CN111915293A - Remote unbinding method and system for virtual card - Google Patents

Remote unbinding method and system for virtual card Download PDF

Info

Publication number
CN111915293A
CN111915293A CN202010766904.0A CN202010766904A CN111915293A CN 111915293 A CN111915293 A CN 111915293A CN 202010766904 A CN202010766904 A CN 202010766904A CN 111915293 A CN111915293 A CN 111915293A
Authority
CN
China
Prior art keywords
client
virtual card
unbinding
user account
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010766904.0A
Other languages
Chinese (zh)
Other versions
CN111915293B (en
Inventor
陆凯华
陈唐其
黄巍
郭炯光
李廷温
沈凌楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202010766904.0A priority Critical patent/CN111915293B/en
Publication of CN111915293A publication Critical patent/CN111915293A/en
Application granted granted Critical
Publication of CN111915293B publication Critical patent/CN111915293B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/351Virtual cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/354Card activation or deactivation

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The specification discloses a remote unbinding method and a remote unbinding system for a virtual card, wherein the virtual card is associated with a user account, and the method comprises the following steps: the method comprises the steps that a first client side running on first equipment determines a user account number logged in the first client side at present and determines an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device; a first client sends a unbinding request to a server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound; the server side determines a second client side according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card; the server side sends a unbinding instruction to the second client side, wherein the unbinding instruction carries the identifier of the unbinding virtual card; and the second client triggers the second equipment to unbind the virtual card according to the unbinding instruction.

