cheated two-dimensional code pictures.
[ summary of the invention ]
In view of this, embodiments of the present specification provide an information processing method, apparatus, and system based on a near field communication signal, which are used to reduce the risk of offline operations and improve the security of offline operations.
In one aspect, an embodiment of the present specification provides an information processing method based on a near field communication signal, including:
generating and displaying an identification code;
if the identification code is monitored, generating a near field communication signal, wherein the near field communication signal comprises first attribute information and identification information of the identification code;
and transmitting the close range communication signal.
Optionally, the identification information comprises a barcode value.
Optionally, the first attribute information includes user identification information and/or device identification information.
Optionally, the close range communication signal further comprises first time information.
Optionally, the generating the close-range communication signal comprises:
encrypting the identification information, the first attribute information and the first time information;
and generating the near field communication signal according to the encrypted identification information, the first attribute information and the first time information.
Optionally, the method further comprises:
and if the page where the identification code is located is monitored to be closed, stopping sending the near field communication signal.
Optionally, the close range communication signal comprises a sound wave signal, a bluetooth signal, an infrared signal, or an NFC signal.
Optionally, the close-range communication signal comprises a sound wave signal, and the sound wave signal is a sub-ultrasonic wave signal or an ultrasonic wave signal.
In another aspect, an embodiment of the present specification provides an information processing method based on a near field communication signal, including:
scanning an identification code displayed by a user terminal to acquire identification information of the identification code;
receiving a near field communication signal sent by a user terminal, wherein the near field communication signal comprises first attribute information and identification information of an identification code;
analyzing first attribute information and identification information from the near field communication signal;
and sending authentication request information and the scanned identification information to a server, wherein the authentication request information comprises the analyzed first attribute information and the analyzed identification information.
Optionally, the authentication request information further includes first time information;
the analyzing the first attribute information and the identification information from the near field communication signal further includes:
and analyzing the first time information from the close range communication signal.
Optionally, the scanning the identification code displayed by the user terminal includes:
monitoring whether the near field communication signal is received in a set time period, wherein the starting time point of the set time period is the time point of starting scanning the identification code displayed by the user terminal;
if the short-distance communication signal is monitored not to be received within a set time period, the scanned identification information is sent to the server;
and if the short-distance communication signal is received within a set time period, the step of analyzing the first attribute information and the identification information from the short-distance communication signal is executed.
In another aspect, an embodiment of the present specification provides an information processing method based on a near field communication signal, including:
receiving authentication request information sent by a target client and scanned identification information, wherein the authentication request information comprises first attribute information and identification information, and the first attribute information and the identification information in the authentication request information are obtained by analyzing a received near field communication signal by the target client;
acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information, and acquiring first attribute information from authentication request information including the scanned identification information;
comparing whether the acquired first attribute information and the acquired second attribute information are consistent;
if the obtained first attribute information and the obtained second attribute information are consistent, authentication success information is generated;
and if the obtained first attribute information and the obtained second attribute information are not consistent, generating authentication failure information.
Optionally, the second attribute information includes user identification information and/or device identification information.
Optionally, the authentication request information further includes first time information;
the method further comprises the following steps:
if the obtained first attribute information is consistent with the obtained second attribute information through comparison, judging whether the time difference value of the current second time information and the first time information in the authentication request information comprising the scanned identification information is smaller than or equal to a set time threshold value or not;
if the time difference is judged to be less than or equal to the set time threshold, executing the step of generating authentication success information;
and if the time difference is judged to be larger than the set time threshold, generating authentication failure information.
Optionally, after receiving the authentication request information sent by the target client and the scanned identification information, the method further includes:
and decrypting the encrypted identification information, the first attribute information and the first time information to obtain the identification information, the first attribute information and the first time information.
Optionally, the method further comprises:
inquiring whether the authentication request information and the scanned identification information are received;
if the scanned identification information is received and the authentication request information is not received, acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information;
inquiring whether a preset user white list comprises the second attribute information or not;
if the preset user white list including the second attribute information is inquired, generating authentication success information;
and if the preset user white list is inquired and does not comprise the second attribute information, generating authentication failure information.
In another aspect, an embodiment of the present specification provides an information processing method based on a near field communication signal, including:
the user terminal generates and displays the identification code; if the identification code is monitored, generating a near field communication signal, wherein the near field communication signal comprises first attribute information and identification information of the identification code; transmitting the close range communication signal;
the target client scans the identification code displayed by the user terminal to acquire the identification information of the identification code; receiving a near field communication signal sent by a user terminal; analyzing the first attribute information and the identification information from the near field communication signal; sending the identification information and authentication request information to a server, wherein the authentication request information comprises the first attribute information and the identification information;
the server acquires second attribute information corresponding to the scanned identification information according to the scanned identification information, and acquires first attribute information from authentication request information comprising the scanned identification information; comparing whether the acquired first attribute information and the acquired second attribute information are consistent; if the obtained first attribute information and the obtained second attribute information are consistent, authentication success information is generated; and if the obtained first attribute information and the obtained second attribute information are not consistent, generating authentication failure information.
In another aspect, an embodiment of the present specification provides an information processing apparatus based on a near field communication signal, including:
the first generation module is used for generating an identification code;
the display module is used for displaying the identification code;
the first monitoring module is used for monitoring the identification code;
the second generating module is used for generating a near field communication signal if the first monitoring module monitors the identification code, wherein the near field communication signal comprises first attribute information and identification information of the identification code;
and the signal output module is used for sending the near field communication signal.
Optionally, the close range communication signal further comprises first time information;
the first generating module specifically comprises:
the encryption submodule is used for encrypting the identification information, the first attribute information and the first time information;
and the generation submodule is used for generating the near field communication signal according to the encrypted identification information, the second attribute information and the first time information.
Optionally, the signal output module is further configured to stop sending the near field communication signal if the first monitoring module monitors that the page where the identification code is located is closed.
In another aspect, an embodiment of the present specification provides an information processing apparatus based on a near field communication signal, including:
the scanning module is used for scanning the identification code displayed by the user terminal to acquire the identification information of the identification code;
the signal receiving module is used for receiving a near field communication signal sent by a user terminal, wherein the near field communication signal comprises first attribute information and the identification information;
the analysis module is used for analyzing the first attribute information and the identification information from the near field communication signal;
and the sending module is used for sending the identification information and the authentication request information to a server.
Optionally, the authentication request information further includes first time information;
the analysis module is further configured to analyze the first attribute information and the identification information from the near field communication signal, and at the same time, analyze the first time information from the near field communication signal.
Optionally, the method further comprises:
the second monitoring module is used for monitoring whether the signal receiving module receives the near field communication signal within a set time period, wherein the starting time point of the set time period is the time point of starting scanning the identification code displayed by the user terminal; if the short-distance communication signal is received within a set time period, triggering the analysis module to analyze the first attribute information and the identification information from the short-distance communication signal;
the sending module is further configured to send the identification information to the server if the second monitoring module monitors that the near field communication signal is not received within a set time period.
In another aspect, an embodiment of the present specification provides an information processing apparatus based on a near field communication signal, including:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving identification information and authentication request information sent by a target client, and the authentication request information comprises first attribute information and identification information, wherein the first attribute information and the identification information are obtained by analyzing a received near field communication signal by the target client;
the acquisition module is used for acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information and acquiring first attribute information from authentication request information comprising the scanned identification information;
the comparison module is used for comparing whether the acquired first attribute information and the acquired second attribute information are consistent or not;
the third generating module is used for generating authentication success information if the comparison module compares that the acquired first attribute information is consistent with the acquired second attribute information; and if the comparison module compares that the acquired first attribute information is inconsistent with the acquired second attribute information, generating authentication failure information.
Optionally, the authentication request information further includes first time information;
the device further comprises:
a judging module, configured to judge whether a time difference between current second time information and the first time information in the authentication request information including the scanned identification information is less than or equal to a set time threshold if the comparing module compares that the acquired first attribute information is consistent with the acquired second attribute information; if the time difference is judged to be smaller than or equal to the set time threshold, triggering the third generation module to execute the step of generating the authentication success information;
the third generating module is further configured to generate authentication failure information if the determining module determines that the time difference is greater than the set time threshold.
Optionally, the method further comprises:
and the decryption module is used for decrypting the encrypted identification information, the first attribute information and the first time information to obtain the identification information, the first attribute information and the first time information.
Optionally, the method further comprises:
the first query module is used for querying whether the receiving module receives the authentication request information and the scanned identification information;
the obtaining module is further configured to obtain, if the first query module queries that the scanned identification information is received and the authentication request information is not received, second attribute information corresponding to the scanned identification information according to the scanned identification information;
the second query module is used for querying whether a preset user white list comprises the second attribute information;
the third generating module is further configured to generate authentication success information if the second querying module queries that a preset user white list includes the second attribute information; and if the preset user white list does not comprise the second attribute information, the second query module generates authentication failure information.
In another aspect, an embodiment of the present specification provides an information processing system based on a near field communication signal, including:
the user terminal is used for generating and displaying the identification code; if the identification code is monitored, generating a near field communication signal, wherein the near field communication signal comprises first attribute information and identification information of the identification code; transmitting the close range communication signal;
the target client is used for scanning the identification code displayed by the user terminal to acquire the identification information of the identification code; receiving a near field communication signal sent by a user terminal; analyzing the first attribute information and the identification information from the near field communication signal; sending the identification information and the authentication request information to a server, wherein the authentication request information comprises the first attribute information and the identification information;
the server is used for acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information and acquiring first attribute information from authentication request information comprising the scanned identification information; comparing whether the acquired first attribute information and the acquired second attribute information are consistent; if the obtained first attribute information and the obtained second attribute information are consistent, authentication success information is generated; and if the obtained first attribute information and the obtained second attribute information are not consistent, generating authentication failure information.
On the other hand, the embodiment of the present specification provides a storage medium including a stored program, wherein when the program runs, a device in which the storage medium is located is controlled to execute the information processing method based on the near field communication signal.
On the other hand, the embodiment of the present specification provides a storage medium including a stored program, wherein when the program runs, a device in which the storage medium is located is controlled to execute the information processing method based on the near field communication signal.
On the other hand, the embodiment of the present specification provides a storage medium including a stored program, wherein when the program runs, a device in which the storage medium is located is controlled to execute the information processing method based on the near field communication signal.
In another aspect, the present specification provides a user terminal, including a memory for storing information including program instructions and a processor for controlling execution of the program instructions, wherein the program instructions are loaded and executed by the processor to implement the steps of the information processing method based on near field communication signals.
In another aspect, the present specification provides a target client, including a memory for storing information including program instructions and a processor for controlling execution of the program instructions, wherein the program instructions are loaded and executed by the processor to implement the steps of the information processing method based on near field communication signals.
In another aspect, embodiments of the present specification provide a server, including a memory for storing information including program instructions and a processor for controlling execution of the program instructions, wherein the program instructions are loaded by the processor and executed to implement the steps of the information processing method for near field communication signals.
In the technical solution provided in this specification, if the user terminal sends a near field communication signal when monitoring the identification code, the target client parses the first attribute information and the identification information from the received near field communication signal, and sends the authentication request information including the parsed first attribute information and the identification information and the scanned identification information to the server, and the server obtains the second attribute information according to the scanned identification information, obtains the first attribute information from the authentication request information including the scanned identification information, and realizes the security authentication in the offline operation process by comparing whether the second attribute information is consistent with the obtained first attribute information, thereby reducing the risk of offline operation and improving the security of offline operation.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without any creative effort.
FIG. 1 is a block diagram of an embodiment of the present disclosure;
fig. 2 is a flowchart of an information processing method based on a near field communication signal according to an embodiment of the present disclosure;
fig. 3 is a flowchart of another information processing method based on a near field communication signal according to an embodiment of the present disclosure;
fig. 4 is a flowchart of another information processing method based on a near field communication signal according to an embodiment of the present disclosure;
fig. 5 is a flowchart of another information processing method based on a near field communication signal according to an embodiment of the present disclosure;
FIG. 6 is a flowchart of another method for processing information based on close range communication signals according to an embodiment of the present disclosure;
fig. 7 is a flowchart of another information processing method based on a near field communication signal according to an embodiment of the present disclosure;
FIG. 8 is a schematic diagram illustrating an application of the information processing method of FIG. 7;
fig. 9 is a schematic structural diagram of an information processing apparatus based on a near field communication signal according to an embodiment of the present specification;
FIG. 10 is a schematic structural diagram of another information processing apparatus based on short-range communication signals according to an embodiment of the present disclosure;
fig. 11 is a schematic structural diagram of another information processing apparatus based on a near field communication signal according to an embodiment of the present disclosure;
fig. 12 is a schematic diagram of a user terminal provided in an embodiment of the present specification;
fig. 13 is a schematic diagram of a target client provided in an embodiment of the present specification;
fig. 14 is a schematic diagram of a server provided in an embodiment of the present specification.
[ detailed description ] embodiments
For better understanding of the technical solutions in the present specification, the following detailed description of the embodiments of the present specification is provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only a few embodiments of the present specification, and not all embodiments. All other embodiments obtained by a person skilled in the art based on the embodiments in the present specification without any inventive step are within the scope of the present specification.
The terminology used in the embodiments of the specification is for the purpose of describing particular embodiments only and is not intended to be limiting of the specification. As used in the specification examples and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of associative relationship that describes an associated object, meaning that three types of relationships may exist, e.g., A and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Fig. 1 is a schematic structural framework diagram of an information processing system based on near field communication signals in an embodiment of the present specification, and as shown in fig. 1, the system may include a user terminal, a target client, and a server. For example: the user terminal may comprise a mobile phone, a tablet computer, a notebook computer or a wearable device. The target client may include a point of sale (POS) machine, a mobile phone, a tablet computer, a notebook computer, or a desktop computer. As an alternative, the target client uses a POS, and the POS has a higher recognition of code scanning than other types of clients.
As shown in fig. 1, a signal output module is provided in the user terminal, and correspondingly, a signal receiving module is provided in the target client. In the embodiment of the present specification, the signal output module in the user terminal is configured to output the near field communication signal, and the signal receiving module in the target client is configured to receive the near field communication signal output by the signal output module of the user terminal.
In the embodiments of the present disclosure, the Near Field Communication signal includes an acoustic wave signal, a bluetooth signal, an infrared signal, or a Near Field Communication (NFC) signal.
As shown in fig. 1, when the close range communication signal includes a sound wave signal, the signal output module may be an audio output module, for example: the audio output module may include a speaker. Generally, the user terminal is provided with the audio output module, so that when the scheme of the embodiment of the specification is realized, the signal output module can be directly the original audio output module in the user terminal, and the audio output module does not need to be additionally arranged or modified in the user terminal, so that the equipment cost is reduced; if the user terminal is not provided with the functional module of the audio output module, the user terminal needs to be additionally provided with the audio output module to realize the scheme of the embodiment of the specification. The signal receiving module may be an audio receiving module, if the target client is not provided with the functional module of the audio receiving module, an audio receiving device needs to be added in the target client to implement the solution of the embodiment of the present specification, and if the target client is provided with the functional module of the audio receiving module, the original audio receiving module in the target client may be directly adopted, for example: the audio receiving module may include a microphone.
As shown in fig. 1, when the near field communication signal includes a bluetooth signal, both the signal output module and the signal receiving module are bluetooth communication modules.
As shown in fig. 1, when the near field communication signal includes an infrared signal, both the signal output module and the signal receiving module are infrared communication modules.
As shown in fig. 1, when the near field communication signal includes an NFC signal, both the signal output module and the signal receiving module are NFC modules.
In practical applications, the near field communication signal may also be other communication signals, and accordingly, the signal output module and the signal receiving module may also be other communication modules, which are not listed here.
Based on the devices in the system shown in fig. 1, an embodiment of the present specification provides an information processing method based on a near field communication signal, and when a user terminal performs an offline scene operation with a target client, secure authentication of the offline operation can be achieved through information in the near field communication signal sent to the target client by the user terminal, so that a risk of the offline operation is reduced, and security of the offline operation is improved.
Fig. 2 is a flowchart of an information processing method based on a near field communication signal according to an embodiment of the present disclosure. The information processing method shown in fig. 2 is executed in the user terminal shown in fig. 1, and as shown in fig. 2, the method includes:
and 102, generating and displaying the identification code.
And 104, if the identification code is monitored, generating a near field communication signal, wherein the near field communication signal comprises the first attribute information and the identification information of the identification code.
Step 106, transmitting the near field communication signal.
In an embodiment of the present specification, the identification code includes a two-dimensional code or a one-dimensional code. The identification information includes a bar code value. If the identification code comprises a two-dimensional code, the bar code value comprises a two-dimensional code value; if the identification code comprises a one-dimensional code, the barcode value comprises a one-dimensional code value. The solution of the embodiments of the present description may be applied to the field of offline transactions, and the identification code may include a payment code or a verification and cancellation code, for example: the payment operation or the verification operation is realized by displaying the identification code on the user terminal.
In this embodiment, in step 102, when the user needs to display the identification code on the user terminal, the user may input an identification code generation operation to the user terminal, for example, a "payment button" may be clicked on the user terminal to input the identification code generation operation, and the user terminal may generate the identification code according to the input identification code generation operation. Since the identification code is usually presented in the form of a page, the user terminal usually generates a page including the identification code to realize the generation of the identification code.
In this embodiment, in step 102, the identification code may be displayed on the user terminal in the form of a page. And the user terminal displays the page where the identification code is located so as to display the identification code to the target client. The page where the identification code is located can comprise a two-dimensional code and/or a one-dimensional code. For example, if the page where the identification code is located includes a two-dimensional code and a one-dimensional code, the one-dimensional code may be set on the upper half of the page, and the two-dimensional code may be set on the lower half of the page. Although the two-dimensional code and the one-dimensional code in the page are two different identification codes, the two-dimensional code and the one-dimensional code may include the same information.
In this embodiment, the first attribute information may include user identification information and/or device identification information. The user identification information can uniquely identify a user account, and can be a user ID (identity); the device identification information may be information uniquely identifying the device, and the device identification information may be a device ID.
In this embodiment of the present specification, in step 104, the user terminal may monitor the identification code, and when the identification code is monitored, it indicates that the user needs to perform offline transaction through the identification code, and at this time, may trigger generation of the near field communication signal, so as to implement an authentication process through each information in the near field communication signal. Further, the close range communication signal may include first time information, the first time information being a time recorded when the close range communication signal is generated by the user terminal.
In the embodiment of the specification, when the target client needs to scan the identification code, the user terminal generates and displays the identification code, so that the target client can scan the identification code displayed by the user terminal; at this time, when the user terminal generates the identification code, the user terminal can monitor the identification code, that is, the user terminal monitors the generated identification code. In the embodiment of the specification, the near field communication signal is generated and sent when the identification code is monitored, so that the CPU consumption of the user terminal is reduced, and the electric quantity of the user terminal is saved.
In this embodiment of the present disclosure, if the near field communication signal includes the first attribute information and the identification information of the identification code, the generating the near field communication signal in step 104 may specifically include: and generating a near field communication signal according to the first attribute information and the identification information of the identification code. Taking the near field communication signal as an example, the step 104 may include: and coding the second attribute information and the identification information of the identification code according to the sound wave coding rule to generate a sound wave signal.
In this embodiment of the present specification, as an alternative, if the near field communication signal includes the first attribute information and the identification information of the identification code, the generating the near field communication signal in step 104 may specifically include: encrypting the first attribute information and the identification information of the identification code; and generating a near field communication signal according to the encrypted second attribute information and the identification information of the identification code. Taking the near field communication signal as an example, the step 104 may include: and coding the encrypted first attribute information and the identification information of the identification code according to a sound wave coding rule to generate a sound wave signal. In the scheme, the first attribute information and the identification information of the identification code are encrypted, and the first attribute information and the identification information of the identification code are transmitted in a ciphertext mode in the data transmission process, so that the safety of data transmission is improved.
In this embodiment, if the near field communication signal includes the first attribute information, the identification information of the identification code, and the first time information, step 104 may include: and generating a near field communication signal according to the second attribute information, the identification information of the identification code and the first time information. Taking the near field communication signal as an example, the step 104 may include: and coding the first attribute information, the identification information of the identification code and the first time information according to the sound wave coding rule to generate a sound wave signal.
In this embodiment of the present specification, as an alternative, if the near field communication signal includes the first attribute information, the identification information of the identification code, and the first time information, the generating of the near field communication signal in step 104 may specifically include: encrypting the first attribute information and the first time information; and generating a near field communication signal according to the encrypted first attribute information, the identification information of the identification code and the first time information. Taking the near field communication signal as an example, the step 104 may include: and coding the encrypted first attribute information, the identification information of the identification code and the first time information according to a sound wave coding rule to generate a sound wave signal. In the scheme, the first attribute information, the identification information of the identification code and the first time information are encrypted, and the first attribute information, the identification information of the identification code and the first time information are transmitted in a ciphertext mode in the data transmission process, so that the safety of data transmission is improved.
In the above scheme, a symmetric encryption algorithm or an asymmetric encryption algorithm may be used to encrypt the first attribute information and the identification information of the identification code, or a symmetric encryption algorithm or an asymmetric encryption algorithm may be used to encrypt the first attribute information, the identification information of the identification code, and the first time information. For example: when the symmetric encryption algorithm is adopted to encrypt the first attribute information and the identification information of the identification code, the encryption key can be used for encrypting the first attribute information and the identification information of the identification code; another example is: when the first attribute information and the identification information of the identification code are encrypted by adopting a non-encryption algorithm, the first attribute information and the identification information of the identification code can be encrypted by a public key. When the user terminal logs in the server, the user terminal can obtain the encryption key or the public key from the server.
In this embodiment, if the sound wave signal includes a sub-ultrasonic wave signal or an ultrasonic wave signal, step 104 may further include: the frequency of the sound wave signal is set to be a set frequency, so that the sound wave signal comprises a sub-ultrasonic wave signal or an ultrasonic wave signal, wherein the set frequency of the sub-ultrasonic wave signal can be greater than or equal to 16KHz and less than 20KHz, and the set frequency of the ultrasonic wave signal can be greater than 20 KHz. As an alternative, the frequency is set to 18 KHz. The human ear can not hear the sound wave signal and the noise interference of the sound wave signal of the wave band is less. Particularly, when the sound wave signal with the set frequency of 18KHz is adopted, the noise of the site where the on-line operation is carried out can not be heard by human ears, and the interference of the noise on the sound wave signal of the wave band can be further avoided.
In this embodiment, the user terminal may continuously monitor the identification code, and stop sending the near field communication signal if it is monitored that the page where the identification code is located is closed.
In this embodiment of the present specification, as an alternative, if the near field communication signal includes a sound wave signal, in step 106, the audio output module of the user terminal plays the sound wave signal to implement sending the sound wave signal, so that the target client can receive the sound wave signal.
In the technical solution of the information processing method provided in the embodiment of the present specification, if the identification code is monitored, the near field communication signal is generated and sent, so that the security authentication in the offline operation process can be realized through the information in the near field communication signal, the risk of offline operation is reduced, and the security of offline operation is improved.
Fig. 3 is a flowchart of another information processing method based on a near field communication signal according to an embodiment of the present disclosure. The information processing method shown in fig. 3 is executed on the target client in fig. 1, and as shown in fig. 3, the method includes:
step 202, scanning the bar code displayed by the user terminal to obtain the identification information of the identification code.
And 204, receiving a near field communication signal sent by the user terminal, wherein the near field communication signal comprises the first attribute information and the identification information of the identification code.
And step 206, analyzing the first attribute information and the identification information from the near field communication signal.
And step 208, sending the authentication request information and the scanned identification information to the server, wherein the authentication request information comprises the analyzed first attribute information and the analyzed identification information.
In this embodiment of the present specification, in step 202, if the page of the identifier displayed by the user terminal only includes the two-dimensional code, the target client directly scans the two-dimensional code, so as to scan the identifier displayed by the user terminal; if the page of the identification code displayed by the user terminal only comprises a one-dimensional code, the target client directly scans the one-dimensional code so as to scan the identification code displayed by the user terminal; if the page of the identification code displayed by the user terminal comprises the two-dimensional code and the one-dimensional code, the target client can scan the two-dimensional code or the one-dimensional code so as to scan the identification code displayed by the user terminal.
In this embodiment of the specification, the target client may scan the identification code through the scanning module to obtain the identification information of the identification code, where the identification information of the identification code includes a barcode value, that is, the target client may obtain the barcode value by scanning the identification code, and the barcode value may be used to determine the user identification information, and then the barcode value corresponds to the user identification information.
Wherein, the scanning module can include and sweep yard rifle or camera.
In this embodiment, as an alternative, if the near field communication signal includes a sound wave signal, in step 204, the audio receiving module of the target client receives the sound wave signal. Because the frequency of the sound wave signal is the set frequency, the target client can extract the sound wave signal with the set frequency from the received sound wave signals with different frequencies so as to receive the near field communication signal. The sound wave signals with different frequencies comprise sound wave signals with set frequencies and noise signals of an operation site.
In this embodiment of the present specification, after step 202, the method further includes:
step 203a, monitoring whether a near field communication signal is received in a set time period, wherein the starting time point of the set time period is the time point of starting scanning the identification code displayed by the user terminal, and if so, executing step 206; if not, go to step 203 b.
When the target client starts to scan the identification code displayed by the user terminal, the signal receiving module starts to monitor whether the signal receiving module receives the near field communication signal within a set time period.
In the embodiment of the present specification, the set time period is a time waiting for receiving the near field communication signal transmitted by the user terminal, and the set time period may be set as needed, for example: the set period of time may comprise 5 s.
Step 203b, sending the scanned identification information to a server.
If the short-distance communication signal is monitored not to be received within the set time period, the target client is determined not to receive the short-distance communication signal sent by the user terminal, and at the moment, the scanned identification information can be sent to the server. For example, the reason why the short-range communication signal is not received is as follows: the signal output module of the user terminal is damaged or the signal interference of the near field communication signal exists.
In this embodiment of the present disclosure, if the near field communication signal includes the first attribute information and the identification information of the identification code, taking the near field communication signal includes an acoustic wave signal as an example, step 206 may include: and decoding the near field communication signal according to the sound wave decoding rule to generate first attribute information and identification information of the identification code so as to analyze the first attribute information and the identification information of the identification code from the sound wave signal. The first attribute information and the identification information may include plaintext information or ciphertext information, and when the first attribute information and the identification information include ciphertext information, the encrypted first attribute information and the encrypted identification information are generated after decoding.
In this embodiment of the present description, if the near field communication signal includes the first attribute information, the identification information of the identification code, and the first time information, the step 206 is executed and the first time information is analyzed from the near field communication signal, that is: the first attribute information, the identification information of the identification code and the first time information are analyzed from the near field communication signal. Taking the near field communication signal as an example, the step 206 may include: and decoding the near field communication signal according to the sound wave decoding rule to generate first attribute information, identification information of the identification code and first time information so as to analyze the first attribute information, the identification information of the identification code and the first time information from the sound wave signal. The first attribute information, the identification information of the identification code and the first time information may include plaintext information or ciphertext information, and when the first attribute information, the identification information of the identification code and the first time information include ciphertext information, the encrypted first attribute information, the identification information of the identification code and the first time information are generated after decoding.
In this embodiment, if the near field communication signal includes the first attribute information, in step 208, when the first attribute information and the identification information of the identification code include the ciphertext information, the encrypted first attribute information and the identification information of the identification code are included in the authentication request information.
In this embodiment, if the near field communication signal includes the first attribute information, the identification information of the identification code, and the first time information, in step 208, when the first attribute information, the identification information of the identification code, and the first time information include the ciphertext information, the encrypted first attribute information, the identification information of the identification code, and the first time information are included in the authentication request information.
In the technical solution of the information processing method provided in the embodiment of the present specification, the first attribute information and the identification information are analyzed from the near field communication signal, and the scanned identification information and the authentication request information including the analyzed first attribute information and the analyzed identification information are sent to the server, so that the security authentication in the offline operation process can be realized through the information in the received near field communication signal, the risk of offline operation is reduced, and the security of offline operation is improved.
Fig. 4 is a flowchart of another information processing method based on a near field communication signal according to an embodiment of the present disclosure. The information processing method shown in fig. 4 is executed in the server in fig. 1, and as shown in fig. 4, the method includes:
step 302, receiving authentication request information sent by a target client and scanned identification information, where the authentication request information includes first attribute information and identification information.
In this embodiment of the present specification, the first attribute information and the identification information in the authentication request information are obtained by analyzing, by the target client, from the received near field communication signal.
In this embodiment of this specification, if the first attribute information and the identification information in the authentication request information are encrypted first attribute information and identification information, in other words, when the authentication request information includes the encrypted first attribute information and identification information, the method further includes: and decrypting the encrypted first attribute information and the encrypted identification information to obtain the first attribute information and the identification information.
Specifically, if the first attribute information and the identification information are encrypted through a symmetric encryption algorithm, the encrypted first attribute information and the encrypted identification information can be decrypted through an encryption key to obtain the first attribute information and the identification information; if the first attribute information and the identification information are encrypted through the asymmetric encryption algorithm, the encrypted first attribute information and the encrypted identification information can be decrypted through the private key to obtain the first attribute information and the identification information.
In the embodiment of the present specification, if the encrypted first attribute information and the encrypted identification information are decrypted successfully, the first attribute information and the identification information are obtained; if the encrypted first attribute information and the encrypted identification information are not decrypted, step 310 is executed.
Step 304, obtaining second attribute information corresponding to the scanned identification information according to the scanned identification information, and obtaining first attribute information from the authentication request information including the scanned identification information.
In this embodiment, the second attribute information and the first attribute information may include the same type of information, for example: the second attribute information includes user identification information and/or device identification information.
In this embodiment of the present specification, when the user registers in the server, the server may obtain and store the second attribute information of the user. For example: the server may store user identification information and device identification information. The user identification information can be used for uniquely identifying the user account, namely the user identification information is the information for uniquely identifying the user account; the device identification information may be used to identify the user terminal, i.e. the device identification information is information that uniquely identifies the device. The device identification information may include identification information of a device bound with the user identification information, that is, the user identification information corresponds to the device identification information.
In the embodiment of the present specification, the scanned identification information may include a barcode value. Because the bar code value corresponds to the user identification information, the server acquires the bar code value, and then the corresponding unique user identification information can be acquired. Namely: the server obtains the barcode value, i.e. is able to determine a unique user account.
As an alternative, the user identification information corresponding to the barcode value is obtained according to the scanned barcode value, and the obtained user identification information is used as the second attribute information, so that the second attribute information corresponding to the scanned identification information is obtained according to the scanned identification information, and at this time, the second attribute information includes the user identification information.
As another alternative, the user identification information corresponding to the barcode value is acquired according to the scanned barcode value, the device identification information corresponding to the user identification information is queried according to the acquired user identification information, and the device identification information is used as the second attribute information, so that the second attribute information corresponding to the scanned identification information is acquired according to the scanned identification information, and at this time, the second attribute information includes the device identification information.
As another alternative, the user identification information corresponding to the barcode value is obtained according to the scanned barcode value, the device identification information corresponding to the user identification information is queried according to the obtained user identification information, and the user identification information and the device identification information are used as second attribute information, so that the second attribute information corresponding to the scanned identification information is obtained according to the scanned identification information, and at this time, the second attribute information includes the user identification information and the device identification information.
In this embodiment, if the server receives a plurality of authentication request information, it is necessary to find the authentication request information including the scanned identification information from the plurality of authentication request information according to the scanned identification information, and then extract the first attribute information from the authentication request information including the scanned identification information.
Step 306, comparing whether the first attribute information and the second attribute information are consistent, if yes, executing step 308; if not, go to step 310.
For example: the first attribute information includes user identification information, and the second attribute information includes user identification information, then step 306 specifically includes: and comparing whether the user identification information of the first attribute information is consistent with the user identification information of the second attribute information.
Another example is: the first attribute information includes device identification information, and the second attribute information includes device identification information, then step 306 specifically includes: and comparing whether the equipment identification information of the first attribute information is consistent with the equipment identification information of the second attribute information.
Another example is: the first attribute information includes user identification information and device identification information, and the second attribute information includes user identification information and device identification information, then step 306 specifically includes: comparing whether the user identification information of the first attribute information and the user identification information of the second attribute information are consistent and comparing whether the device identification information of the second attribute information and the device identification information of the second attribute information are consistent.
In this step, if the first attribute information and the second attribute information are compared to be consistent, it indicates that the user terminal and the target client perform offline transaction operation within a certain distance range, and indicates that the user identified by the second attribute information and the user identified by the first attribute information in the close-range communication signal are the same user, and/or indicates that the user terminal generating the identification code and the user terminal sending the close-range communication signal are the same terminal device, thereby avoiding the risk problems that a wool party performs offline scene payment remotely to obtain a high-volume marketing subsidy, and a fraud molecule cheats to obtain the identification code and performs offline transaction and other mobile payments by using the cheated identification code, and thus indicating that the authentication is successful.
In this step, if the first attribute information and the second attribute information are not consistent, it indicates that the user identified by the second attribute information is not the same user as the user identified by the first attribute information in the close-range communication signal, and/or that the user terminal generating the identification code and the user terminal sending the close-range communication signal are not the same terminal device, and in this case, it is unavoidable that a wool party performs offline scene payment to obtain a high-volume marketing subsidy through remote operation, and that a fraud molecule cheats to obtain the identification code and performs offline transaction using the cheated identification code, thereby indicating that the authentication fails.
And step 308, generating authentication success information.
Step 310, authentication failure information is generated.
In the technical solution of the information processing method provided in the embodiment of the present specification, the second attribute information is obtained according to the scanned identification information, the first attribute information is obtained from the authentication request information including the scanned identification information, and the security authentication in the offline operation process is implemented by comparing whether the second attribute information is consistent with the obtained first attribute information, so that the risk of offline operation is reduced, and the security of offline operation is improved.
Fig. 5 is a flowchart of another information processing method based on a near field communication signal according to an embodiment of the present disclosure. The information processing method shown in fig. 5 is executed in the server in fig. 1, and as shown in fig. 5, the method includes:
step 402, receiving authentication request information and scanned identification information sent by a target client, where the authentication request information includes first attribute information, identification information, and first time information.
Step 404, obtaining second attribute information corresponding to the scanned identification information according to the scanned identification information, and obtaining first attribute information and first time information from the authentication request information including the scanned identification information.
In this embodiment, the specific description of step 404 may refer to the specific description of step 304.
Step 406, comparing whether the first attribute information and the second attribute information are consistent, if yes, executing step 408; if not, go to step 412.
In this embodiment of this specification, if the first attribute information, the identification information, and the first time information in the authentication request information are the encrypted first attribute information, the encrypted identification information, and the encrypted first time information, in other words, if the authentication request information includes the encrypted first attribute information, the encrypted identification information, and the encrypted first time information, before executing step 404, the method further includes: and decrypting the encrypted first attribute information, the encrypted identification information and the encrypted first time information to obtain the first attribute information, the encrypted identification information and the encrypted first time information.
Specifically, if the first attribute information, the identification information and the first time information are encrypted through a symmetric encryption algorithm, the encrypted first attribute information, the encrypted identification information and the encrypted first time information can be decrypted through an encryption key to obtain the first attribute information, the encrypted identification information and the encrypted first time information; if the first attribute information, the identification information and the first time information are encrypted through the asymmetric encryption algorithm, the encrypted first attribute information, the encrypted identification information and the encrypted first time information can be decrypted through the private key to obtain the first attribute information, the encrypted identification information and the encrypted first time information.
In the embodiment of the present specification, if the encrypted first attribute information, the encrypted identification information, and the encrypted first time information are decrypted successfully, the first attribute information, the encrypted identification information, and the first time information are obtained; if the decryption of the encrypted first attribute information, the encrypted identification information, and the encrypted first time information fails, step 412 is executed.
Step 408, judging whether the time difference value between the current second time information and the first time information is less than or equal to a set time threshold value, if so, executing step 410; if not, go to step 412.
In this embodiment of the present specification, the second time information is the current system time recorded by the server. For example, the set time threshold may be 3 s. In practical application, the time threshold can be set as required, for example: the set time threshold may be increased appropriately in consideration of the network transmission delay.
In this step, if the time difference between the second time information and the first time information is judged to be less than or equal to the set time threshold, the authentication can be determined to be successful, and the risk problem of mobile payment is further avoided, so that the terminal for performing the offline transaction is further ensured to be a user terminal for generating the barcode information and sending the near field communication signal.
And step 410, generating authentication success information.
Step 412, authentication failure information is generated.
In this embodiment of the present specification, further, the target client analyzes the first time information from the near field communication signal, and the server determines whether a time difference between the current second time information and the first time information is less than or equal to a set time threshold, so as to implement further security authentication in the offline operation process, thereby further reducing the risk of offline operation and further improving the security of offline operation.
Fig. 6 is a flowchart of another information processing method based on a near field communication signal according to an embodiment of the present disclosure. The information processing method shown in fig. 6 is executed in the server in fig. 1, and as shown in fig. 6, the method includes:
step 502, inquiring whether authentication request information and scanned identification information sent by a target client are received, wherein the authentication request information comprises first attribute information, identification information and first time information, and if the authentication request information and the scanned identification information are received, executing step 504; if the scanned identification information is received and the authentication request information is not received, step 510 is executed.
Step 504, obtaining the second attribute information according to the scanned identification information, and obtaining the first attribute information and the first time information from the authentication request information including the scanned identification information.
In this embodiment, the detailed description of step 504 may refer to the detailed description of step 304.
Step 506, comparing whether the first attribute information and the second attribute information are consistent, if yes, executing step 508; if not, go to step 516.
The description of step 506 can refer to step 406, and is not repeated here.
Step 508, determining whether the time difference between the current second time information and the first time information is less than or equal to a set time threshold, if yes, executing step 514; if not, go to step 516.
The description of step 508 can refer to step 408, and is not repeated here.
And step 510, acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information.
In this embodiment, the detailed description of step 510 may refer to the detailed description of step 304.
Step 512, inquiring whether a preset user white list comprises second attribute information, if so, executing step 514; if not, go to step 516.
In this embodiment, before step 512, the method further includes: and setting a user white list, collecting attribute information of the user terminal which meets the adding condition, and adding the attribute information of the user terminal into the user white list.
Specifically, the acquiring of the attribute information of the user terminal meeting the adding condition specifically includes:
in the process of executing the information processing method at least once before executing the information processing method based on the near field communication signal, if the server inquires that the identification information is received and the authentication request information is not received, the position information of the user terminal is obtained; judging whether the position information of the user terminal is located in a set position range of the target client, wherein the set position range of the target client can comprise a position set which takes the target client as a central position and is within a certain distance from the central position; and if the position information is judged to be positioned in the set position range of the target client, determining that the user terminal meets the adding condition and acquiring the attribute information of the user terminal. For example, the server may obtain the location information of the user terminal through a bluetooth positioning technology, a WIFI positioning technology, or a base station positioning technology. In the process of acquiring the position information of the user terminal by the technology, the acquired information can be subjected to offline data cleaning, and then the position information of the user terminal is calculated according to the information after the offline data cleaning. This indicates that although the user terminal cannot complete the authentication process through the near field communication signal, the user terminal is indeed near the target client, which ensures the security of the offline operation of the user terminal, and therefore, if it is determined that the user terminal meets the addition condition one or more times, the attribute information of the user terminal can be added to the user white list. The attribute information of the user terminal may include user identification information and/or device identification information.
And step 514, generating authentication success information.
Step 516, authentication failure information is generated.
It should be noted that: in the embodiments shown in fig. 4, 5 and 6, if it is found that the barcode information is not received and the authentication request information is not received, the process ends; if the identification information is not received and the authentication request information is received, the process is ended.
In the technical solution of the information processing method provided in the embodiment of the present specification, the second attribute information is obtained according to the scanned identification information, the first attribute information is obtained from the authentication request information including the scanned identification information, and the security authentication in the offline operation process is implemented by comparing whether the second attribute information is consistent with the obtained first attribute information, so that the risk of offline operation is reduced, and the security of offline operation is improved. Further, by judging whether the time difference value between the current second time information and the first time information is smaller than or equal to the set time threshold value, further safety certification in the offline operation process is achieved, the offline operation risk is further reduced, and the offline operation safety is further improved. In the embodiment of the present specification, if it is found that the received identification information is queried and the authentication request information is not received, the security authentication process can be completed by querying whether the preset user white list includes the second attribute information, so that the security authentication is completed without receiving the authentication request information, the risk of offline operation is further reduced, and the security of offline operation is further improved.
The embodiment of the specification also provides an information processing method based on the near field communication signal, which is applied to the field of transaction. Fig. 7 is a flowchart of another information processing method based on near field communication signals according to an embodiment of the present disclosure, and fig. 8 is an application diagram of the information processing method in fig. 7, as shown in fig. 7 and fig. 8, the method includes:
step 602, the user terminal generates and displays the identification code.
When a user purchases commodities at a merchant and pays in a mobile payment mode, the user serves as a payer and can click a 'payment button' on a user terminal so that the user terminal can generate and display an identification code.
Step 604, if the user terminal monitors the identification code, a near field communication signal is generated, where the near field communication signal includes the first attribute information, the identification information of the identification code, and the first time information.
In this embodiment, the identification information of the identification code includes a bar code value.
Step 606, the user terminal transmits the near field communication signal.
Step 608, the target client scans the identification code displayed by the user terminal to obtain the identification information.
When a user purchases a commodity at a merchant, a staff of the merchant inputs a transaction amount at a target client, and scans an identification code displayed by a user terminal through a scanning module of the target client to obtain a barcode value. Further, the target client may also scan the identification code to obtain the payment channel information, for example: the payment channel information may include information of the payment treasure channel, and the information of the payment treasure channel may include an address of the server.
Step 610, the target client receives the near field communication signal.
Step 612, the target client analyzes the first attribute information, the identification information and the first time information from the near field communication signal.
Step 614, the target client sends the scanned identification information, transaction amount and authentication request information to the server, where the authentication request information includes the first attribute information, the identification information and the first time information.
For example, the target client may send the scanned barcode value, the transaction amount, and the authentication request information to a server corresponding to the payment channel information according to the payment channel information. Meanwhile, the target client also sends the merchant identification information to the server.
Step 616, the server obtains the second attribute information corresponding to the scanned identification information according to the scanned identification information, and obtains the first attribute information from the authentication request information including the scanned identification information.
Step 618, the server compares that the first attribute information is consistent with the second attribute information, and then step 620 is executed.
And if the server compares that the first attribute information is inconsistent with the second attribute information, generating authentication failure information. The server refuses to execute the transaction and respectively informs the target client and the user terminal of the failure of the transaction.
In step 620, the server determines that the time difference between the current second time information and the first time information is less than or equal to the set time threshold, and then executes step 622.
And if the server judges that the time difference value between the current second time information and the first time information is greater than the set time threshold, generating authentication failure information. The server refuses to execute the transaction and respectively informs the target client and the user terminal of the failure of the transaction.
Step 622, the server generates authentication success information.
And step 624, the server completes the transaction according to the identification information and the transaction amount.
Specifically, the server acquires user identification information according to the bar code value, completes the transaction according to the user identification information, the acquired merchant identification information and the transaction amount, and respectively informs the target client and the user terminal of the completion of the transaction.
Fig. 9 is a schematic structural diagram of an information processing apparatus based on a near field communication signal according to an embodiment of the present specification, where the information processing apparatus in fig. 9 is applicable to a user terminal, and as shown in fig. 9, the apparatus includes: the display device comprises a first generation module 11, a display module 12, a first monitoring module 13, a second generation module 14 and a signal output module 15.
The first generating module 11 is used for generating an identification code.
The display module 12 is used for displaying the identification code.
The first monitoring module 13 is configured to monitor the identification code.
The second generating module 14 is configured to generate a near field communication signal if the first monitoring module 13 monitors the identification code, where the near field communication signal includes the first attribute information and the identification information of the identification code.
The signal output module 15 is used for sending the near field communication signal.
Further, the close range communication signal further includes first time information. The first generating module 11 specifically includes: an encryption sub-module 111 and a generation sub-module 112.
The encryption sub-module 111 is configured to perform encryption processing on the identification information, the first attribute information, and the first time information.
The generating sub-module 112 is configured to generate the near field communication signal according to the encrypted identification information, the first attribute information, and the first time information.
Further, the signal output module 15 is further configured to stop sending the near field communication signal if the first monitoring module 13 monitors that the page where the identification code is located is closed.
In the technical solution of the information processing apparatus provided in the embodiment of the present specification, if the identification code is monitored, the near field communication signal is generated and sent, so that security authentication in an offline operation process can be achieved through information in the near field communication signal sent to the target client, a risk of offline operation is reduced, and security of offline operation is improved.
Fig. 10 is a schematic structural diagram of another information processing apparatus based on a near field communication signal according to an embodiment of the present disclosure, where the information processing apparatus in fig. 10 is applicable to a target client, as shown in fig. 10, the apparatus includes: a scanning module 21, a signal receiving module 22, an analysis module 23 and a sending module 24.
The scanning module 21 is configured to scan the identification code displayed by the user terminal to obtain the identification information of the identification code.
The signal receiving module 22 is configured to receive a near field communication signal sent by a user terminal, where the near field communication signal includes first attribute information and identification information.
The parsing module 23 is configured to parse the first attribute information and the identification information from the near field communication signal.
The sending module 24 is configured to send the identification information and the authentication request information to a server.
Further, the authentication request information further includes first time information. The parsing module 23 is further configured to parse the first attribute information and the identification information from the near field communication signal, and parse the first time information from the near field communication signal.
Further, the apparatus further comprises: a second listening module 25.
The second monitoring module 25 is configured to monitor whether the signal receiving module 22 receives the near field communication signal within a set time period, where a starting time point of the set time period is a time point of starting scanning an identification code displayed by the user terminal; if the short-distance communication signal is received within a set time period, triggering an analysis module 23 to analyze the first attribute information and the identification information from the short-distance communication signal;
the sending module 24 is further configured to send the identification information to the server if the second monitoring module 25 monitors that the near field communication signal is not received within a set time period.
In the technical solution of the information processing apparatus provided in the embodiment of the present specification, the first attribute information and the identification information are analyzed from the near field communication signal, and the scanned identification information and the authentication request information including the first attribute information and the identification information are sent to the server, so that the security authentication in the offline operation process can be implemented through the information in the received near field communication signal, the risk of offline operation is reduced, and the security of offline operation is improved.
Fig. 11 is a schematic structural diagram of another information processing apparatus based on a near field communication signal according to an embodiment of the present disclosure, where the information processing apparatus in fig. 11 is applicable to a server, as shown in fig. 11, the apparatus includes: a receiving module 31, an obtaining module 32, a comparing module 33 and a third generating module 34.
The receiving module 31 is configured to receive identification information and authentication request information sent by a target client, where the authentication request information includes first attribute information and identification information, and the first attribute information and the identification information are obtained by analyzing a received near field communication signal by the target client.
The obtaining module 32 is configured to obtain, according to the scanned identification information, second attribute information corresponding to the scanned identification information, and obtain first attribute information from the authentication request information including the scanned identification information.
The comparing module 33 is configured to compare whether the first attribute information and the second attribute information are consistent.
The third generating module 34 is configured to generate authentication success information if the comparing module 33 compares that the first attribute information is consistent with the second attribute information; if the comparing module 33 compares that the first attribute information and the second attribute information are not consistent, authentication failure information is generated.
Further, the authentication request information further includes first time information. The device still includes: a decision block 35.
The judging module 35 is configured to, if the comparing module 33 compares that the first attribute information and the second attribute information are consistent, judge whether a time difference between the current second time information and the first time information in the authentication request information including the scanned identification information is less than or equal to a set time threshold; and if the time difference is smaller than or equal to the set time threshold, triggering the third generation module 34 to execute the step of generating the authentication success information.
The third generating module 34 is further configured to generate authentication failure information if the determining module 35 determines that the time difference is greater than the set time threshold.
Further, the apparatus further comprises: a decryption module 36.
The decryption module 36 is configured to decrypt the encrypted identification information, the first attribute information, and the first time information to obtain the identification information, the first attribute information, and the first time information.
Further, the apparatus further comprises: a first query module 37 and a second query module 38.
The first query module 37 is configured to query whether the receiving module 31 receives the authentication request information and the scanned identification information.
The obtaining module 32 is further configured to obtain the second attribute information according to the scanned identification information if the first querying module 37 queries that the scanned identification information is received and the authentication request information is not received.
The second query module 38 is configured to query whether a preset user white list includes the second attribute information.
The third generating module 34 is further configured to generate authentication success information if the preset user white list includes the second attribute information, which is queried by the second querying module 38; if the second query module 38 queries that the preset user white list does not include the second attribute information, authentication failure information is generated.
In the technical solution of the information processing apparatus provided in the embodiment of the present specification, the second attribute information is obtained according to the scanned identification information, the first attribute information is obtained from the authentication request information including the scanned identification information, and the security authentication in the offline operation process is implemented by comparing whether the second attribute information and the obtained first attribute information are consistent, so that the risk of offline operation is reduced, and the security of offline operation is improved.
The embodiment of the specification provides an information processing system based on a near field communication signal, and the system comprises a user terminal, a target client and a server as shown in FIG. 1.
The user terminal is used for generating and displaying the identification code; if the identification code is monitored, generating a near field communication signal, wherein the near field communication signal comprises first attribute information and identification information of the identification code; and transmitting the close range communication signal.
The target client is used for scanning the identification code displayed by the user terminal to acquire the identification information of the identification code; receiving a near field communication signal sent by a user terminal; analyzing the first attribute information and the identification information from the near field communication signal; and sending the identification information and the authentication request information to a server, wherein the authentication request information comprises the first attribute information and the identification information.
The server is used for acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information and acquiring first attribute information from authentication request information comprising the scanned identification information; comparing whether the acquired first attribute information and the acquired second attribute information are consistent; if the obtained first attribute information and the obtained second attribute information are consistent, authentication success information is generated; and if the obtained first attribute information and the obtained second attribute information are not consistent, generating authentication failure information.
In the technical scheme of the information processing system provided in the embodiment of the present specification, if the user terminal sends a near field communication signal when monitoring the identification code, the target client parses first attribute information and identification information from the received near field communication signal, and sends authentication request information including the parsed first attribute information and identification information and the scanned identification information to the server, the server obtains second attribute information according to the scanned identification information, obtains first attribute information from the authentication request information including the scanned identification information, and realizes security authentication in an offline operation process by comparing whether the second attribute information is consistent with the obtained first attribute information, thereby reducing risks of offline operation and improving security of offline operation.
The present specification provides a storage medium including a stored program, wherein when the program runs, the device on which the storage medium is located is controlled to execute the steps of the above-mentioned embodiment of the information processing method based on the near field communication signal shown in fig. 2, and the detailed description can refer to the above-mentioned embodiment of the information processing method based on the near field communication signal shown in fig. 2.
The present specification provides another storage medium, which includes a stored program, wherein when the program runs, the apparatus on which the storage medium is located is controlled to execute the steps of the above-mentioned embodiment of the information processing method based on near field communication signals shown in fig. 3, and for specific description, reference may be made to the above-mentioned embodiment of the information processing method based on near field communication signals shown in fig. 3.
Embodiments of the present specification provide another storage medium, where the storage medium includes a stored program, where the apparatus on which the storage medium is located is controlled to execute the steps of the embodiments of the information processing method based on near field communication signals shown in fig. 4 to 6 when the program runs, and for specific description, reference may be made to the embodiments of the information processing method based on near field communication signals shown in fig. 4 to 6.
Embodiments of the present specification provide a user terminal, which includes a memory and a processor, the memory is used for storing information including program instructions, the processor is used for controlling execution of the program instructions, and the program instructions are loaded and executed by the processor to implement the steps of the above-mentioned embodiments of the information processing method based on the near field communication signal.
Fig. 12 is a schematic diagram of a user terminal provided in an embodiment of the present specification. As shown in fig. 12, the user terminal 40 of this embodiment includes: the processor 41, the memory 42, and the computer program 43 stored in the memory 42 and capable of running on the processor 41, where the computer program 43 is executed by the processor 41 to implement the information processing method based on the near field communication signal in the embodiment of fig. 2, and in order to avoid repetition, details are not repeated here. Alternatively, the computer program is executed by the processor 41 to implement the functions of each model/unit in the authentication apparatus based on the short-range communication signal in the embodiment, and for avoiding redundancy, it is not repeated herein.
The user terminal 40 may include, but is not limited to, a processor 41, a memory 42. Those skilled in the art will appreciate that fig. 12 is merely an example of a user terminal 40 and does not constitute a limitation of the user terminal 40 and may include more or less components than those shown, or some components may be combined, or different components, e.g., the user terminal 40 may also include input-output devices, network access devices, buses, etc.
The Processor 41 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 42 may be an internal storage unit of the user terminal 40, such as a hard disk or a memory of the user terminal 40. The memory 42 may also be an external storage device of the user terminal 40, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the user terminal 40. Further, the memory 42 may also include both an internal storage unit of the user terminal 40 and an external storage device. The memory 42 is used for storing computer programs and other programs and data required by the computer device. The memory 42 may also be used to temporarily store data that has been output or is to be output.
Embodiments of the present specification provide a target client, including a memory and a processor, where the memory is used to store information including program instructions, and the processor is used to control execution of the program instructions, and the program instructions are loaded by the processor and executed to implement the steps of the above-mentioned embodiments of the information processing method based on near field communication signals, and specific description may refer to the above-mentioned embodiments of the information processing method based on near field communication signals.
Fig. 13 is a schematic diagram of a target client provided in an embodiment of the present specification. As shown in fig. 13, the target client 50 of this embodiment includes: the processor 51, the memory 52, and the computer program 53 stored in the memory 52 and capable of running on the processor 51, where the computer program 53 is executed by the processor 51 to implement the information processing method based on the near field communication signal in the embodiment of fig. 3, and in order to avoid repetition, details are not repeated herein. Alternatively, the computer program is executed by the processor 51 to implement the functions of each model/unit in the information processing apparatus based on the near field communication signal in the embodiment, and for avoiding redundancy, it is not repeated herein.
Target client 50 may include, but is not limited to, a processor 51, a memory 52. Those skilled in the art will appreciate that fig. 13 is merely an example of a target client 50 and does not constitute a limitation on target client 50 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., target client 50 may also include input-output devices, network access devices, buses, etc.
The Processor 51 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 52 may be an internal storage unit of the target client 50, such as a hard disk or a memory of the target client 50. The memory 52 may also be an external storage device of the target client 50, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the target client 50. Further, memory 52 may also include both internal and external storage units of target client 50. The memory 52 is used to store computer programs and other programs and data required by the computer device. The memory 52 may also be used to temporarily store data that has been output or is to be output.
Embodiments of the present specification provide a server, which includes a memory and a processor, the memory is used for storing information including program instructions, the processor is used for controlling execution of the program instructions, and the program instructions are loaded by the processor and executed to implement the steps of the above-mentioned embodiments of the information processing method based on the near field communication signal, and specific description can refer to the above-mentioned embodiments of the information processing method based on the near field communication signal.
Fig. 14 is a schematic diagram of a server provided in an embodiment of the present specification. As shown in fig. 14, the server 60 of this embodiment includes: the processor 61, the memory 62, and the computer program 63 stored in the memory 62 and capable of running on the processor 61, where the computer program 63 is executed by the processor 61 to implement the information processing method based on the near field communication signal in the embodiment of fig. 4, and in order to avoid repetition, details are not repeated herein. Alternatively, the computer program is executed by the processor 61 to implement the functions of each model/unit in the information processing apparatus based on the near field communication signal in the embodiment, and for avoiding redundancy, it is not repeated herein.
The server 60 may include, but is not limited to, a processor 61, a memory 62. Those skilled in the art will appreciate that fig. 14 is merely an example of a server 60 and is not intended to limit the server 60 and may include more or fewer components than shown, or some components in combination, or different components, e.g., the server 60 may also include input-output devices, network access devices, buses, etc.
The Processor 61 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 62 may be an internal storage unit of the server 60, such as a hard disk or a memory of the server 60. The memory 62 may also be an external storage device of the server 60, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc., provided on the server 60. Further, the memory 62 may also include both internal storage units of the server 60 and external storage devices. The memory 62 is used to store computer programs and other programs and data required by the computer device. The memory 62 may also be used to temporarily store data that has been output or is to be output.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present specification, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present description may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods described in the embodiments of the present disclosure. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (34)

1. An information processing method based on a near field communication signal, comprising:
generating and displaying an identification code;
if the identification code is monitored, generating a near field communication signal, wherein the near field communication signal comprises first attribute information and identification information of the identification code;
and transmitting the close range communication signal.
2. The method of claim 1, the identification information comprising a barcode value.
3. The method of claim 1, the first attribute information comprising user identification information and/or device identification information.
4. The method of claim 1, the close-range communication signal further comprising first time information.
5. The method of claim 4, the generating a close-range communication signal comprising:
encrypting the identification information, the first attribute information and the first time information;
and generating the near field communication signal according to the encrypted identification information, the first attribute information and the first time information.
6. The method of claim 1, further comprising:
and if the page where the identification code is located is monitored to be closed, stopping sending the near field communication signal.
7. The method of claim 1, the close-range communication signal comprising a sonic signal, a Bluetooth signal, an infrared signal, or an NFC signal.
8. The method of claim 1, the close-range communication signal comprising a sonic signal, the sonic signal being a sub-ultrasonic signal or an ultrasonic signal.
9. An information processing method based on a near field communication signal, comprising:
scanning an identification code displayed by a user terminal to acquire identification information of the identification code;
receiving a near field communication signal sent by a user terminal, wherein the near field communication signal comprises first attribute information and identification information of an identification code;
analyzing first attribute information and identification information from the near field communication signal;
and sending authentication request information and the scanned identification information to a server, wherein the authentication request information comprises the analyzed first attribute information and the analyzed identification information.
10. The method of claim 9, the authentication request information further comprising first time information;
the analyzing the first attribute information and the identification information from the near field communication signal further includes:
and analyzing the first time information from the close range communication signal.
11. The method of claim 9, said scanning an identification code presented by the user terminal comprising:
monitoring whether the near field communication signal is received in a set time period, wherein the starting time point of the set time period is the time point of starting scanning the identification code displayed by the user terminal;
if the short-distance communication signal is monitored not to be received within a set time period, the scanned identification information is sent to the server;
and if the short-distance communication signal is received within a set time period, the step of analyzing the first attribute information and the identification information from the short-distance communication signal is executed.
12. An information processing method based on a near field communication signal, comprising:
receiving authentication request information sent by a target client and scanned identification information, wherein the authentication request information comprises first attribute information and identification information, and the first attribute information and the identification information in the authentication request information are obtained by analyzing a received near field communication signal by the target client;
acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information, and acquiring first attribute information from authentication request information including the scanned identification information;
comparing whether the acquired first attribute information and the acquired second attribute information are consistent;
if the obtained first attribute information and the obtained second attribute information are consistent, authentication success information is generated;
and if the obtained first attribute information and the obtained second attribute information are not consistent, generating authentication failure information.
13. The method of claim 12, the second attribute information comprising user identification information and/or device identification information.
14. The method of claim 12, the authentication request information further comprising first time information;
the method further comprises the following steps:
if the obtained first attribute information is consistent with the obtained second attribute information through comparison, judging whether the time difference value of the current second time information and the first time information in the authentication request information comprising the scanned identification information is smaller than or equal to a set time threshold value or not;
if the time difference is judged to be less than or equal to the set time threshold, executing the step of generating authentication success information;
and if the time difference is judged to be larger than the set time threshold, generating authentication failure information.
15. The method of claim 14, after receiving the authentication request information and the scanned identification information sent by the target client, further comprising:
and decrypting the encrypted identification information, the first attribute information and the first time information to obtain the identification information, the first attribute information and the first time information.
16. The method of claim 12, further comprising:
inquiring whether the authentication request information and the scanned identification information are received;
if the scanned identification information is received and the authentication request information is not received, acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information;
inquiring whether a preset user white list comprises the second attribute information or not;
if the preset user white list including the second attribute information is inquired, generating authentication success information;
and if the preset user white list is inquired and does not comprise the second attribute information, generating authentication failure information.
17. An information processing method based on a near field communication signal, comprising:
the user terminal generates and displays the identification code; if the identification code is monitored, generating a near field communication signal, wherein the near field communication signal comprises first attribute information and identification information of the identification code; transmitting the close range communication signal;
the target client scans the identification code displayed by the user terminal to acquire the identification information of the identification code; receiving a near field communication signal sent by a user terminal; analyzing the first attribute information and the identification information from the near field communication signal; sending the identification information and authentication request information to a server, wherein the authentication request information comprises the first attribute information and the identification information;
the server acquires second attribute information corresponding to the scanned identification information according to the scanned identification information, and acquires first attribute information from authentication request information comprising the scanned identification information; comparing whether the acquired first attribute information and the acquired second attribute information are consistent; if the obtained first attribute information and the obtained second attribute information are consistent, authentication success information is generated; and if the obtained first attribute information and the obtained second attribute information are not consistent, generating authentication failure information.
18. An information processing apparatus based on a close proximity communication signal, comprising:
the first generation module is used for generating an identification code;
the display module is used for displaying the identification code;
the first monitoring module is used for monitoring the identification code;
the second generating module is used for generating a near field communication signal if the first monitoring module monitors the identification code, wherein the near field communication signal comprises first attribute information and identification information of the identification code;
and the signal output module is used for sending the near field communication signal.
19. The close-range communication signal-based authentication device of claim 18, the close-range communication signal further comprising first time information;
the first generating module specifically comprises:
the encryption submodule is used for encrypting the identification information, the first attribute information and the first time information;
and the generation submodule is used for generating the near field communication signal according to the encrypted identification information, the second attribute information and the first time information.
20. The authentication apparatus based on short-range communication signal according to claim 18, wherein the signal output module is further configured to stop sending the short-range communication signal if the first monitoring module monitors that the page where the identification code is located is closed.
21. An information processing apparatus based on a close proximity communication signal, comprising:
the scanning module is used for scanning the identification code displayed by the user terminal to acquire the identification information of the identification code;
the signal receiving module is used for receiving a near field communication signal sent by a user terminal, wherein the near field communication signal comprises first attribute information and the identification information;
the analysis module is used for analyzing the first attribute information and the identification information from the near field communication signal;
and the sending module is used for sending the identification information and the authentication request information to a server.
22. The apparatus of claim 21, the authentication request information further comprising first time information;
the analysis module is further configured to analyze the first attribute information and the identification information from the near field communication signal, and at the same time, analyze the first time information from the near field communication signal.
23. The apparatus of claim 21, further comprising:
the second monitoring module is used for monitoring whether the signal receiving module receives the near field communication signal within a set time period, wherein the starting time point of the set time period is the time point of starting scanning the identification code displayed by the user terminal; if the short-distance communication signal is received within a set time period, triggering the analysis module to analyze the first attribute information and the identification information from the short-distance communication signal;
the sending module is further configured to send the identification information to the server if the second monitoring module monitors that the near field communication signal is not received within a set time period.
24. An information processing apparatus based on a close proximity communication signal, comprising:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving identification information and authentication request information sent by a target client, and the authentication request information comprises first attribute information and identification information, wherein the first attribute information and the identification information are obtained by analyzing a received near field communication signal by the target client;
the acquisition module is used for acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information and acquiring first attribute information from authentication request information comprising the scanned identification information;
the comparison module is used for comparing whether the acquired first attribute information and the acquired second attribute information are consistent or not;
the third generating module is used for generating authentication success information if the comparison module compares that the acquired first attribute information is consistent with the acquired second attribute information; and if the comparison module compares that the acquired first attribute information is inconsistent with the acquired second attribute information, generating authentication failure information.
25. The apparatus of claim 24, the authentication request information further comprising first time information;
the device further comprises:
a judging module, configured to judge whether a time difference between current second time information and the first time information in the authentication request information including the scanned identification information is less than or equal to a set time threshold if the comparing module compares that the acquired first attribute information is consistent with the acquired second attribute information; if the time difference is judged to be smaller than or equal to the set time threshold, triggering the third generation module to execute the step of generating the authentication success information;
the third generating module is further configured to generate authentication failure information if the determining module determines that the time difference is greater than the set time threshold.
26. The apparatus of claim 24, further comprising:
and the decryption module is used for decrypting the encrypted identification information, the first attribute information and the first time information to obtain the identification information, the first attribute information and the first time information.
27. The apparatus of claim 24, further comprising:
the first query module is used for querying whether the receiving module receives the authentication request information and the scanned identification information;
the obtaining module is further configured to obtain, if the first query module queries that the scanned identification information is received and the authentication request information is not received, second attribute information corresponding to the scanned identification information according to the scanned identification information;
the second query module is used for querying whether a preset user white list comprises the second attribute information;
the third generating module is further configured to generate authentication success information if the second querying module queries that a preset user white list includes the second attribute information; and if the preset user white list does not comprise the second attribute information, the second query module generates authentication failure information.
28. An information processing system based on a close range communication signal, comprising:
the user terminal is used for generating and displaying the identification code; if the identification code is monitored, generating a near field communication signal, wherein the near field communication signal comprises first attribute information and identification information of the identification code; transmitting the close range communication signal;
the target client is used for scanning the identification code displayed by the user terminal to acquire the identification information of the identification code; receiving a near field communication signal sent by a user terminal; analyzing the first attribute information and the identification information from the near field communication signal; sending the identification information and the authentication request information to a server, wherein the authentication request information comprises the first attribute information and the identification information;
the server is used for acquiring second attribute information corresponding to the scanned identification information according to the scanned identification information and acquiring first attribute information from authentication request information comprising the scanned identification information; comparing whether the acquired first attribute information and the acquired second attribute information are consistent; if the obtained first attribute information and the obtained second attribute information are consistent, authentication success information is generated; and if the obtained first attribute information and the obtained second attribute information are not consistent, generating authentication failure information.
29. A storage medium comprising a stored program, wherein an apparatus in which the storage medium is located is controlled to execute the information processing method based on a near field communication signal according to any one of claims 1 to 8 when the program is executed.
30. A storage medium comprising a stored program, wherein an apparatus in which the storage medium is located is controlled to execute the information processing method based on a near field communication signal according to any one of claims 9 to 11 when the program is executed.
31. A storage medium comprising a stored program, wherein an apparatus in which the storage medium is located is controlled to execute the information processing method based on a near field communication signal according to any one of claims 12 to 16 when the program is executed.
32. A user terminal comprising a memory for storing information including program instructions and a processor for controlling the execution of the program instructions, the program instructions being loaded and executed by the processor to implement the steps of the near field communication signal based information processing method of any one of claims 1 to 8.
33. A target client comprising a memory for storing information comprising program instructions and a processor for controlling the execution of the program instructions, which program instructions are loaded and executed by the processor to implement the steps of the information processing method based on near field communication signals according to any one of claims 9 to 11.
34. A server comprising a memory for storing information including program instructions and a processor for controlling the execution of the program instructions, the program instructions being loaded and executed by the processor to implement the steps of the information processing method based on short range communication signals according to any one of claims 12 to 16.
CN202010215229.2A 2020-03-24 2020-03-24 Information processing method, device and system based on near field communication signal Active CN111491281B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202211124595.2A CN115499816A (en) 2020-03-24 2020-03-24 Information processing method, device and system based on near field communication signal
CN202010215229.2A CN111491281B (en) 2020-03-24 2020-03-24 Information processing method, device and system based on near field communication signal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010215229.2A CN111491281B (en) 2020-03-24 2020-03-24 Information processing method, device and system based on near field communication signal

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202211124595.2A Division CN115499816A (en) 2020-03-24 2020-03-24 Information processing method, device and system based on near field communication signal

Publications (2)

Publication Number Publication Date
CN111491281A true CN111491281A (en) 2020-08-04
CN111491281B CN111491281B (en) 2022-10-04

Family

ID=71798183

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010215229.2A Active CN111491281B (en) 2020-03-24 2020-03-24 Information processing method, device and system based on near field communication signal
CN202211124595.2A Pending CN115499816A (en) 2020-03-24 2020-03-24 Information processing method, device and system based on near field communication signal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202211124595.2A Pending CN115499816A (en) 2020-03-24 2020-03-24 Information processing method, device and system based on near field communication signal

Country Status (1)

Country Link
CN (2) CN111491281B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113992414A (en) * 2021-10-28 2022-01-28 马上消费金融股份有限公司 Data access method, device and equipment
CN114006758A (en) * 2021-10-29 2022-02-01 北京达佳互联信息技术有限公司 Equipment identifier management method, device and storage medium
CN114845302A (en) * 2022-03-30 2022-08-02 慧之安信息技术股份有限公司 Near field encryption communication method and system based on Internet of things

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217345A (en) * 2013-05-29 2014-12-17 芝贝利有限公司 Realizing method and system for electronic discount coupons
CN109858580A (en) * 2018-12-18 2019-06-07 深圳市微付充科技有限公司 A kind of exchange method of graphic code, electronic equipment and storage device
CN110232568A (en) * 2018-03-06 2019-09-13 中国移动通信集团四川有限公司 Method of mobile payment, device, computer equipment and readable storage medium storing program for executing
WO2020024758A1 (en) * 2018-08-03 2020-02-06 中国银联股份有限公司 Code scanning gun device and switching control method for non-contact acceptance and code scanning reading

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217345A (en) * 2013-05-29 2014-12-17 芝贝利有限公司 Realizing method and system for electronic discount coupons
CN110232568A (en) * 2018-03-06 2019-09-13 中国移动通信集团四川有限公司 Method of mobile payment, device, computer equipment and readable storage medium storing program for executing
WO2020024758A1 (en) * 2018-08-03 2020-02-06 中国银联股份有限公司 Code scanning gun device and switching control method for non-contact acceptance and code scanning reading
CN109858580A (en) * 2018-12-18 2019-06-07 深圳市微付充科技有限公司 A kind of exchange method of graphic code, electronic equipment and storage device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
林昕: "基于移动客户端的通信代维认证系统设计与开发", 《赤峰学院学报(自然科学版)》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113992414A (en) * 2021-10-28 2022-01-28 马上消费金融股份有限公司 Data access method, device and equipment
CN114006758A (en) * 2021-10-29 2022-02-01 北京达佳互联信息技术有限公司 Equipment identifier management method, device and storage medium
CN114006758B (en) * 2021-10-29 2024-01-09 北京达佳互联信息技术有限公司 Method, device and storage medium for managing equipment identification
CN114845302A (en) * 2022-03-30 2022-08-02 慧之安信息技术股份有限公司 Near field encryption communication method and system based on Internet of things
CN114845302B (en) * 2022-03-30 2023-01-10 慧之安信息技术股份有限公司 Near field encryption communication method and system based on Internet of things

Also Published As

Publication number Publication date
CN111491281B (en) 2022-10-04
CN115499816A (en) 2022-12-20

Similar Documents

Publication Publication Date Title
CN111491281B (en) Information processing method, device and system based on near field communication signal
KR101652625B1 (en) Security authentification system for membership login of online website and method thereof
JP5645915B2 (en) System and method for performing transactions using wireless devices
US20150066778A1 (en) Digital card-based payment system and method
EP2587714A1 (en) Short-range secure data communication method based on sound wave or audio, and apparatus thereof
TWI633506B (en) A message sending method, system and device thereof
JP2017521744A (en) Method, apparatus and system for providing security checks
CN103119969A (en) Indirect device communication
CN104820921A (en) Method and device for transaction in user equipment
US20170221044A1 (en) Protection method and device of mobile payment information based on communication terminal, and mobile payment system
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN108280369B (en) Cloud document offline access system, intelligent terminal and method
US11010482B2 (en) System and method for secure device connection
JP2019526183A (en) Data transmission method, data transmitter, data receiver, and system
WO2018118248A1 (en) Method and system for purchase precheck
WO2017063221A1 (en) Virtual chip card system based on soft excitation electromagnetic near-field mutual inductance of mobile intelligent terminal
CN107710260A (en) 2 D code information transmission method, electronic quarantee method and system
KR101753535B1 (en) Security authentification system for membership login of online website and method thereof
CN110266686B (en) Data sharing method, device, equipment and computer readable storage medium
US20200034835A1 (en) Payment system for user non-repudiation using user terminal and method thereof
CN114219588B (en) Commodity marketing and transaction method, device and system based on AI technology
CN106716401A (en) Data interaction processing method, device and system
CN111131227B (en) Data processing method and device
US11323815B2 (en) Graphical user interface indicator for broadcaster presence
CN111639895A (en) Package distribution method and device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40034906

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant