Detailed Description
Reference will now be made in detail to the embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are exemplary and intended to be illustrative of the present disclosure, and should not be construed as limiting the present disclosure.
An authentication method and apparatus for electronic payment according to an embodiment of the present disclosure will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a first authentication method for electronic payment according to an embodiment of the present disclosure.
As shown in fig. 1, the authentication method for electronic payment, executed by a client, includes the following steps:
step 101, identity authentication information is obtained, wherein the identity authentication information comprises a serial number and a secret key.
The identity authentication information is generated after the server verifies the biological identification password and the payment password when the user starts the biological identification payment at the client.
In the embodiment of the disclosure, when the client starts the biometric payment, the server determines that the biometric password and the payment password of the user are in an available state, and after the serial number and the secret key are generated, the serial number and the secret key are sent to the client, so that the client can obtain the serial number and the secret key sent by the server.
Step 102, obtaining a biometric password, and verifying the biometric password to obtain a first verification result.
The first verification result is a verification result obtained by verifying the biological identification password. In order to facilitate the distinction between the authentication results obtained by subsequently authenticating the biometric password and the payment password, the authentication result obtained by authenticating the biometric password at the time of electronic payment is named as a first authentication result, and the authentication result obtained by authenticating the biometric password and the payment password at the time of opening the electronic payment is named as a second authentication result.
And 103, if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm.
The first dynamic password is generated according to the secret key and the terminal time stamp when the client side adopts the biological payment. The first dynamic password may be a designated number of bits, for example, the first dynamic password may be a 6-bit number, an 8-bit number, and the like, which is not limited herein.
In order to distinguish the dynamic password generated by the server according to the key and the server timestamp, the dynamic password generated by the client is named as a first dynamic password, and the dynamic password generated by the server is named as a second dynamic password. Of course, other naming manners are also possible, and are not limited herein.
In the embodiment of the disclosure, after receiving the serial number and the secret key sent by the server, the client first verifies whether the biometric password is in an available state. Optionally, after the client acquires the biometric password, the biometric password may be verified with a biometric password pre-stored locally at the client to obtain a first verification result. If the first verification result is that the verification is passed, a preset algorithm can be adopted, and a first dynamic password is generated according to the secret key and the terminal timestamp.
Optionally, a Time-based One-Time password (TOTP) algorithm may be adopted, and the first dynamic verification code is calculated and generated according to the key and the terminal timestamp.
Since the time stamp is a character sequence and uniquely identifies the time of a certain moment, the first dynamic password generated by the client according to the secret key and the terminal time stamp is different at each time of the biological payment, thereby ensuring the security of the electronic payment.
Step 1044 is to send the first dynamic verification code and the serial number to the server for authentication, so that the server verifies the received first dynamic verification code and the serial number after receiving the authentication request.
In the embodiment of the disclosure, in order to ensure the accuracy of the first dynamic verification code generated by the client, after the client generates the first dynamic verification code according to the secret key and the terminal timestamp, the first dynamic verification code and the serial number may be sent to the server together for identity verification, and after the server receives an identity verification request sent by the client, the server verifies the received first dynamic verification code and the serial number.
And 105, acquiring an identity verification result which is sent by the server and used for verifying the first dynamic verification code and the serial number.
In the embodiment of the disclosure, after receiving the first dynamic verification code and the serial number sent by the client, the server first verifies the serial number to determine whether the serial number is valid.
Optionally, the server determines whether the check bit is correct according to the check bit included in the serial number, so as to determine whether the serial number is valid. Therefore, the check bit is added into the serial number, whether the serial number is effective or not is judged according to the check bit, and the workload of the server in checking the first dynamic verification code is reduced.
In a possible case, if the server determines that the check bit is incorrect, it determines that the received serial number sent by the client is invalid, and at this time, the verification result of the first dynamic verification code is authentication failure. And then, sending the authentication result of the authentication failure to the client, after the client acquires the authentication result, the payment process cannot be completed, and displaying information such as payment failure and the like on a display interface of the client.
Under another possible condition, the server determines that the check bit is correct, and then determines that the received serial number sent by the client is valid, at this time, the server verifies the first dynamic verification code according to the second dynamic verification code, and sends a verification result to the client, so that the client obtains the result of verifying the first dynamic verification code sent by the server.
Optionally, after receiving the first dynamic verification code sent by the client, the server compares a second dynamic verification code generated according to the key and the server timestamp with the first dynamic verification code, and if the second dynamic verification code is the same as the first dynamic verification code, it is determined that the first dynamic verification code is valid, and further, a verification result that the first dynamic verification code is valid is sent to the client, so that the client completes an electronic payment process according to the received verification result.
And if the second dynamic check code is different from the first dynamic check code, determining that the first dynamic check code is invalid, and further sending a verification result that the first dynamic check code is invalid to the client so that the client ends the electronic payment process according to the received verification result.
It should be noted that, in order to avoid a situation that the terminal timestamps of the first dynamic verification code and the second dynamic verification code generated by the client and the server may not be completely consistent with the server timestamp, resulting in unsuccessful authentication, or a situation that the authentication fails due to a dynamic password input by the user at a certain time end, in the present disclosure, a difference between the terminal timestamp and the server timestamp by N time steps may be set, for example, the dynamic verification code generated by the server according to the secret key, the previous server timestamp, the current server timestamp, and the next server timestamp may be determined as successful authentication when the first dynamic verification code is the same as the dynamic verification code.
In the embodiment of the disclosure, when the authentication result obtained by the client is an authentication failure, obtaining authentication information may be repeatedly performed, obtaining a biometric password, verifying the biometric password to obtain a first authentication result, if the first authentication result is a verification pass, generating a first dynamic authentication code according to a secret key and a terminal timestamp by using a preset algorithm, and sending the first dynamic authentication code and the serial number to the server for authentication to obtain an authentication result. And if the authentication results obtained repeatedly are all authentication failures and the authentication results indicate that the continuous times of the authentication failures reach the preset times, ending the authentication. Therefore, the electronic payment times are limited by limiting the authentication times, and the situation that the payment password is cracked violently is prevented.
The payment method based on the biological recognition of the embodiment of the disclosure is realized by acquiring identity authentication information, wherein the identity authentication information comprises a serial number and a secret key; acquiring a biological identification password, and verifying the biological identification password to obtain a first verification result; if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm; the first dynamic verification code and the serial number are sent to a server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request; and acquiring an identity authentication result which is sent by the server and used for authenticating the first dynamic authentication code and the serial number. Therefore, compared with the prior electronic payment in which a system verification interface is used or a static password is verified, the electronic payment system has the defect of low safety.
In the embodiment of the present disclosure, when the client starts the biometric payment, the biometric password and the payment password are first verified to ensure that the biometric password and the payment password are in the available state, and then the client may perform the biometric payment, which is described in detail with reference to fig. 2, where fig. 2 is a schematic flow chart of a second identity verification method for electronic payment according to the embodiment of the present disclosure.
As shown in fig. 2, the step 101 may further include the following steps:
step 201, acquiring a biometric password and a payment password.
The biometric password may include fingerprint information or face information.
In the embodiment of the disclosure, when the client starts the biometric payment, the fingerprint information or the face information stored in the device provided with the client of the user can be acquired, and the fingerprint information and the face information of the user can also be collected to acquire the biometric password.
The payment password can be a user payment digital password set by the user.
Step 202, the biometric password and the payment password are verified to obtain a second verification result.
And step 203, if the second verification result is that the verification is passed, acquiring the server generated serial number and the key. .
In the embodiment of the present disclosure, after the client acquires the biometric password, the acquired biometric password is compared with the biometric password pre-stored in the client, so that the verification of the biometric password is completed at the client.
After the client side obtains the payment password, the obtained payment password is sent to the server, so that the server can verify the received payment password.
Optionally, the server verifies the received payment password, and after the password is determined to be verified, the server generates the serial number and the key.
Optionally, when the server verifies the received payment password and determines that the password verification fails, the client cannot perform biometric payment and needs to obtain the payment password again.
It should be noted that, according to the identity authentication method for electronic payment disclosed by the present disclosure, only when the client opens the biometric payment, the biometric password and the payment password are obtained, and the biometric password and the payment password are authenticated, and after it is determined that the biometric password and the payment password are in an available state, only the biometric password needs to be authenticated, and the payment password does not need to be authenticated again in the process of electronic payment.
Therefore, when the client opens the biometric payment, the biometric password and the payment password are obtained, and the biometric password and the payment password are verified to obtain a second verification result; and if the second verification result is that the verification is passed, the acquisition server generates a serial number and a secret key, so that the safety of the electronic payment is ensured.
In order to implement the above embodiments, the present disclosure provides yet another authentication method for electronic payment.
Fig. 3 is a schematic flow chart of a third authentication method for electronic payment according to an embodiment of the present disclosure.
As shown in fig. 3, the authentication method for electronic payment, executed by a server, may include the following steps:
step 301, sending the authentication information to the client.
The identity authentication information comprises a serial number and a secret key.
In the embodiment of the disclosure, when the client starts the biometric payment, the fingerprint information or the face information stored in the device provided with the client of the user can be acquired, and the fingerprint information and the face information of the user can also be collected to acquire the biometric password. Further, the biometric password is verified to obtain a verification result, the payment password is obtained, and the payment password is sent to the server, so that the payment password is verified after the server receives the payment password sent by the client.
Optionally, if the payment password is verified by the server, the serial number and the key are generated to generate authentication information, and the authentication information is sent to the client.
The identity authentication method for electronic payment authenticates the biological identification password and the payment password sent by the client only when the client opens the biological identification payment, and only the biological identification password and the payment password need to be authenticated and the payment password does not need to be authenticated again in the payment process after the biological identification password and the payment password are determined to be in the available state.
Step 302, a first dynamic verification code and a serial number are obtained.
The first dynamic verification code is generated by the client side according to the secret key and the terminal timestamp by adopting a preset algorithm.
In the embodiment of the disclosure, when the client starts the biometric payment request, the biometric password is first acquired to verify whether the biometric password is correct. Optionally, after the client acquires the biometric password, the received biometric password is compared with a pre-stored biometric password to verify the received biometric password.
In the embodiment of the disclosure, after the client receives the serial number and the secret key sent by the server and determines that the verification result of the biometric password passes the verification, a preset algorithm can be adopted to generate a first dynamic password according to the secret key and the terminal timestamp, and then the generated first dynamic verification code and the serial number are sent to the server, so that the server obtains the first dynamic verification code and the serial number sent by the client.
Optionally, a TOTP algorithm may be adopted to calculate and generate the first dynamic verification code according to the key and the terminal timestamp.
Since the time stamp is a character sequence and uniquely identifies the time of a certain moment, the first dynamic password generated by the client according to the secret key and the terminal time stamp is different at each time of the biological payment, thereby ensuring the safety of the biological payment.
And 303, performing identity verification on the first dynamic verification code and the serial number to obtain an identity verification result.
In the embodiment of the disclosure, after receiving the first dynamic verification code and the serial number sent by the client, the server may perform identity verification on the first dynamic verification code and the serial number to determine whether the first dynamic verification code is valid.
In the embodiment of the disclosure, after receiving the first dynamic verification code and the serial number sent by the client, the server first verifies the serial number to determine whether the serial number is valid.
Optionally, the serial number includes a check bit, and the server may determine whether the serial number is valid by determining whether the check bit included in the serial number is correct.
In a possible case, if the server determines that the check bit is incorrect, it determines that the received serial number sent by the client is invalid, and at this time, the verification result of the first dynamic verification code is authentication failure. And then, sending the authentication result of the identity authentication failure to the client, after the client acquires the authentication result, the payment process cannot be completed, and displaying information such as payment failure and the like on a display interface of the client.
Under another possible condition, the server determines that the check bit is correct, and then determines that the received serial number sent by the client is valid, at this time, the server verifies the first dynamic verification code according to the second dynamic verification code, and sends a verification result to the client, so that the client obtains the result of verifying the first dynamic verification code sent by the server. Wherein the second dynamic verification code is generated by the server according to the secret key and the server time stamp.
Optionally, after receiving the first dynamic verification code sent by the client, the server compares a second dynamic verification code generated according to the secret key and the server timestamp with the first dynamic verification code, and if the second dynamic verification code is the same as the first dynamic verification code, it is determined that the first dynamic verification code is valid, and further, a verification result that the first dynamic verification code is valid is sent to the client, so that the client completes the biometric payment process according to the received verification result.
And if the second dynamic check code is different from the first dynamic check code, determining that the first dynamic check code is invalid, and further sending a verification result that the first dynamic check code is invalid to the client so that the client ends the biometric payment process according to the received verification result.
In the embodiment of the disclosure, after the server completes verification of the first dynamic check code, the server may send the authentication result to the client, so that the client completes the payment process according to the received verification result.
In the embodiment of the disclosure, the server verifies the first dynamic verification code and the serial number, and when the generated verification result is that the authentication fails, the process of sending the authentication information to the client to obtain the first dynamic verification code and the serial number, and performing the authentication on the first dynamic verification code and the serial number to obtain the authentication result can be repeatedly executed. And if the authentication results obtained repeatedly are all authentication failures and the authentication results indicate that the continuous times of the authentication failures reach the preset times, ending the authentication. Therefore, the electronic payment times are limited by limiting the authentication times, and the situation that the payment password is cracked violently is prevented.
The identity authentication method for electronic payment of the embodiment of the present disclosure sends the identity authentication information to the client; the identity authentication information comprises a serial number and a secret key, and a first dynamic verification code and the serial number are obtained; the first dynamic verification code is generated by the client side according to the secret key and the timestamp by adopting a preset algorithm after receiving a verification result that the biometric code passes verification; and performing identity authentication on the first dynamic verification code and the serial number to obtain an identity authentication result. Therefore, compared with the prior electronic payment in which a system verification interface is used or a static password is verified, the electronic payment system has the defect of low safety.
As an example, as shown in fig. 4, assuming that the biometric payment is a fingerprint payment, the flow of a specific fingerprint payment-based payment method is as follows:
step 401, the client opens fingerprint payment.
Step 402, the server verifies that the payment password is correct and determines to open fingerprint payment.
In step 403, the client receives the command for determining successful activation sent by the server, and obtains the key and the serial number sent by the server.
In step 404, the client sends a fingerprint payment opening state inquiry command.
Step 405, after receiving the fingerprint payment opening state inquiry command sent by the client, the server inquires the corresponding fingerprint payment opening state.
In step 406, the client receives the fingerprint payment opening status sent by the server.
Step 407, when the fingerprint is paid, the client verifies whether the fingerprint information is correct.
And step 408, the client generates a first dynamic verification code according to the secret key and the terminal timestamp, and sends the first dynamic verification code to the server.
Step 409, after receiving the first dynamic verification code sent by the client, the server verifies the first dynamic verification code and sends the verification result to the client.
In the embodiment of the disclosure, the server generates a second dynamic verification code according to the secret key and the server timestamp, compares the second dynamic verification code with the first dynamic verification code, and determines that the first dynamic verification code is successfully verified if the second dynamic verification code is the same as the first dynamic verification code. And if the second dynamic verification code is different from the first dynamic verification code, the first dynamic verification code fails to be verified.
And step 410, the client completes the payment process according to the received verification result.
In step 411, after completing the fingerprint payment, the client sends a command for closing the fingerprint payment.
In step 412, after receiving the instruction for closing the fingerprint payment sent by the client, the server checks that the payment is completed and closes the fingerprint payment.
In order to implement the above embodiments, the embodiments of the present disclosure further provide an authentication device for electronic payment.
Fig. 5 is a schematic structural diagram of an authentication apparatus for electronic payment according to an embodiment of the present disclosure.
As shown in fig. 5, the authentication apparatus 500 for electronic payment may include: a first acquisition module 510, a second acquisition module 520, a generation module 530, a verification module 540, and a third acquisition module 550.
The first obtaining module 510 is configured to obtain identity authentication information, where the identity authentication information includes a serial number and a secret key.
The second obtaining module 520 is configured to obtain the biometric password and verify the biometric password to obtain a first verification result.
A generating module 530, configured to generate a first dynamic verification code according to the key and the terminal timestamp by using a preset algorithm if the first verification result is that the verification is passed.
The verification module 540 is configured to send the first dynamic verification code and the serial number to the server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving the identity verification request.
A third obtaining module 550, configured to obtain an authentication result that is sent by the server and used for verifying the first dynamic verification code and the serial number.
As a possible scenario, the first obtaining module 510 may further be configured to:
acquiring a biological identification password and a payment password;
verifying the biometric password and the payment password to obtain a second verification result;
and if the second verification result is that the verification is passed, acquiring the serial number and the secret key generated by the server.
As another possible case, the sequence number contains check bits; the third obtaining module may be further configured to:
acquiring a result of verifying the serial number by the server according to the check bit; wherein, the server judges whether the check bit is correct; if the check bit is incorrect, determining that the serial number is invalid, wherein the verification result is authentication failure; if the check bit is correct, determining that the serial number is valid;
if the serial number is valid, acquiring a result of the server verifying the first dynamic check code according to the second dynamic check code; the second dynamic check code is generated by the server according to the secret key and the server time stamp; the server compares the second dynamic check code with the first dynamic check code; if the second dynamic check code is the same as the first dynamic check code, determining that the first dynamic check code is valid; and if the second dynamic check code is different from the first dynamic check code, determining that the first dynamic check code is invalid.
As another possible case, the authentication apparatus 500 for electronic payment may further include:
the first processing module is used for repeatedly acquiring identity authentication information and acquiring a biological identification password if the authentication result is that the identity authentication fails, verifying the biological identification password to obtain a first authentication result, generating a first dynamic verification code according to a secret key and a terminal timestamp by adopting a preset algorithm if the first authentication result is that the authentication passes, and sending the first dynamic verification code and a serial number to the server for identity authentication to obtain an identity authentication result; and determining that the continuous times of the authentication failure reach the preset times as the authentication result, and ending the authentication.
It should be noted that the foregoing explanation of the embodiment of the authentication method for electronic payment also applies to the authentication apparatus for electronic payment of this embodiment, and details are not repeated here.
The identity verification device for electronic payment of the embodiment of the disclosure obtains identity authentication information, wherein the identity authentication information comprises a serial number and a secret key; acquiring a biological identification password, and verifying the biological identification password to obtain a first verification result; if the first verification result is that the verification is passed, generating a first dynamic verification code according to the secret key and the terminal timestamp by adopting a preset algorithm; the first dynamic verification code and the serial number are sent to a server for identity verification, so that the server verifies the received first dynamic verification code and the serial number after receiving an identity verification request; and acquiring an identity authentication result which is sent by the server and used for authenticating the first dynamic authentication code and the serial number. Therefore, compared with the prior electronic payment in which a system verification interface is used or a static password is verified, the electronic payment system has the defect of low safety.
In order to implement the above embodiments, the present disclosure provides another authentication apparatus for electronic payment.
Fig. 6 is a schematic structural diagram of another authentication device for electronic payment according to an embodiment of the present disclosure.
As shown in fig. 6, the authentication apparatus 600 for electronic payment may include: a first sending module 610, an obtaining module 620, and a first verifying module 630.
The first sending module 610 is configured to send the authentication information to the client; the identity authentication information comprises a serial number and a secret key.
An obtaining module 620, configured to obtain a first dynamic verification code and a serial number; and the first dynamic verification code is generated by the client side according to the secret key and the terminal timestamp by adopting a preset algorithm after receiving a verification result that the biological identification password passes verification.
The first verification module 630 is configured to perform identity verification on the first dynamic verification code and the serial number to obtain an identity verification result.
As a possible scenario, the biometric-based payment apparatus 600 may further include:
and the receiving module is used for receiving the biological identification password and the payment password sent by the client.
And the second verification module is used for verifying the biological identification password and the payment password.
And the generation module is used for generating a first serial number and a secret key if the biometric password and the payment password pass verification.
As another possible case, the sequence number contains check bits; the first verification module 630 may further include:
the judging unit is used for judging whether the check bit is correct or not;
and the first determining unit is used for determining that the serial number is invalid if the check bit is incorrect, and the verification result is authentication failure.
As another possible case, the first verification module may further include:
the second determining unit is used for determining that the serial number is valid if the check bit is correct;
the comparison unit is used for comparing the second dynamic check code with the first dynamic check code; the second dynamic check code is generated by the server according to the secret key and the server time stamp;
the third determining unit is used for determining that the first dynamic check code is valid if the second dynamic check code is the same as the first dynamic check code;
and the fourth determining unit is used for determining that the first dynamic check code is invalid if the second dynamic check code is different from the first dynamic check code.
As a possible scenario, the biometric-based payment apparatus 600 may further include:
the second processing module is used for repeatedly executing the process of sending the identity authentication information to the client to obtain the first dynamic verification code and the serial number and verifying the identity of the first dynamic verification code and the serial number to obtain an identity verification result if the identity verification result is that the identity verification fails; and determining that the identity authentication result is that the continuous times of the identity authentication failure reach the preset times, and ending the identity authentication.
It should be noted that the foregoing explanation of the embodiment of the authentication method for electronic payment also applies to the authentication apparatus for electronic payment of this embodiment, and details are not repeated here.
The identity authentication device for electronic payment of the embodiment of the disclosure sends the identity authentication information to the client; the identity authentication information comprises a serial number and a secret key, and a first dynamic verification code and the serial number are obtained; the first dynamic verification code is generated by the client side according to the secret key and the terminal timestamp by adopting a preset algorithm after receiving a verification result that the biological identification password passes verification; and performing identity authentication on the first dynamic verification code and the serial number to obtain an identity authentication result. Therefore, compared with the existing electronic payment method that a system verification interface is used or a static password is verified, the method has the defect of low safety.
In order to implement the foregoing embodiments, an embodiment of the present disclosure provides a client, including at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being configured to perform the method of authentication for electronic payments described above in fig. 1 and/or fig. 2.
In order to implement the foregoing embodiments, the present disclosure provides a server, including at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being configured to perform the method of authentication for electronic payments described above in figure 3.
Fig. 7 is a hardware configuration diagram illustrating a client according to an embodiment of the present disclosure. The client may be implemented in various forms, and the client in the embodiments of the present disclosure may include, but is not limited to, mobile terminal devices such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet), a PMP (portable multimedia player), a navigation apparatus, a vehicle-mounted terminal device, a vehicle-mounted display terminal, a vehicle-mounted electronic rear view mirror, and the like, and fixed terminal devices such as a digital TV, a desktop computer, and the like.
Referring now to fig. 7, a schematic diagram of a client suitable for use in implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The client illustrated in fig. 7 is only an example and should not bring any limitation to the function and scope of use of the embodiments of the present disclosure.
As shown in fig. 7, client 800 may include a processing device (e.g., central processing unit, graphics processor, etc.) 801 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage device 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data necessary for the operation of the client 800 are also stored. The processing apparatus 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
Generally, the following devices may be connected to the I/O interface 805: input devices 806 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 807 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage 808 including, for example, magnetic tape, hard disk, etc.; and a communication device 809. The communication means 809 may allow the client 800 to communicate with other devices wirelessly or by wire to exchange data. While fig. 7 illustrates a client 800 having various devices, it is to be understood that not all illustrated devices are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication means 809, or installed from the storage means 808, or installed from the ROM 802. The computer program, when executed by the processing apparatus 801, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
In order to achieve the above embodiments, the embodiments of the present disclosure propose a computer-readable storage medium storing non-transitory computer-readable instructions for causing the computer to execute the authentication method for electronic payment described in the above embodiments.
Fig. 8 is a schematic diagram illustrating a computer-readable storage medium according to an embodiment of the present disclosure. As shown in fig. 8, a computer-readable storage medium 300 having non-transitory computer-readable instructions 301 stored thereon according to an embodiment of the present disclosure. The non-transitory computer readable instructions 301, when executed by a processor, perform all or a portion of the steps of the authentication method for electronic payments of the embodiments of the present disclosure previously described.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the client; or may exist separately and not be assembled into the client.
The computer readable medium carries one or more programs which, when executed by the client, cause the client to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the client, cause the client to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".