Description

Remote unbinding method and system for virtual card
Technical Field
The specification relates to the technical field of information security, in particular to a remote unbinding method and system for a virtual card.
Background
With the development of terminal equipment, card functions such as a traffic card and an access card can be integrated in a near field communication chip of the terminal equipment, and a user can get in and out of an access, take a vehicle and the like only by carrying the terminal equipment.
However, while the terminal device brings convenience to the user, certain safety problems are brought: because the virtual cards such as traffic cards, access control cards and the like do not need further authentication when in use, if the terminal equipment of a user is lost or stolen, the user who picks up or steals the terminal equipment of the user can illegally use the function of the virtual card in the terminal equipment. For example, a virtual entrance guard card function in the terminal device is used to enter and exit a cell where the user is located, and a vehicle is taken by using a virtual transportation card function on the terminal device. In addition, for a virtual card which can be recharged, such as a virtual transportation card, since the recharge amount exists therein, if the terminal device is lost, the recharge amount in the virtual card is lost, which is undoubtedly further property loss for the user.
Disclosure of Invention
In order to solve the above technical problems, the present specification provides a method and a system for remotely unbinding a virtual card, where the technical scheme is as follows:
according to a first aspect of the present description, there is provided a method of remote unbinding of a virtual card, the virtual card being associated with a user account, the method comprising:
the method comprises the steps that a first client side running on first equipment determines a user account number logged in the first client side at present and determines an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
a first client sends a unbinding request to a server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound;
the server side determines a second client side according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
the server side sends a unbinding instruction to the second client side, wherein the unbinding instruction carries the identifier of the unbinding virtual card;
and the second client triggers the second equipment to unbind the virtual card according to the unbinding instruction.
According to a second aspect of the present description, there is provided a remote unbinding system for a virtual card, the virtual card being associated with a user account, the system comprising:
the system comprises a first client running on first equipment and a second client running on the first equipment, wherein the first client is used for determining a user account currently logged in the first client and determining an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
sending a unbinding request to a server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound;
the server is used for determining a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
sending a unbinding instruction to a second client, wherein the unbinding instruction carries the identifier of the unbinding virtual card;
and the second client is used for triggering second equipment to unbind the virtual card according to the unbinding instruction.
By adopting the technical scheme of the specification, after the equipment of the user is lost, the user can unbind the virtual card on the lost equipment by using new terminal equipment, namely the first equipment. Therefore, the functions of the virtual card in the equipment can be effectively prevented from being illegally used by people who lose the equipment after picking or stealing the virtual card, and for the virtual card which can be recharged, the people who lose the equipment after picking or stealing the virtual card can not use the recharge amount, so that the property loss of the user can be reduced, and the safety of the virtual card in the using process is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the specification.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present specification, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic flowchart of a remote unbinding method for a virtual card according to an embodiment of the present disclosure;
FIGS. 2a-2e are schematic interface diagrams of a remote unbinding method for a virtual card according to an embodiment of the present disclosure;
FIG. 3 is a schematic structural diagram of a remote unbinding device for a first virtual card according to an embodiment of the present disclosure;
FIG. 4 is a schematic structural diagram of a remote unbinding device for a second virtual card according to an embodiment of the present disclosure;
FIG. 5 is a schematic structural diagram of a remote unbinding device for a third virtual card according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an apparatus for configuring a device according to an embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present specification, the technical solutions in the embodiments of the present specification will be described in detail below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of protection.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
With the development of terminal equipment, card functions such as a traffic card and an access card can be integrated in a near field communication chip of the terminal equipment, and a user can get in and out of an access, take a vehicle and the like only by carrying the terminal equipment.
However, while the terminal device brings convenience to the user, certain safety problems are brought: because the virtual cards such as traffic cards, access control cards and the like do not need further authentication when in use, if the terminal equipment of a user is lost or stolen, the user who picks up or steals the terminal equipment of the user can illegally use the function of the virtual card in the terminal equipment. For example, a virtual entrance guard card function in the terminal device is used to enter and exit a cell where the user is located, and a vehicle is taken by using a virtual transportation card function on the terminal device. For a virtual card that can be recharged, such as a virtual transportation card, since the recharge amount exists therein, if the terminal device is lost, the recharge amount in the virtual card is lost, which is undoubtedly a further property loss for the user.
In addition, the virtual card is integrated in the near field communication chip of the terminal device, i.e. hardware, so that the equipment which must be lost in the unbinding process participates in the hardware level, i.e. the information written in the near field communication chip is cleared to be unbound in the true sense. For example, the virtual transportation card function is generally integrated in an NFC chip in the device, and if the device is intended to unbind the virtual transportation card, information about the virtual transportation card function in the NFC chip must be cleared, and the device must participate from a hardware level to clear the information, so that, at present, after the device of the user is lost, the virtual card on the lost device cannot be unbound, and a person who picks up or steals the lost device can use the function of the virtual card in the device at will, which has a great potential safety hazard.
In view of the above technical problems, the present specification provides the following solutions:
the method for remotely unbinding the virtual card is characterized in that the virtual card is associated with an account of a user, and the user is allowed to log in a client in a new device on the new device by using the account logged in the client on the lost device after the device is lost, wherein the client is the client providing the binding or unbinding function of the virtual card, for example, the client can be an electronic wallet, and the corresponding virtual card is a virtual transportation card; for another example, the client is a community client, and the corresponding virtual card is a virtual access card.
After a user logs in a client by using the same account number on new equipment, the virtual card bound on the lost equipment can be remotely removed, so that the function of illegally using the virtual card in the equipment by picking or stealing the equipment is avoided, and the safety of the virtual card in the using process is improved.
In order to more clearly describe the technical scheme provided by the specification, the following explains the names involved in the specification:
in order to distinguish between a device lost by a user and a new device used by the user, the new device used by the user is referred to as a first device, the device lost by the user is referred to as a second device, and accordingly, a client installed on the first device is referred to as a first client, and the same client installed on the second device is referred to as a second client.
Based on the above description, as shown in fig. 1, the present specification provides a remote unbinding method for a virtual card, which associates the virtual card with a user account, as follows:
s101, running on a first client of first equipment, determining a user account currently logged in the first client, and determining an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
because the virtual card is associated with the user account, after the second device bound with the virtual card is lost, the user can use the user account logged in the client on the second device to log in the new device, namely the first client in the first device, and the first client can determine the user account information currently used by the user after determining that the user successfully logs in by using the account.
The user can select or directly fill in the identifier of the virtual card to be unbound, which is bound with the lost device, namely the second device, in the first client; the first client may determine the identification of the virtual card to be unbound according to the content selected by the user or the filled-in content.
In one embodiment, the first client may display a filling control of the virtual card identifier in the interactive interface, and the user may directly fill the virtual card identifier to be unbound based on the filling control, for example, fill the card number, the code, or other forms of identifiers of the virtual card, which is not limited in this specification.
In an embodiment, the first client may also display, in the interactive interface, identifiers of all virtual cards bound to other devices than the first device, which are associated with a user account currently used by the user, and display a selection control, the user may select a virtual card to be unbound, which needs to be unbound, based on the selection control, and after the user selects and determines the virtual card to be unbound, the first client may determine the identifier of the virtual card to be unbound according to a selection operation of the user.
S102, a first client sends a unbinding request to a server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound;
the first client side can send a unbinding request to the server side after determining the user account number currently logged in the first client side and the identifier of the virtual card to be unbound, wherein the unbinding request carries the user account number used by the user and the identifier of the virtual card to be unbound.
S103, the server determines a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
after receiving the unbinding request sent by the first client, the server can determine the second client according to the user account information and the virtual card identifier in the unbinding request. Wherein the second client satisfies: and currently logging in by using the user account and operating on second equipment currently bound with the virtual card.
The way in which the server determines the second client is not described in detail here, and specific contents may be referred to below.
S104, the server side sends a unbinding instruction to the second client side, wherein the unbinding instruction carries the identifier of the unbinding virtual card;
after the server determines the second client, the server may determine a communication address of the second client and send a unbinding instruction to the second client based on the communication address, where the unbinding instruction carries the identifier of the virtual card to be unbound.
And S105, the second client triggers the second device to unbind the virtual card according to the unbinding instruction.
After receiving the unbinding instruction of the server, the second client may send a message of unbinding the virtual card to the native device, so as to trigger the second device to unbind the virtual card at a hardware level, that is, to clear information about the virtual card in the near field communication chip on the device. After the information of the virtual card is cleared, the device loses the function of the virtual card, namely, the unbinding process is completed. Of course, the first client may display the information of successful unbinding in the interactive interface, so that the user can know the progress of the current unbinding.
By adopting the technical scheme of the specification, after the second device of the user is lost, the user can unbind the virtual card on the second device by using a new device, namely the first device. Therefore, the method can effectively avoid the person who picks up or steals the second equipment from illegally using the function of the virtual card in the equipment, and improves the safety of the virtual card in the using process.
In addition, it should be noted that, although the above solutions all describe that after the device is lost, the user can remotely unbind the virtual card bound in the lost device by using a new device. However, those skilled in the art can foresee that even if the device of the user is not lost, the user can also adopt the above technical solution if the user wants to remotely unbind the virtual card bound by the device. For example, when a user goes on a business trip, the device bound with the virtual card is left at home, and in order to avoid using the virtual card by other people, the user can remotely operate by using other new devices to unbind the virtual card bound on the device at home.
In one embodiment, after the second device and the virtual card are unbound, the binding of the first device to the virtual card may be triggered at the first client. For example, the first client may obtain basic information required by the virtual card to execute the corresponding function, and for the virtual card with which the amount of money can be recharged, also needs to obtain the amount information corresponding to the virtual card. After obtaining all the information required for binding the virtual card, the first client may trigger the first device to bind the virtual card, that is, trigger the first device to write the information of the virtual card into the local near field communication chip.
Of course, the process of binding the virtual card and the first device may be automatically executed after the second device and the virtual card are unbound; after the unbinding is completed, the binding indication of the user on the first client may be detected and then executed, which is not limited in this specification.
After the second device and the virtual card are unbound, the virtual card and the first device can be bound by the embodiment, so that the user can continue to use the virtual card. For the virtual card which can be charged, the user can continue to consume the amount of money in the virtual card, and further property loss of the user after the second device is lost is avoided. In addition, when the user leaves the second device at home and wants to use the virtual card in the second device, the scheme of this embodiment may also be adopted, that is, the user may use the new device to remotely unbind the virtual card on the second device, and bind the virtual card with the new device, so as to continue to use the virtual card.
The following describes a specific manner in which the server determines the second client according to the unbinding request in S103:
in one embodiment, after receiving a unbinding request, a server may obtain a user account therein and an identifier of a virtual card to be unbound, and determine, according to the user account, other clients, except the first client, currently logged in by using the user account; for example, as shown in table 1:
account number: a client:
001 A、B、C、D
TABLE 1
For example, after the acquired user account number is 001, the client currently logged in by using the account number may be queried. As shown in table 1, the currently logged-in clients using 001 are client a, client B, client C, and client D, where client D is the first client. After determining the client currently using the user account to log in, sending a binding state detection message to the determined client, and in combination with the above example, sending a binding state detection message to the client a, the client B, and the client C, respectively, where the detection message includes the identifier of the virtual card to be unbiased; after receiving the binding state detection message, the clients A, B and C may query whether the virtual card to be unbound is bound in the local device, and return a message carrying the query result to the server. The server can determine the second client according to the messages responded by the clients. With reference to the above example, for example, the client B determines that the local device binds the virtual card to be unbound through querying, returns the queried result to the server, and after receiving the queried result, the server may determine that the client B is the second client. Of course, the login status shown in table 1 is only a simple example, and may be represented by a more complex data structure in practical application, which is not limited in the present specification.
In another embodiment, after receiving the unbinding request, the server can acquire the user account and the virtual card identifier to be unbound. After the identifier of the virtual card to be unbound is obtained, determining second equipment bound by the virtual card identifier in a binding relationship between the pre-stored virtual card identifier and the equipment identifier; the binding relationship between the pre-stored virtual card identifier and the device identifier may be as shown in table 2,
Figure BDA0002615051310000081
Figure BDA0002615051310000091
TABLE 2
For example, if the virtual card identifier obtained by the server from the unbinding request is C1, the device bound by C1 may be determined to be E1 by querying the corresponding relationship table entry, that is, the second device is determined to be E1.
Of course, the correspondence relationship shown in table 2 is only a simple illustration, and a more complex data structure may be used for representation in practical applications, which is not limited in the present specification.
After determining the second device, the server may determine whether the client running on the second device currently logs in using the user account; for example, a user account used when a client running on the second device logs in may be acquired, and it may be determined whether the user account is a user account in a unbinding request sent by the first client. If so, determining that the client running on the second device is logged in by using the user account, and at this time, determining that the client running on the second device is the second client.
The thief may also use the second client to unbind the virtual card on the other device, considering that the lost device, i.e., the second device, is still running the second client that logged in using the user account. Therefore, before the server sends the unbinding instruction to the second client, the identity authentication can be carried out on the user using the first client; and sending the unbinding instruction to the second client only when the identity authentication is determined to pass.
The specific authentication time node can perform identity authentication on the user before the first client sends the unbinding request to the server; after the server receives the unbinding request sent by the first client, the identity authentication of the user is carried out before the second client is determined; or after the server determines the second client, the server performs identity authentication on the user before sending the unbinding instruction to the second client; the specific authentication time node is not limited in this specification, that is, the user can be authenticated at any time point before the server sends the unbinding instruction to the second client, so that the security of unbinding can be determined.
The identity authentication may be password authentication, biometric authentication, such as face authentication and fingerprint authentication. To further improve security, the authentication method adopted should be different from that of account login. Preferably, the authentication strength of the adopted authentication method should be higher than that of the account login so as to perform stronger authentication on the user. For example, the authentication mode when the account logs in is password authentication, and the authentication mode adopted here may be authentication based on biological characteristics, such as face authentication, and of course, a living body check may be performed on the user on the basis of the authentication mode to ensure that the authentication is not performed by using a photo or other pictures with portraits. For example, corresponding indication information may be displayed in the interactive interface to instruct the user to perform operations of mouth opening, head shaking, eye blinking, and the like to perform the biopsy. The user is authenticated based on a higher-strength authentication mode, and the safety of the unbinding process can be ensured. The specific authentication form is not limited in the present specification.
In the above S104, in consideration of a case where the server fails to send the unbinding instruction to the second client due to a network failure, a poor signal, or the like, the server may, in a case where it is determined that the sending fails, send the unbinding instruction to the second client periodically based on a preset time period, for example, send the unbinding instruction every 2 minutes until the second client responds, or stop sending the unbinding request until a preset time period, for example, 72 hours, is reached.
In order to more clearly illustrate the solution of the present description, the following describes the method performed from a single-sided perspective:
for a first client running on a first device, the tasks that need to be performed are mainly as follows:
determining a user account currently logged in a first client, and determining an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
sending a unbinding request to a server, wherein the unbinding request carries the determined user account and an identifier of the virtual card to be unbound, so that the server determines a second client according to the unbinding request and sends a unbinding instruction to the second client, and the unbinding instruction is used for enabling the second client to trigger second equipment to unbind the virtual card according to the unbinding instruction; the determined second client satisfies: and currently logging in by using the user account and operating on second equipment currently bound with the virtual card.
For the server, the tasks to be executed are mainly as follows:
receiving a unbinding request sent by a first client, wherein the unbinding request carries a user account number logged in the first client and an identifier of a virtual card to be unbound;
determining a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
sending a unbinding instruction to a second client so that the second client triggers second equipment to unbind the virtual card according to the unbinding instruction; and the unbinding instruction carries the identifier of the unbinding virtual card.
For the second client, the tasks that need to be performed are mainly as follows:
receiving a unbinding instruction sent by a server;
triggering the second equipment to unbind the virtual card according to an unbinding instruction sent by the server; wherein, the unbinding instruction carries the identifier of the virtual card.
In order to describe the above scheme more clearly, the following describes the remote unbinding method of the virtual card proposed in this specification with reference to a specific embodiment:
as shown in fig. 2a-2e, after the device of the user is lost, the user logs in a first client running on the first device using a user account, the first client may display, in an interactive interface, identifiers of all virtual cards bound to other devices besides the first device, which are associated with the user account currently used by the user, such as a non-native "hang state subway riding card" shown in fig. 2a, and display a selection control, based on which the user may select a virtual card to be unbound, which needs to be unbound, and after the user selects the virtual card bound device, the virtual card bound device may be displayed to the user so that the user can distinguish the device to which the virtual card is bound, such as "device to which the card belongs" shown in fig. 2 b: huabei MATE30 (non-native) ". After the user determines to unbind, the first client may determine the identifier of the virtual card to be unbound according to the selection operation of the user, as shown in fig. 2b, after the user selects the "hang zhou subway riding card" and clicks the "apply card removal", determine that the virtual card to be unbound of the user is the "hang zhou subway riding card".
The first client sends a unbinding request about the hangzhou subway boarding card to the server, and displays an interface shown in fig. 2c in an interactive interface to inform a user that the user is currently processing. And after determining a second client running on the equipment bound by the Hangzhou subway riding card, the server sends a unbinding instruction to the second client, and the second client triggers the second equipment to unbind the virtual card according to the unbinding instruction.
After knowing that the second device is unbound, the first client displays an interface shown in fig. 2d in the interactive interface to inform the user that the unbinding is completed, and provides an operation interface for binding the virtual card with the current first device. After the user clicks that "the original device card is deleted and immediately moved into the local machine", the first client may trigger the first device to bind the virtual card according to the information of the virtual card sent by the server, and after the binding is successful, an interface shown in fig. 2e may be displayed to inform the user that the binding is completed.
Therefore, the present specification provides a method for facilitating a user to unbind a virtual card on a device other than a current device, and after the device is lost, the user can use a new device to unbind the virtual card bound on the lost device, and allow the user to bind the virtual card on the new device to continue to use the virtual card, thereby improving the safety of the use of the virtual card.
Corresponding to the foregoing method for remotely unbinding a virtual card, the present specification further provides a system for remotely unbinding a virtual card, where the virtual card is associated with a user account, and the system includes:
the system comprises a first client running on first equipment and a second client running on the first equipment, wherein the first client is used for determining a user account currently logged in the first client and determining an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
sending a unbinding request to a server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound;
the server is used for determining a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
sending a unbinding instruction to a second client, wherein the unbinding instruction carries the identifier of the unbinding virtual card;
and the second client is used for triggering second equipment to unbind the virtual card according to the unbinding instruction.
In one embodiment, the first client is further configured to trigger the first device to bind with the virtual card after determining that unbinding is completed.
In an embodiment, the first client is specifically configured to display, in the interactive interface, an identifier of at least one virtual card associated with the user account and bound to a device other than the first device;
and determining the identifier of the virtual card to be unbound from the identifiers of the at least one virtual card according to the selection operation of the user.
In an embodiment, the server is specifically configured to determine, according to the unbinding request, at least one other client, other than the first client, that is currently logged in using the user account;
sending a binding state detection message to the at least one other client, wherein the message comprises the identifier of the virtual card to be unbound;
and determining the second client according to the message responded by the at least one other client.
In an embodiment, the server is specifically configured to determine, in a binding relationship between a pre-stored virtual card identifier and an equipment identifier, a second equipment bound to the virtual card identifier;
judging whether a client running on the second device uses the user account to log in currently;
and if so, determining that the client running on the second equipment is the second client.
In one embodiment, the server is further configured to authenticate the user using the first client before sending the unbinding instruction to the second client;
and sending a unbinding instruction to the second client under the condition that the identity authentication is determined to pass.
In one embodiment, the server is further configured to periodically send the unbinding instruction to the second client based on a preset time period if it is determined that the sending of the unbinding instruction fails.
Referring to fig. 3, in correspondence to the foregoing method for remotely unbinding a virtual card, the present specification further provides an apparatus for remotely unbinding a virtual card, which is applied to a first client running on a first device, where the virtual card is associated with a user account, and the apparatus includes:
a determining module 310, configured to determine a user account currently logged in on the first client, and determine an identifier of the virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
a unbinding request sending module 320, configured to send a unbinding request to a server, where the unbinding request carries the determined user account and an identifier of the virtual card to be unbound, so that the server determines a second client according to the unbinding request and sends a unbinding instruction to the second client, where the unbinding instruction is used to enable the second client to trigger the second device to unbind the virtual card according to the unbinding instruction; the determined second client satisfies: and currently logging in by using the user account and operating on second equipment currently bound with the virtual card.
Referring to fig. 4, in correspondence to the foregoing method for remotely unbinding a virtual card, the present specification further provides a device for remotely unbinding a virtual card, which is applied to a server, where the virtual card is associated with a user account, and the device includes:
a unbinding request receiving module 410, configured to receive a unbinding request sent by a first client, where the unbinding request carries a user account logged in the first client and an identifier of a virtual card to be unbound;
a second client determining module 420, configured to determine a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
the unbinding instruction sending module 430 is configured to send an unbinding instruction to the second client, so that the second client triggers the second device to unbind the virtual card according to the unbinding instruction; and the unbinding instruction carries the identifier of the unbinding virtual card.
As shown in fig. 5, corresponding to the foregoing method for remotely unbinding a virtual card, the present specification further provides a remote unbinding apparatus for a virtual card, which is applied to a second client, where the virtual card is associated with a user account, and the second client currently logs in using the user account and operates on a second device currently bound to the virtual card, and the apparatus includes:
a unbinding instruction receiving module 510, configured to receive a unbinding instruction sent by a server;
the unbinding triggering module 520 is used for triggering the second equipment to unbind the virtual card according to the unbinding instruction; wherein, the unbinding instruction carries the identifier of the virtual card.
The implementation processes of the functions and actions of the components in the above device are specifically described in the implementation processes of the corresponding steps in the above method, and are not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described apparatus embodiments are merely illustrative. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
Embodiments of the present specification also provide a computer device, which at least includes a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the aforementioned method when executing the program. The method at least comprises the method executed by the first client, the server and the second client.
The method executed by the first client comprises the following steps:
determining a user account currently logged in a first client, and determining an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
sending a unbinding request to a server, wherein the unbinding request carries the determined user account and an identifier of the virtual card to be unbound, so that the server determines a second client according to the unbinding request and sends a unbinding instruction to the second client, and the unbinding instruction is used for enabling the second client to trigger second equipment to unbind the virtual card according to the unbinding instruction; the determined second client satisfies: and currently logging in by using the user account and operating on second equipment currently bound with the virtual card.
The method executed by the server side comprises the following steps:
receiving a unbinding request sent by a first client, wherein the unbinding request carries a user account number logged in the first client and an identifier of a virtual card to be unbound;
determining a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
sending a unbinding instruction to a second client so that the second client triggers second equipment to unbind the virtual card according to the unbinding instruction; and the unbinding instruction carries the identifier of the unbinding virtual card.
The method executed by the second client comprises the following steps:
receiving a unbinding instruction sent by a server;
triggering second equipment to unbind the virtual card according to the unbinding instruction; wherein, the unbinding instruction carries the identifier of the virtual card.
Fig. 6 is a schematic diagram illustrating a more specific hardware structure of a computing device according to an embodiment of the present disclosure, where the computing device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 1050 includes a path that transfers information between various components of the device, such as processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
Embodiments of the present specification also provide a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the foregoing method. The method at least comprises the method executed by the first client, the server and the second client.
The method executed by the first client comprises the following steps:
determining a user account currently logged in a first client, and determining an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
sending a unbinding request to a server, wherein the unbinding request carries the determined user account and an identifier of the virtual card to be unbound, so that the server determines a second client according to the unbinding request and sends a unbinding instruction to the second client, and the unbinding instruction is used for enabling the second client to trigger second equipment to unbind the virtual card according to the unbinding instruction; the determined second client satisfies: and currently logging in by using the user account and operating on second equipment currently bound with the virtual card.
The method executed by the server side comprises the following steps:
receiving a unbinding request sent by a first client, wherein the unbinding request carries a user account number logged in the first client and an identifier of a virtual card to be unbound;
determining a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
sending a unbinding instruction to a second client so that the second client triggers second equipment to unbind the virtual card according to the unbinding instruction; and the unbinding instruction carries the identifier of the unbinding virtual card.
The method executed by the second client comprises the following steps:
receiving a unbinding instruction sent by a server;
triggering second equipment to unbind the virtual card according to the unbinding instruction; wherein, the unbinding instruction carries the identifier of the virtual card. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
From the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present disclosure can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present specification may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present specification.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, and the modules described as separate components may or may not be physically separate, and the functions of the modules may be implemented in one or more software and/or hardware when implementing the embodiments of the present disclosure. And part or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is only a specific embodiment of the embodiments of the present disclosure, and it should be noted that, for those skilled in the art, a plurality of modifications and decorations can be made without departing from the principle of the embodiments of the present disclosure, and these modifications and decorations should also be regarded as the protection scope of the embodiments of the present disclosure.

Claims (21)

1. A method of remote unbinding of a virtual card, the virtual card being associated with a user account, the method comprising:
the method comprises the steps that a first client side running on first equipment determines a user account number logged in the first client side at present and determines an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
a first client sends a unbinding request to a server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound;
the server side determines a second client side according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
the server side sends a unbinding instruction to the second client side, wherein the unbinding instruction carries the identifier of the unbinding virtual card;
and the second client triggers the second equipment to unbind the virtual card according to the unbinding instruction.
2. The method of claim 1, further comprising:
and after determining that the unbinding is completed, the first client triggers the first device to bind with the virtual card.
3. The method of claim 1, the determining an identity of a virtual card to unbind, comprising:
the first client displays the identification of at least one virtual card which is associated with the user account and bound to other equipment except the first equipment in an interactive interface;
and determining the identifier of the virtual card to be unbound from the identifiers of the at least one virtual card according to the selection operation of the user.
4. The method of claim 1, the server determining a second client from the unbind request, comprising:
the server side determines at least one other client side except the first client side which is logged in by using the user account at present according to the unbinding request;
the server side sends a binding state detection message to the at least one other client side, wherein the message comprises the identifier of the virtual card to be unbound;
and determining the second client according to the message responded by the at least one other client.
5. The method of claim 1, the server determining a second client from the unbind request, comprising:
the server side determines second equipment bound by the virtual card identification in a binding relationship between the pre-stored virtual card identification and the equipment identification;
judging whether a client running on the second device uses the user account to log in currently;
and if so, determining that the client running on the second equipment is the second client.
6. The method of claim 1, further comprising:
before a server side sends a unbinding instruction to a second client side, identity authentication is carried out on a user using a first client side;
and sending a unbinding instruction to the second client under the condition that the identity authentication is determined to pass.
7. The method of claim 1, further comprising:
and the server side periodically sends the unbinding instruction to the second client side based on a preset time period under the condition that the unbinding instruction is determined to be failed to send.
8. A remote unbinding method of a virtual card, applied to a first client running on a first device, the virtual card being associated with a user account, the method comprising:
determining a user account currently logged in a first client, and determining an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
sending a unbinding request to a server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound, so that the server determines a second client according to the unbinding request and sends an unbinding instruction to the second client; the unbinding instruction is used for enabling the second client to trigger the second device to unbind the virtual card according to the unbinding instruction; the determined second client satisfies: and currently logging in by using the user account and operating on second equipment currently bound with the virtual card.
9. A remote unbinding method of a virtual card is applied to a server, the virtual card is associated with a user account, and the method comprises the following steps:
receiving a unbinding request sent by a first client, wherein the unbinding request carries a user account number logged in the first client and an identifier of a virtual card to be unbound;
determining a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
sending a unbinding instruction to a second client so that the second client triggers second equipment to unbind the virtual card according to the unbinding instruction; and the unbinding instruction carries the identifier of the unbinding virtual card.
10. A remote unbinding method of a virtual card, applied to a second client, wherein the virtual card is associated with a user account, and the second client currently logs in by using the user account and operates on a second device currently bound with the virtual card, the method comprising the following steps:
receiving a unbinding instruction sent by a server;
triggering second equipment to unbind the virtual card according to the unbinding instruction; wherein, the unbinding instruction carries the identifier of the virtual card.
11. A remote unbinding system of a virtual card, the virtual card associated with a user account, the system comprising:
the system comprises a first client running on first equipment and a second client running on the first equipment, wherein the first client is used for determining a user account currently logged in the first client and determining an identifier of a virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
sending a unbinding request to a server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound;
the server is used for determining a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
sending a unbinding instruction to a second client, wherein the unbinding instruction carries the identifier of the unbinding virtual card;
and the second client is used for triggering second equipment to unbind the virtual card according to the unbinding instruction.
12. The system as set forth in claim 11, wherein,
the first client is further used for triggering the first device to be bound with the virtual card after the fact that the unbinding is completed is determined.
13. The system as set forth in claim 11, wherein,
the first client is specifically used for displaying the identification of at least one virtual card which is associated with the user account and bound to other equipment except the first equipment in an interactive interface;
and determining the identifier of the virtual card to be unbound from the identifiers of the at least one virtual card according to the selection operation of the user.
14. The system as set forth in claim 11, wherein,
the server is specifically used for determining at least one other client which is logged in by using the user account and is except the first client according to the unbinding request;
sending a binding state detection message to the at least one other client, wherein the message comprises the identifier of the virtual card to be unbound;
and determining the second client according to the message responded by the at least one other client.
15. The system as set forth in claim 11, wherein,
the server is specifically used for determining the second equipment bound by the virtual card identifier in the binding relationship between the pre-stored virtual card identifier and the equipment identifier;
judging whether a client running on the second device uses the user account to log in currently;
and if so, determining that the client running on the second equipment is the second client.
16. The system as set forth in claim 11, wherein,
the server is also used for carrying out identity authentication on the user using the first client before sending the unbinding instruction to the second client;
and sending a unbinding instruction to the second client under the condition that the identity authentication is determined to pass.
17. The system as set forth in claim 11, wherein,
and the server is also used for periodically sending the unbinding instruction to the second client based on a preset time period under the condition that the unbinding instruction is determined to be failed to send.
18. A remote unbinding apparatus for a virtual card, applied to a first client running on a first device, the virtual card being associated with a user account, the apparatus comprising:
the determining module is used for determining a user account currently logged in the first client and determining an identifier of the virtual card to be unbound; the virtual card to be unbound is bound to other devices except the first device;
the unbinding request sending module is used for sending an unbinding request to the server, wherein the unbinding request carries the determined user account and the identifier of the virtual card to be unbound, so that the server determines a second client according to the unbinding request and sends an unbinding instruction to the second client; the unbinding instruction is used for enabling the second client to trigger the second device to unbind the virtual card according to the unbinding instruction; the determined second client satisfies: and currently logging in by using the user account and operating on second equipment currently bound with the virtual card.
19. A remote unbinding device of a virtual card, which is applied to a server side, wherein the virtual card is associated with a user account, and the device comprises:
the system comprises a unbinding request receiving module, a virtual card processing module and a virtual card processing module, wherein the unbinding request receiving module is used for receiving an unbinding request sent by a first client, and the unbinding request carries a user account number logged in the first client and an identifier of the virtual card to be unbound;
the second client determining module is used for determining a second client according to the unbinding request; the determined second client satisfies: logging in by using the user account currently and operating on second equipment currently bound with the virtual card;
the unbinding instruction sending module is used for sending an unbinding instruction to the second client so that the second client triggers the second equipment to unbind the virtual card according to the unbinding instruction; and the unbinding instruction carries the identifier of the unbinding virtual card.
20. A remote unbinding apparatus for a virtual card, applied to a second client, the virtual card being associated with a user account, the second client currently using the user account to log in and operating on a second device currently bound to the virtual card, the apparatus comprising:
the unbinding instruction receiving module is used for receiving an unbinding instruction sent by the server;
the unbinding triggering module is used for triggering the second equipment to unbind the virtual card according to the unbinding instruction; wherein, the unbinding instruction carries the identifier of the virtual card.
21. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 8 to 10 when executing the program.
CN202010766904.0A 2020-08-03 2020-08-03 Remote unbinding method and system for virtual card Active CN111915293B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010766904.0A CN111915293B (en) 2020-08-03 2020-08-03 Remote unbinding method and system for virtual card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010766904.0A CN111915293B (en) 2020-08-03 2020-08-03 Remote unbinding method and system for virtual card

Publications (2)

Publication Number Publication Date
CN111915293A true CN111915293A (en) 2020-11-10
CN111915293B CN111915293B (en) 2023-03-21

Family

ID=73287032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010766904.0A Active CN111915293B (en) 2020-08-03 2020-08-03 Remote unbinding method and system for virtual card

Country Status (1)

Country Link
CN (1) CN111915293B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115576460A (en) * 2022-01-06 2023-01-06 荣耀终端有限公司 Account binding method and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047920A (en) * 2007-04-12 2007-10-03 华为技术有限公司 Method, system for prevent mobile phone stolen and anti-theft mobile and network side entity
US20140372743A1 (en) * 2013-06-12 2014-12-18 Lookout, Inc. Method and system for rendering a stolen mobile communications device inoperative
CN104883658A (en) * 2015-04-30 2015-09-02 努比亚技术有限公司 Virtual card information processing method and system
CN105813072A (en) * 2014-12-29 2016-07-27 中国移动通信集团公司 Terminal authentication method, system and cloud server
CN106162607A (en) * 2015-03-24 2016-11-23 中兴通讯股份有限公司 The management method of a kind of virtual SIM card, device and system
CN106658467A (en) * 2016-10-31 2017-05-10 北京小米移动软件有限公司 Virtual SIM card management method and device
WO2019210759A1 (en) * 2018-05-04 2019-11-07 中国银联股份有限公司 Virtual card generating method, user terminal, and token server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047920A (en) * 2007-04-12 2007-10-03 华为技术有限公司 Method, system for prevent mobile phone stolen and anti-theft mobile and network side entity
US20140372743A1 (en) * 2013-06-12 2014-12-18 Lookout, Inc. Method and system for rendering a stolen mobile communications device inoperative
CN105813072A (en) * 2014-12-29 2016-07-27 中国移动通信集团公司 Terminal authentication method, system and cloud server
CN106162607A (en) * 2015-03-24 2016-11-23 中兴通讯股份有限公司 The management method of a kind of virtual SIM card, device and system
CN104883658A (en) * 2015-04-30 2015-09-02 努比亚技术有限公司 Virtual card information processing method and system
CN106658467A (en) * 2016-10-31 2017-05-10 北京小米移动软件有限公司 Virtual SIM card management method and device
WO2019210759A1 (en) * 2018-05-04 2019-11-07 中国银联股份有限公司 Virtual card generating method, user terminal, and token server

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115576460A (en) * 2022-01-06 2023-01-06 荣耀终端有限公司 Account binding method and electronic equipment

Also Published As

Publication number Publication date
CN111915293B (en) 2023-03-21

Similar Documents

Publication Publication Date Title
CN108234505B (en) Account login method and system
CN110048879B (en) Microservice registration method, microservice registration device, electronic equipment and computer-readable storage medium
US20150019419A1 (en) Information processing server, information processing method, information processing program product, and recording medium on which information processing program product is recorded
CN107347054B (en) Identity verification method and device
CN102841997A (en) Method and device for achieving authentication on intelligent device by mobile terminal
CN110738473B (en) Wind control method, system, device and equipment
CN105591743A (en) Method and device for carrying out identity authentication through equipment operation features of user terminal
EP3211578B1 (en) Verification method and apparatus
CN108600399A (en) Information-pushing method and Related product
CN104980420B (en) A kind of method for processing business, device, terminal and server
CN111611572B (en) Real-name authentication method and device based on face authentication
CN102833074A (en) Authentication method and related equipment
CN111915293B (en) Remote unbinding method and system for virtual card
CN103975567A (en) Dual-factor authentication method and virtual machine device
CN111859320A (en) Cross-system login-free method, device, equipment and readable storage medium
CN111104653A (en) User operation processing method and device, electronic equipment and readable storage medium
CN105577621B (en) Business operation verification method, device and system
CN110830263A (en) Automatic login method and device for vehicle-mounted system
CN104995635B (en) Picture sending method and device and terminal device
CN111784355B (en) Transaction security verification method and device based on edge calculation
CN112948804B (en) Program control method, device and computer readable storage medium
US20140351087A1 (en) Registration process
CN107203915B (en) Data storage method and device
CN111783708A (en) Network-based certificate issuing method and device
CN109347841A (en) MAC address authentication method, apparatus, terminal, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40040426

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant