CN112437428A - Verification method and server - Google Patents

Verification method and server Download PDF

Info

Publication number
CN112437428A
CN112437428A CN202011366861.3A CN202011366861A CN112437428A CN 112437428 A CN112437428 A CN 112437428A CN 202011366861 A CN202011366861 A CN 202011366861A CN 112437428 A CN112437428 A CN 112437428A
Authority
CN
China
Prior art keywords
verified
information
stolen
network
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011366861.3A
Other languages
Chinese (zh)
Other versions
CN112437428B (en
Inventor
肖征荣
白琳
邢建兵
田新雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011366861.3A priority Critical patent/CN112437428B/en
Publication of CN112437428A publication Critical patent/CN112437428A/en
Application granted granted Critical
Publication of CN112437428B publication Critical patent/CN112437428B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The application discloses a verification method and a server. The method comprises the following steps: acquiring broadcast messages sent by a plurality of processing nodes from a block chain network, wherein the broadcast messages comprise verification information; judging whether the number to be verified is stolen or not according to the verification information; under the condition that the number to be verified is stolen, generating a stolen identifier; and generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified so that each processing node processes the account corresponding to the number to be verified. Whether the number to be verified is stolen is judged according to the verification information, the stolen identification is generated under the condition that the number to be verified is determined to be stolen, and the alarm message is generated and sent to the block chain network according to the stolen identification and the number to be verified, so that each processing node processes the account corresponding to the number to be verified, the user property loss caused by the leakage of the identity information of the user is avoided, the safety of the user information and property is guaranteed, and the user experience degree is improved.

Description

Verification method and server
Technical Field
The present application relates to the field of communications technologies, and in particular, to a verification method and a server.
Background
At present, an intelligent terminal (e.g., a smart phone, etc.) used by a user mostly has a network payment function, and the user also binds own identity information with the intelligent terminal to verify identity verification under the condition of network payment.
However, if the smart phone of the user is stolen or lost, and the business hall of the telecom operator is just in an off-business state (for example, the business hall goes off duty), the user cannot supplement the card in time; although the mobile phone number can be subjected to loss reporting processing in a calling mode, a third party can still perform the loss reporting processing on the mobile phone number in a calling mode, so that the mobile phone number of the user is still in a stolen state, criminals can perform criminal activities all night, for example, identity information of the stolen user is obtained through the mobile phone number, and identity information of the user is leaked; or the commodity is purchased through the network payment function of the mobile phone, so that the property loss of the stolen user is caused.
Disclosure of Invention
Therefore, the application provides a verification method and a server, and the problem of how to ensure the safety of user information and property under the condition that the number to be verified is stolen is solved.
In order to achieve the above object, a first aspect of the present application provides an authentication method, including: acquiring broadcast messages sent by a plurality of processing nodes from a block chain network, wherein the broadcast messages comprise verification information; judging whether the number to be verified is stolen or not according to the verification information; under the condition that the number to be verified is stolen, generating a stolen identifier; and generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified so that each processing node processes the account corresponding to the number to be verified.
In some implementations, the verification information includes any one or more of operator information, social security information, bank regulatory information, and network loan information.
In some implementations, the operator information includes loss reporting information, drop off information, call records, and short message records for the number to be verified; judging whether the number to be verified is stolen according to the verification information, comprising the following steps: determining whether the number to be verified is stolen according to any one or more of the first judgment result, the second judgment result, the third judgment result, the fourth judgment result and the fifth judgment result; the first judgment result is a result obtained by judging whether the number to be verified is abnormal or not according to the loss reporting information and the release reporting information; the second judgment result is a result obtained by judging whether the number to be verified is obtained through the social security system through the user identity information corresponding to the number to be verified according to the social security information; the third judgment result is a result obtained by judging whether the number to be verified logs in the bank system and conducts financial transaction according to the bank supervision information; the fourth judgment result is a result obtained by judging whether the number to be verified is subjected to network loan operation according to the network loan information; and the fifth judgment result is a result obtained by judging whether the number to be verified is communicated with the bank system or the network loan system according to the call record and the short message record.
In some specific implementations, the loss reporting information includes any one or more of first location information of the number to be verified before the loss reporting operation is performed, first cell information providing communication service for the number to be verified, and an identifier of the loss reporting terminal; the information of unhook includes: and any one or more of second position information of the number to be verified after the number to be verified is subjected to the unhook operation, second cell information for providing communication service for the number to be verified and an identifier of the unhook terminal.
In some specific implementations, the obtaining the first determination result includes: determining a first judgment result according to any one or more of the first comparison result, the second comparison result and the third comparison result; wherein the first comparison result is a result obtained by comparing the first position information and the second position information; the second comparison result is a result obtained by comparing the first cell information and the second cell information; the third comparison result is a result obtained by comparing the identity of the loss reporting terminal and the identity of the unlinking terminal.
In some specific implementations, after generating and sending the alarm message to the blockchain network according to the stolen identifier and the number to be verified, the method further includes: inquiring emergency contact information corresponding to the number to be verified according to the number to be verified; and verifying the number to be verified according to the emergency contact information.
In some specific implementations, after generating and sending the alarm message to the blockchain network according to the stolen identifier and the number to be verified, the method further includes: and responding to a verification request sent by the mobile terminal corresponding to the number to be verified, and verifying the identity of the user of the mobile terminal.
In some implementations, the processing node includes any one or more of an operator network node, a social security system node, a bank administration system node, and a network credit platform administration system node.
In order to achieve the above object, a second aspect of the present application provides an authentication method, including: acquiring a number to be verified from a block chain network; inquiring a database according to the number to be verified to obtain verification information; generating and sending a broadcast message to the block chain network according to the verification information so that the number security guarantee system node obtains the verification information and verifies the number to be verified according to the verification information; acquiring alarm information sent by a number security system node from a block chain network, wherein the alarm information comprises an stolen identifier; and processing the account corresponding to the number to be verified according to the stolen identifier.
In some specific implementations, processing the account corresponding to the to-be-verified number according to the stolen identifier includes: and limiting the communication network function of the number to be verified according to the stolen identifier.
In some specific implementations, processing the account corresponding to the to-be-verified number according to the stolen identifier includes: and freezing the network payment account corresponding to the number to be verified according to the stolen identifier.
In some specific implementations, freezing a network payment account corresponding to a number to be verified according to the stolen identifier includes: and freezing the bank account corresponding to the number to be verified according to the stolen identifier.
In some specific implementations, freezing a network payment account corresponding to a number to be verified according to the stolen identifier includes: and stopping the use right of the network loan account corresponding to the number to be verified according to the stolen identifier.
In order to achieve the above object, a third aspect of the present application provides a number security system node server, including: the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring broadcast messages sent by a plurality of processing nodes from a block chain network, and the broadcast messages comprise verification information; the judging module is used for judging whether the number to be verified is stolen or not according to the verification information; the generation module is used for generating a stolen identifier under the condition that the number to be verified is determined to be stolen; and the first processing module is used for generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified so that each processing node processes the account corresponding to the number to be verified.
In order to achieve the above object, a fourth aspect of the present application provides a processing node server, comprising: the second acquisition module is used for acquiring the number to be verified from the block chain network; the query module is used for querying the database according to the number to be verified to obtain verification information; the broadcast message generating module is used for generating a broadcast message according to the verification information; the system comprises a sending module, a receiving module and a verification module, wherein the sending module is used for sending a broadcast message to a block chain network so as to enable a number security guarantee system node to obtain verification information and verify a to-be-verified number according to the verification information; the third acquisition module is used for acquiring alarm information sent by the number security system node from the block chain network, wherein the alarm information comprises the stolen identifier; and the second processing module is used for processing the account corresponding to the number to be verified according to the stolen identifier.
According to the verification method and the server, the verification information sent by the plurality of processing nodes is acquired from the block chain network, so that the number to be verified can be comprehensively verified; judging whether the number to be verified is stolen or not according to the verification information, generating an stolen identifier under the condition that the number to be verified is stolen, representing the condition that the number to be verified is stolen through the stolen identifier, processing the number to be verified in time and avoiding the number to be verified from being occupied by other people; according to the stolen identifier and the number to be verified, an alarm message is generated and sent to the block chain network, so that each processing node processes an account corresponding to the number to be verified, user property loss caused by leakage of user identity information is avoided, safety of user information and property is guaranteed, and user experience is improved.
Drawings
The accompanying drawings are included to provide a further understanding of the embodiments of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the principles of the disclosure and not to limit the disclosure. The above and other features and advantages will become more apparent to those skilled in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
fig. 1 shows a schematic flow chart of a verification method in an embodiment of the present application.
Fig. 2 shows a schematic flow chart of a verification method in a further embodiment of the present application.
Fig. 3 is a flow chart illustrating a verification method in a further embodiment of the present application.
Fig. 4 shows a block diagram of a node server of the number security system in the embodiment of the present application.
Fig. 5 is a block diagram showing components of a processing node server in the embodiment of the present application.
Fig. 6 shows a block diagram of the components of the authentication system in the embodiment of the present application.
Fig. 7 is a flowchart illustrating a working method of the verification system in the embodiment of the present application.
In the drawings:
401: the first obtaining module 402: judging module
403: the generation module 404: first processing module
501: the second obtaining module 502: query module
503: the broadcast message generation module 504: transmission module
505: the third obtaining module 506: second processing module
610: number security node server 620: loss reporting terminal
630: social security node server 640: bank supervision node server
650: the network loan platform supervision node server 660: operator node server
661: the operator short message node server 662: operator core network node server
663: user behavior analysis node server 670: hang-off terminal
Detailed Description
The following detailed description of embodiments of the present application will be made with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present application, are given by way of illustration and explanation only, and are not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 shows a schematic flow chart of a verification method in an embodiment of the present application. The verification method can be applied to a node server of a number security assurance system. As shown in fig. 1, the verification method includes the following steps:
step S101, acquiring broadcast messages sent by a plurality of processing nodes from the blockchain network.
Wherein the broadcast message includes authentication information. The verification information comprises any one or more of operator information, social security information, bank supervision information and network loan information.
For example, the bank supervision information may be bank account information corresponding to the number to be verified, information such as related operations performed by the number to be verified on the bank client, and the like, and the network loan information may be information such as a loan account number or a loan amount acquired on the network loan platform corresponding to the number to be verified. The verification information is only illustrated by way of example, and may be specifically set according to actual situations, and other non-illustrated verification information is also within the protection scope of the present application and is not described herein again.
In some implementations, the number to be verified is a mobile phone number used by the user or an identifier of a communication device issued by a wireless network operator, which is bound to the identity information of the user. For example, an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), etc.
In some implementations, the processing node includes any one or more of an operator network node, a social security system node, a bank administration system node, and a network credit platform administration system node.
The operator network node can be a core network node server of an operator or a short message center node server of the operator, and operator information can be obtained through the operator network node to verify whether the number to be verified has an abnormal condition during communication, so that the network safety of the number to be verified is ensured.
And step S102, judging whether the number to be verified is stolen or not according to the verification information.
Verifying the current state of the number to be verified through the verification information, and if the verification information comprises risk information (for example, the number to be verified logs in a financial system frequently (for example, logging in once in 1 hour) recently, and conducts actions such as transferring money or remitting money), determining that the number to be verified is stolen; otherwise, the number to be verified is determined to be safe, and normal communication can be carried out.
In some implementations, the operator information includes loss reporting information, drop off information, call records, and short message records for the number to be verified; judging whether the number to be verified is stolen according to the verification information, comprising the following steps: and determining whether the number to be verified is stolen or not according to any one or more of the first judgment result, the second judgment result, the third judgment result, the fourth judgment result and the fifth judgment result.
The first judgment result is a result obtained by judging whether the number to be verified is abnormal or not according to the loss reporting information and the release reporting information; the second judgment result is a result obtained by judging whether the number to be verified is obtained by the social security system through obtaining the user identity information corresponding to the number to be verified according to the social security information (for example, the identity information, the social security account number and the like of the registered user corresponding to the number to be verified in the social security system); the third judgment result is a result obtained by judging whether the number to be verified logs in the bank system and carries out financial transaction according to bank supervision information (such as transaction information among banks, transaction information among individual users and the like); the fourth judgment result is a result obtained by judging whether the number to be verified is subjected to network loan operation according to the network loan information (for example, the information such as the network loan account number, the loan amount and the like of the registered user corresponding to the number to be verified); and the fifth judgment result is a result obtained by judging whether the number to be verified is communicated with the bank system or the network loan system according to the call record and the short message record.
For example, the first determination result includes that the loss report information and the release report information are the same, or that the loss report information and the release report information are different. The second judgment result comprises that the number to be verified logs in the social security platform and obtains the identity card information corresponding to the number to be verified, or the number to be verified does not log in the social security platform. The third judgment result comprises that the number to be verified logs in the bank system and carries out financial transaction, or the number to be verified does not log in the bank system and does not carry out any financial transaction. The fourth judgment result comprises that the number to be verified is subjected to network loan operation (for example, a loan is applied through a certain network loan platform, and the like), or the number to be verified is not subjected to any network loan operation. Through the judgment results of the four different dimensions, whether the number to be verified has the risk of being stolen or not can be comprehensively judged, user information corresponding to the number to be verified is prevented from being leaked, and information safety of the number to be verified is guaranteed.
The loss reporting information comprises any one or more of first position information of the number to be verified before loss reporting operation, first cell information for providing communication service for the number to be verified and identification of a loss reporting terminal; the information of unhook includes: and any one or more of second position information of the number to be verified after the number to be verified is subjected to the unhook operation, second cell information for providing communication service for the number to be verified and an identifier of the unhook terminal.
In some specific implementations, the obtaining the first determination result includes: determining a first judgment result according to any one or more of the first comparison result, the second comparison result and the third comparison result; wherein the first comparison result is a result obtained by comparing the first position information and the second position information; the second comparison result is a result obtained by comparing the first cell information and the second cell information; the third comparison result is a result obtained by comparing the identity of the loss reporting terminal and the identity of the unlinking terminal.
It should be noted that if any one or more of the first comparison result, the second comparison result, and the third comparison result are different, the first determination result is characterized as that the loss report information and the release report information are different; and if the three comparison results are the same, indicating that the loss reporting information and the hang-up information are the same.
For example, the number to be verified is 138XXXX5678, the loss report information of the number to be verified includes that the first location information is in an XX cell in a B cell in a city a, the identifier of the first cell is 1234, and the identifier of the loss report terminal is acbd; and when the number to be verified is disconnected, the obtained disconnection information comprises second position information in a YY cell of a C area in A city, the identifier of the second cell is 4567, and the identifier of the disconnection terminal is cdse. By comparing the loss reporting information and the hang-up information, if the obtained three comparison results (i.e., the first location information is different from the second location information, the first cell information is different from the second cell information, and the identity of the loss reporting terminal is different from the identity of the hang-up terminal) are different, it indicates that the first determination result is that the loss reporting information and the hang-up information are different, and the number to be verified may be stolen. Each processing node in the block chain network needs to be reminded to process the number to be verified so as to ensure the security of the number to be verified.
And step S103, generating a stolen identifier under the condition that the number to be verified is determined to be stolen.
The stolen identifier indicates that the number to be verified is stolen by other people, the number to be verified is in illegal use, and the fund corresponding to the number to be verified is probably encroached by the stolen user, so that the number to be verified needs to be processed, and property loss of the registered user corresponding to the number to be verified is avoided.
And step S104, generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified.
The number to be verified corresponds to the stolen identifier one by one, and the stolen identifier is used for identifying the number to be verified to be stored in the stolen state.
When each processing node in the blockchain network acquires the alarm information from the blockchain network, the stolen identifier and the number to be verified can be acquired through analysis of the alarm information, and the account corresponding to the number to be verified is processed according to the stolen identifier.
In this embodiment, the number to be verified can be verified comprehensively by acquiring the verification information sent by the plurality of processing nodes from the blockchain network; judging whether the number to be verified is stolen or not according to the verification information, generating an stolen identifier under the condition that the number to be verified is stolen, representing the condition that the number to be verified is stolen through the stolen identifier, processing the number to be verified in time and avoiding the number to be verified from being occupied by other people; according to the stolen identifier and the number to be verified, an alarm message is generated and sent to the block chain network, so that each processing node processes an account corresponding to the number to be verified, user property loss caused by leakage of user identity information is avoided, safety of user information and property is guaranteed, and user experience is improved.
Fig. 2 shows a schematic flow chart of a verification method in a further embodiment of the present application. The verification method can be applied to a node server of a number security assurance system. As shown in fig. 2, the verification method includes the following steps:
step S201, acquiring broadcast messages sent by a plurality of processing nodes from the blockchain network.
And step S202, judging whether the number to be verified is stolen or not according to the verification information.
And step S203, generating a stolen identification under the condition that the number to be verified is determined to be stolen.
And step S204, generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified.
It should be noted that steps S201 to S204 are the same as steps S101 to S104 in the previous embodiment, and are not described again here.
Step S205, inquiring the emergency contact information corresponding to the number to be verified according to the number to be verified.
The emergency contact information is information of an emergency contact person preset by a user corresponding to the number to be verified, for example, the emergency contact information includes a telephone number of the emergency contact person, relationship information between the emergency contact person and the user, and the like. The emergency contact information is only illustrated by way of example, and may be specifically set according to actual situations, and other emergency contact information not illustrated is also within the protection scope of the present application, and is not described herein again.
For example, the number to be verified is used as an index, and the number is searched in the operator system database to obtain information such as the telephone number of the emergency contact.
And step S206, verifying the number to be verified according to the emergency contact information.
The verification of the number to be verified can be the comparison of the emergency contact information and the information of the current user of the number to be verified; or directly dialing the telephone number of the emergency contact in the emergency contact information, directly inquiring whether the number to be verified is stolen, and the like, further determining whether the number to be verified is stolen, determining the current use state of the number to be verified, and reducing the property loss of the user.
In some specific implementations, after generating and sending the alarm message to the blockchain network according to the stolen identifier and the number to be verified, the method further includes: and responding to a verification request sent by the mobile terminal corresponding to the number to be verified, and verifying the identity of the user of the mobile terminal.
It should be noted that, if the number to be authenticated is not stolen, but it is determined that the number to be authenticated is at a risk of being stolen by the stolen identifier, and at this time, the user of the mobile terminal corresponding to the number to be authenticated still needs to use the network function of the number to be authenticated, and after receiving a verification request sent by the user, it is required to perform identity authentication on the user, for example, perform online face recognition authentication on the user, so as to ensure that the user is indeed a registered user of the number to be authenticated, and ensure the use safety of the number to be authenticated. If the user is not the registered user of the number to be verified through face recognition, the communication function of the number to be verified still needs to be limited, for example, the network locking operation (for example, locking the communication functions such as the internet access function and the short message verification function corresponding to the number to be verified) is performed on the number to be verified, the bank card of the user corresponding to the number to be verified is frozen, and the like, so that a fraudulent user is prevented from performing the next transfer operation.
In this embodiment, the number to be verified can be verified comprehensively by acquiring the verification information sent by the plurality of processing nodes from the blockchain network; judging whether the number to be verified is stolen or not according to the verification information, generating an stolen identifier under the condition that the number to be verified is stolen, representing the condition that the number to be verified is stolen through the stolen identifier, processing the number to be verified in time and avoiding the number to be verified from being occupied by other people; and generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified so that each processing node processes the account corresponding to the number to be verified, thereby avoiding the property loss of the user caused by the leakage of the identity information of the user. And inquiring emergency contact information corresponding to the number to be verified according to the number to be verified, and verifying the number to be verified according to the emergency contact information. The security of the number to be verified is further ensured, the number to be verified is prevented from being stolen, the property safety of the user corresponding to the number to be verified is ensured, and the user experience degree is improved.
Fig. 3 is a flow chart illustrating a verification method in a further embodiment of the present application. The authentication method is applicable to a processing node server. As shown in fig. 3, the verification method includes the following steps:
step S301, a number to be verified is obtained from the block chain network.
The number to be verified is a number that receives the user's off-hook operation within a short time (e.g., within 1 hour) after the user performs the loss reporting operation, and particularly, after the operator goes off work, the user of the number to be verified performs the off-hook operation by telephone. The number to be verified is possible to have the risk of being stolen, corresponding verification needs to be carried out on the number to be verified, information leakage of a user is avoided, and property safety of the user is guaranteed.
Step S302, inquiring a database according to the number to be verified to obtain verification information.
Wherein, the verification information may include: the verification information comprises any one or more of operator information, social security information, bank supervision information and network loan information. The operator information comprises loss reporting information, hang-off information, call records and short message records of the number to be verified. For example, the bank supervision information may be bank account information corresponding to the number to be verified, information such as related operations performed by the number to be verified on the bank client, and the like, and the network loan information may be information such as a loan account number or a loan amount acquired on the network loan platform corresponding to the number to be verified. The verification information is only illustrated by way of example, and may be specifically set according to actual situations, and other non-illustrated verification information is also within the protection scope of the present application and is not described herein again.
Step S303, generating and sending the broadcast message to the block chain network according to the verification information.
After the number security assurance system node obtains the broadcast message from the block chain network, the broadcast message is analyzed to obtain verification information, and the number to be verified is verified according to the verification information.
In some implementations, before the broadcast message is sent, the broadcast message needs to be signed by using a private key of the processing node server, and a signed broadcast message is generated, so as to ensure security of transmission of the broadcast message in the blockchain network. After acquiring the broadcast message, the number security assurance system node also needs to verify the signed broadcast message by using a public key, so as to ensure that the broadcast message is sent to the number security assurance system node, and the number security assurance system node can acquire verification information therein only when the verification is passed.
Step S304, acquiring alarm information sent by the number security system node from the block chain network.
Wherein the alarm information comprises the stolen identity. The stolen identification indicates that the number to be verified is stolen by others and is in illegal use.
And step S305, processing the account corresponding to the number to be verified according to the stolen identifier.
The account corresponding to the number to be verified may be a bank account corresponding to the number to be verified, a network loan account corresponding to the number to be verified, a social security account of the user corresponding to the number to be verified, or the like. The account corresponding to the number to be verified is only illustrated by way of example, and may be specifically set according to actual conditions, and other account corresponding to the number to be verified that is not illustrated is also within the protection scope of the present application, and is not described herein again.
In some specific implementations, processing the account corresponding to the to-be-verified number according to the stolen identifier includes: and limiting the communication network function of the number to be verified according to the stolen identifier.
The communication network function of the number to be verified comprises the following steps: any one or more of a call function, a function of receiving/sending short messages, and a function of internet access using a mobile network.
The communication network function of the number to be verified is limited according to the stolen identifier, namely, under the condition that the number to be verified is stolen, each communication network function of the number to be verified is closed or limited, so that a thief can be prevented from further acquiring the identity information of the user, the fund of the user is stolen according to the identity information, the property loss of the user is reduced, and the property safety of the user is ensured.
In some specific implementations, processing the account corresponding to the to-be-verified number according to the stolen identifier includes: and freezing the network payment account corresponding to the number to be verified according to the stolen identifier.
The network payment account can be a payment account of various network platforms, or a network payment account corresponding to each bank. Such as payment account numbers for internet banking, etc. According to the stolen identifier, the network payment account corresponding to the number to be verified is frozen, so that the fund in the network payment account is prevented from being stolen, and the property safety of the user is ensured.
In some specific implementations, freezing a network payment account corresponding to a number to be verified according to the stolen identifier includes: and freezing the bank account corresponding to the number to be verified according to the stolen identifier.
The bank account number comprises an online payment account number of a bank bound with the number to be verified. For example, the registered user corresponding to the number to be verified is a user a, the user a uses the identity information of the user a to set a payment account C of an online bank in a bank B, and binds the payment account C with the number to be verified, when the user a needs to perform online payment, the user a only needs to input the number to be verified, and then the corresponding verification code can be obtained, and the online payment is performed, so as to complete the online consumption function. If the number to be verified is stolen, the thief only needs to use the number to be verified to use the payment account C, and the fund in the payment account C is stolen. The bank account corresponding to the number to be verified is frozen according to the stolen identifier, so that a thief can be prevented from using funds in the payment account C, property loss of a user is avoided, safety of user information and property is guaranteed, and user experience is improved.
In some specific implementations, freezing a network payment account corresponding to a number to be verified according to the stolen identifier includes: and stopping the use right of the network loan account corresponding to the number to be verified according to the stolen identifier.
Wherein the network loan account number is a pre-consumable credit account issued by a network credit agency. For example, the registered user corresponding to the number to be verified is user a, and user a applies for a credit card in an M credit agency (or bank) by using the identity information of user a, and binds the card number and consumption password of the credit card with the number to be verified, so that user a can directly use the number to be verified for credit consumption when performing network consumption, that is, indirectly use the credit limit in the credit card, so that the credit amount of user a is stolen. By stopping the use permission of the network loan account corresponding to the number to be verified according to the stolen identifier, the condition that the stolen user indirectly uses the credit line of the user A through the number to be verified can be avoided, and property loss of the user is avoided.
In this embodiment, the number to be verified is obtained from the block chain network, so that the number to be verified with the risk of being stolen can be processed in time, and the number is prevented from being stolen. Inquiring a database according to the number to be verified to obtain verification information; generating a broadcast message according to the verification information; sending a broadcast message to a block chain network so that a number security guarantee system node obtains verification information and verifies a to-be-verified number according to the verification information; the method comprises the steps of obtaining alarm information sent by a number security guarantee system node from a block chain network, limiting a communication network function corresponding to a number to be verified according to an embezzled identifier in the alarm information, and freezing a network payment account corresponding to the number to be verified (for example, a bank account is frozen, or the use permission of a network loan account is stopped), so that an embezzler can be prevented from embezzleing the number to be verified to perform network consumption, the fund security of a registered user corresponding to the number to be verified is guaranteed, and the user experience is improved.
Fig. 4 shows a block diagram of a node server of the number security system in the embodiment of the present application. As shown in fig. 4, the number security system node server includes the following modules:
a first obtaining module 401, configured to obtain, from a blockchain network, broadcast messages sent by multiple processing nodes, where the broadcast messages include verification information; a judging module 402, configured to judge whether the number to be verified is stolen according to the verification information; a generating module 403, configured to generate a stolen identifier when it is determined that the number to be verified is stolen; the first processing module 404 is configured to generate and send an alarm message to the blockchain network according to the stolen identifier and the number to be verified, so that each processing node processes an account corresponding to the number to be verified.
In this embodiment, the first obtaining module obtains the verification information sent by the plurality of processing nodes from the blockchain network, so that the number to be verified can be comprehensively verified; the judging module is used for judging whether the number to be verified is stolen or not according to the verification information, the generation module is used for generating an stolen identifier under the condition that the number to be verified is determined to be stolen, the stolen condition of the number to be verified is represented by the stolen identifier, the number to be verified can be processed in time, and the number to be verified is prevented from being occupied by other people; the first processing module is used for generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified, so that each processing node processes an account corresponding to the number to be verified, the user property loss caused by the leakage of the identity information of the user is avoided, the safety of the user information and property is guaranteed, and the user experience degree is improved.
Fig. 5 is a block diagram showing components of a processing node server in the embodiment of the present application. As shown in fig. 5, the processing node server includes the following modules:
a second obtaining module 501, configured to obtain a number to be verified from a blockchain network; the query module 502 is configured to query a database according to a number to be verified to obtain verification information; a broadcast message generating module 503, configured to generate a broadcast message according to the verification information; a sending module 504, configured to send a broadcast message to a block chain network, so that a node of a number security assurance system obtains verification information, and verifies a to-be-verified number according to the verification information; a third obtaining module 505, configured to obtain, from the blockchain network, alarm information sent by a number security system node, where the alarm information includes an stolen identifier; the second processing module 506 is configured to process the account corresponding to the to-be-verified number according to the stolen identifier.
In this embodiment, the number to be verified is obtained from the blockchain network through the second obtaining module, so that the number to be verified with the risk of being stolen can be processed in time, and the number is prevented from being stolen. Inquiring a database by using an inquiry module according to the number to be verified to obtain verification information; generating a broadcast message by using a broadcast message generation module according to the verification information; sending a broadcast message to a block chain network by using a sending module so that a number security guarantee system node obtains verification information and verifies a to-be-verified number according to the verification information; the third acquisition module is used for acquiring the alarm information sent by the number security guarantee system node from the block chain network, and the second processing module is used for processing the account corresponding to the number to be verified according to the stolen identifier in the alarm information, so that a thief is prevented from stealing the number to be verified to consume the network, the fund security of the registered user corresponding to the number to be verified is ensured, and the user experience degree is improved.
It should be noted that each module referred to in this embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present application, a unit that is not so closely related to solving the technical problem proposed by the present application is not introduced in the present embodiment, but it does not indicate that no other unit exists in the present embodiment.
Fig. 6 shows a block diagram of the components of the authentication system in the embodiment of the present application. As shown in fig. 6, the method specifically includes the following steps: the system comprises a number security system node server 610, a loss reporting terminal 620, a social security node server 630, a bank supervision node server 640, a network credit platform supervision node server 650, an operator node server 660 and a release terminal 670.
Wherein, the operator node server 660 includes: an operator short message node server 661, an operator core network node server 662 and a user behavior analysis node server 663.
Fig. 7 is a flowchart illustrating a working method of the verification system in the embodiment of the present application. As shown in fig. 7, the method specifically includes the following steps.
In step S701, the loss reporting terminal 620 logs in the operator node server 660 to report the loss of the to-be-verified number corresponding to the loss reporting terminal 620.
For example, the loss reporting terminal 620 may log in the operator node server 660 by calling an operator customer service telephone (e.g., 10010/10000/10086), or by using a mobile phone client (e.g., a mobile phone business office) of the loss reporting terminal 620, and perform loss reporting processing on the number to be verified, thereby generating loss reporting information.
The loss reporting information includes any one or more of first location information (e.g., latitude and longitude information, etc.) of the number to be verified before the loss reporting operation is performed, first Cell information (e.g., Physical Cell Identifier (PCI), etc.) providing communication service for the number to be verified, and an Identifier of the loss reporting terminal 620.
In step S702, the detach terminal 670 logs in the operator node server 660 again, and performs the detach operation on the number to be authenticated, thereby generating detach information.
The hang-off operation is an hang-off operation performed on the number to be authenticated again within a short time (for example, within one hour) after the loss report terminal 620 performs the loss report operation. The unhook information includes any one or more of second location information of the to-be-authenticated number after the operation of unhook, second cell information (e.g., PCI, etc.) providing communication service for the to-be-authenticated number, and an identifier of the unhook terminal 670 (e.g., IMSI, etc.) of the to-be-authenticated number.
In step S703, the operator node server 660 generates a first broadcast message according to the information of the number to be verified that is disconnected and the information of the loss report, signs the first broadcast message using its own private key, and generates and sends the signed first broadcast message to the blockchain network, so that the number security system node server 610 obtains the first broadcast message.
In step S704, since the number to be verified is subjected to both loss reporting processing and hang learning processing, and the two processing processes are executed by different terminals, the number to be verified in the number security assurance system node server 610 is marked as a mobile phone number with a risk of fraudulent use, and the monitoring operation on the number to be verified is started to prevent the number to be verified from being stolen. For example, the number security node server 610 generates a second broadcast message according to the number to be verified (e.g. 186xxxx8888), the loss report information and the hang report information,
step S705, the number security assurance node server 610 performs private key signature on the second broadcast message, and generates and sends the signed second broadcast message to the blockchain network.
In step S706, the operator core network node server 662 in the operator node server 660 receives the second broadcast message, verifies the private key signature of the second broadcast message, obtains a number to be verified (e.g., 186xxxx8888), loss report information and release information of the number to be verified after the verification is passed, performs private key signature on the above information, generates and sends a signed third broadcast message to the blockchain network, so that the number security assurance node server 610 obtains the third broadcast message.
For example, the third broadcast message may further include information such as information about the disconnection of the number to be authenticated by the operator core network node server 662, and information about the network in which the number to be authenticated finally logs in the registration network.
It should be noted that, after the operator short message node server 661 in the operator node server 660 receives the third broadcast message and passes the signature verification of the private key thereof, the number to be verified is obtained; calling a short message record corresponding to the number to be verified according to the number to be verified; according to the short message record, judging whether the number to be verified sends short messages to a plurality of strange numbers or not, and whether verification short messages sent by a plurality of banks or verification short messages sent by a network credit platform are received or not, and obtaining a judgment result; and generating a fourth broadcast message according to the judgment result and the number to be verified, performing private key signature on the fourth broadcast message, and generating and sending the signed fourth broadcast message to the blockchain network, so that the number security assurance node server 610 obtains the fourth broadcast message.
The user behavior analysis node server 663 in the operator node server 660 receives the third broadcast message, obtains a number to be verified after the private key signature verification is passed, searches an internal database of the user according to the number to be verified, and obtains a first search result, wherein the first search result comprises a call record corresponding to the number to be verified; judging whether the number to be verified has communicated with a plurality of strange telephone numbers or not according to the call record; and if so, carrying out private key signature on the call record information, generating and sending a fifth broadcast message to the blockchain network, so that the number security node server 610 obtains the fifth broadcast message.
Step S707, after receiving the third broadcast message and verifying the private key signature, the social security node server 630 obtains a to-be-verified number, and according to the to-be-verified number, the social security node server 630 searches its own database, determines whether the to-be-verified number logs in the social security node server 630, and obtains identity information corresponding to the to-be-verified number; if the social security node server 630 is determined to be logged in, a sixth broadcast message is generated according to the operation information of the number to be verified on the social security node server 630, the time information corresponding to the operation information, and the identity information corresponding to the number to be verified. And performs private key signature on the sixth broadcast message, and generates and sends the signed sixth broadcast message to the blockchain network, so that the number security assurance node server 610 obtains the sixth broadcast message.
In step S708, the bank monitoring node server 640 receives the third broadcast message, obtains the number to be verified after the private key signature verification passes, searches its internal database according to the number to be verified, and obtains a second search result, where the second search result includes financial transaction information (e.g., financial operation information such as login, registration, card binding, and account transfer) of whether the number to be verified logs in the bank system and is performed, and time information corresponding to the performed financial transaction information. The bank monitoring node server 640 generates a seventh broadcast message according to the number to be verified, the financial transaction information corresponding to the number to be verified, and the time information corresponding to the financial transaction information, and signs the seventh broadcast message using its own private key, and generates and transmits the signed seventh broadcast message to the blockchain network, so that the number security node server 610 obtains the seventh broadcast message.
Step S709, the network loan platform supervisory node server 650 receives the third broadcast message, obtains the number to be verified after the private key signature verification passes, searches its own internal database according to the number to be verified, and obtains a third search result, where the third search result includes whether the number to be verified has performed a network loan operation, network loan operation information (such as information of operations of login, registration, loan, and the like) during the network loan operation, and time information corresponding to the performed network loan operation information. The network credit platform supervision node server 650 generates an eighth broadcast message according to the number to be verified, the network credit operation information corresponding to the number to be verified, and the time information corresponding to the network credit operation information, and signs the eighth broadcast message using its own private key, and generates and sends the signed eighth broadcast message to the block chain network, so that the number security assurance node server 610 obtains the eighth broadcast message.
Step S710, the number security system node server 610 obtains a third broadcast message to an eighth broadcast message from the blockchain network, respectively. And respectively verifying the private key signature of each broadcast message, and obtaining the number to be verified when the verification is passed. Acquiring whether the user logs in the social security node server 630 through the terminal to acquire identity card information according to the number to be authenticated; whether to log in the bank monitoring node server 640 for relevant operation; whether to register and bind cards is performed by the logging-in network credit platform supervision node server 650; whether operation information of the verification short messages sent by a plurality of banks and a plurality of network credit platform servers and the like is received or not is judged according to the operation information and information such as identification, position information, call records and the like of user terminal equipment used when a user performs loss reporting processing and release reporting processing on the number to be verified. If any one or more of the following conditions are determined to be true: 1) the number to be verified has a plurality of strange numbers to carry out communication; 2) logging in a plurality of network credit platform servers or banks for registration, card swiping and other operations; 3) the identification of the terminal device performing the loss reporting processing and the drop reporting processing is different from the identification of the terminal device stored in the operator core network node server 662, 4) the information of the registered cell is different, and 5) the geographical location is different. The number to be verified is stolen, and an stolen identifier is generated; and generating an alarm message according to the stolen identifier and the number to be verified.
In step S711, the number security assurance system node server 610 sends an alarm message to the blockchain network, so that each processing node server in the blockchain network (e.g., the bank supervision node server 640, the network credit platform supervision node server 650, the operator node server 660, etc.) processes the mobile terminal corresponding to the to-be-verified number.
In one specific implementation, the number security system node server 610 may further call an emergency contact (a contact preset by the user and stored in the operator node server 660) corresponding to the number to be verified to further confirm whether the number to be verified is stolen.
In step S712, the operator node server 660 performs network locking operation on the number to be verified according to the alarm information acquired from the blockchain network.
For example, the operator node server 660 locks the communication functions such as the internet access function and the short message verification function corresponding to the number to be verified, so as to prevent the fraudulent user from performing the next transfer operation.
In step S713, the bank supervisory node server 640 freezes the bank card of the user corresponding to the number to be verified according to the alarm information acquired from the blockchain network, so as to avoid the fund loss of the user.
In step S714, the network credit platform monitoring node server 650 freezes the account corresponding to the number to be verified according to the alarm information acquired from the blockchain network, so as to avoid the fund loss of the user.
In step S715, the detach terminal 670 obtains the alarm information sent by the node server 610 of the number security system from the blockchain network, and learns that the communication network service of the detach terminal 670 is stopped according to the alarm information. However, if the off-hook terminal 670 needs to continue using the internet function, the user of the off-hook terminal 670 is authenticated online, and the number to be authenticated can continue to be used after the authentication is successful.
For example, the user of the off-hook terminal 670 is subjected to face information acquisition by the camera function of the off-hook terminal 670, and online face recognition verification and the like are performed.
In this embodiment, after the loss reporting terminal performs the loss reporting operation on the number to be verified, the loss reporting terminal performs the hang-up removal operation on the number to be verified again in a short time, which indicates that the number to be verified has a risk of being stolen. Judging whether the number to be verified is stolen or not through various verification information in the third to eighth broadcast messages, and comprehensively measuring the security of the number to be verified; and under the condition that the number to be verified is stolen, generating a stolen identifier, generating an alarm message according to the stolen identifier and the number to be verified, and then sending the alarm message to the blockchain network so as to enable each processing node server (such as a bank supervision node server, a network credit platform supervision node server, an operator node server and the like) in the blockchain network to process the mobile terminal corresponding to the number to be verified. The property loss of the stolen user is avoided, the safety of the user is improved, and the user experience is improved.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present application, and that the present application is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the application, and these changes and modifications are to be considered as the scope of the application.

Claims (15)

1. A method of authentication, the method comprising:
acquiring broadcast messages sent by a plurality of processing nodes from a block chain network, wherein the broadcast messages comprise verification information;
judging whether the number to be verified is stolen or not according to the verification information;
under the condition that the number to be verified is determined to be stolen, generating an stolen identifier;
and generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified so that each processing node processes the account corresponding to the number to be verified.
2. The method of claim 1, wherein the verification information comprises any one or more of operator information, social security information, bank administration information, and network loan information.
3. The method of claim 2, wherein the operator information comprises loss report information, release report information, call record and short message record of the number to be verified;
the judging whether the number to be verified is stolen according to the verification information comprises the following steps:
determining whether the number to be verified is stolen according to any one or more of the first judgment result, the second judgment result, the third judgment result, the fourth judgment result and the fifth judgment result;
wherein the first judgment result is a result obtained by judging whether the number to be verified is abnormal or not according to the loss reporting information and the release information, the second judgment result is a result obtained by judging whether the number to be verified is obtained through the social security system by obtaining the user identity information corresponding to the number to be verified according to the social security information, the third judgment result is a result obtained by judging whether the number to be verified logs in a bank system and conducts financial transaction according to the bank supervision information, the fourth judgment result is a result obtained by judging whether the number to be verified is subjected to network loan operation according to the network loan information, and the fifth judgment result is a result obtained by judging whether the number to be verified is communicated with the bank system or the network loan system according to the call record and the short message record.
4. The method according to claim 3, wherein the loss reporting information includes any one or more of first location information of the number to be verified before loss reporting operation is performed, first cell information providing communication service for the number to be verified, and an identifier of a loss reporting terminal; the information of the unhook includes: and any one or more of second position information of the number to be verified after the number to be verified is subjected to the unhook operation, second cell information for providing communication service for the number to be verified and an identifier of the unhook terminal.
5. The method of claim 4, wherein obtaining the first determination comprises:
determining the first judgment result according to any one or more of the first comparison result, the second comparison result and the third comparison result;
wherein the first comparison result is a result obtained by comparing the first position information and the second position information; the second comparison result is a result obtained by comparing the first cell information and the second cell information; and the third comparison result is a result obtained by comparing the identifier of the loss reporting terminal with the identifier of the release terminal.
6. The method according to any one of claims 1 to 5, wherein after generating and sending an alarm message to the blockchain network according to the stolen identifier and the number to be verified, the method further comprises:
inquiring emergency contact information corresponding to the number to be verified according to the number to be verified;
and verifying the number to be verified according to the emergency contact information.
7. The method according to any one of claims 1 to 5, wherein after generating and sending an alarm message to the blockchain network according to the stolen identifier and the number to be verified, the method further comprises:
and responding to a verification request sent by the mobile terminal corresponding to the number to be verified, and performing identity verification on the user of the mobile terminal.
8. The method according to any one of claims 1 to 5, wherein the processing nodes comprise any one or more of an operator network node, a social security system node, a bank administration system node and a network credit platform administration system node.
9. A method of authentication, the method comprising:
acquiring a number to be verified from a block chain network;
inquiring a database according to the number to be verified to obtain verification information;
generating and sending a broadcast message to the block chain network according to the verification information so that a number security guarantee system node obtains the verification information and verifies a to-be-verified number according to the verification information;
acquiring alarm information sent by the number security guarantee system node from the block chain network, wherein the alarm information comprises an stolen identifier;
and processing the account corresponding to the number to be verified according to the stolen identifier.
10. The method of claim 9, wherein the processing the account corresponding to the number to be verified according to the stolen identifier includes:
and limiting the communication network function of the number to be verified according to the stolen identifier.
11. The method of claim 9, wherein the processing the account corresponding to the number to be verified according to the stolen identifier includes:
and freezing the network payment account corresponding to the number to be verified according to the stolen identifier.
12. The method according to claim 11, wherein the freezing the network payment account corresponding to the number to be verified according to the stolen identity comprises:
and freezing the bank account corresponding to the number to be verified according to the stolen identifier.
13. The method according to claim 11, wherein the freezing the network payment account corresponding to the number to be verified according to the stolen identity comprises:
and stopping the use right of the network loan account corresponding to the number to be verified according to the stolen identifier.
14. A number security system node server, comprising:
a first obtaining module, configured to obtain, from a blockchain network, a broadcast message sent by multiple processing nodes, where the broadcast message includes verification information;
the judging module is used for judging whether the number to be verified is stolen or not according to the verification information;
the generation module is used for generating a stolen identifier under the condition that the number to be verified is determined to be stolen;
and the first processing module is used for generating and sending an alarm message to the block chain network according to the stolen identifier and the number to be verified so that each processing node processes the account corresponding to the number to be verified.
15. A processing node server, comprising:
the second acquisition module is used for acquiring the number to be verified from the block chain network;
the query module is used for querying a database according to the number to be verified to obtain verification information;
the broadcast message generating module is used for generating a broadcast message according to the verification information;
the sending module is used for sending the broadcast message to the block chain network so that the number security guarantee system node obtains the verification information and verifies the number to be verified according to the verification information;
a third obtaining module, configured to obtain, from the blockchain network, alarm information sent by the number security system node, where the alarm information includes an stolen identifier;
and the second processing module is used for processing the account corresponding to the number to be verified according to the stolen identifier.
CN202011366861.3A 2020-11-27 2020-11-27 Verification method and server Active CN112437428B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011366861.3A CN112437428B (en) 2020-11-27 2020-11-27 Verification method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011366861.3A CN112437428B (en) 2020-11-27 2020-11-27 Verification method and server

Publications (2)

Publication Number Publication Date
CN112437428A true CN112437428A (en) 2021-03-02
CN112437428B CN112437428B (en) 2022-08-19

Family

ID=74698208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011366861.3A Active CN112437428B (en) 2020-11-27 2020-11-27 Verification method and server

Country Status (1)

Country Link
CN (1) CN112437428B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113068178A (en) * 2021-03-25 2021-07-02 中国联合网络通信集团有限公司 Terminal authentication method and server
CN113079146A (en) * 2021-03-25 2021-07-06 中国联合网络通信集团有限公司 Verification method and device
CN114928840A (en) * 2022-06-16 2022-08-19 中国联合网络通信集团有限公司 Identity authentication method, device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010211412A (en) * 2009-03-09 2010-09-24 Saxa Inc Terminal equipment monitoring system
WO2015085940A1 (en) * 2013-12-13 2015-06-18 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN105142120A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone anti-theft system
CN106097051A (en) * 2016-06-06 2016-11-09 上海河广信息科技有限公司 Online transaction burglary-resisting system and method and online transaction security system and method
KR101967384B1 (en) * 2018-01-02 2019-04-09 전인호 Method for providing authentication service in goods transaction

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010211412A (en) * 2009-03-09 2010-09-24 Saxa Inc Terminal equipment monitoring system
WO2015085940A1 (en) * 2013-12-13 2015-06-18 北京奇虎科技有限公司 Mobile terminal antitheft method and client
CN105142120A (en) * 2015-08-10 2015-12-09 闻泰通讯股份有限公司 Mobile phone anti-theft system
CN106097051A (en) * 2016-06-06 2016-11-09 上海河广信息科技有限公司 Online transaction burglary-resisting system and method and online transaction security system and method
KR101967384B1 (en) * 2018-01-02 2019-04-09 전인호 Method for providing authentication service in goods transaction

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李纪平等: "基于Android的手机防盗软件的研究与实现", 《湖北工程学院学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113068178A (en) * 2021-03-25 2021-07-02 中国联合网络通信集团有限公司 Terminal authentication method and server
CN113079146A (en) * 2021-03-25 2021-07-06 中国联合网络通信集团有限公司 Verification method and device
CN114928840A (en) * 2022-06-16 2022-08-19 中国联合网络通信集团有限公司 Identity authentication method, device and storage medium
CN114928840B (en) * 2022-06-16 2023-10-13 中国联合网络通信集团有限公司 Identity verification method, device and storage medium

Also Published As

Publication number Publication date
CN112437428B (en) 2022-08-19

Similar Documents

Publication Publication Date Title
CN112437428B (en) Verification method and server
US20080281737A1 (en) System and Method for Authenticating the Identity of a User
CN101959183B (en) Mobile user identification code IMSI protection method based on pseudonym
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN101770669A (en) Bank automatic warning system and method thereof
CN1980459B (en) Method for realizing information destroying at network side
CN110598383B (en) Method and device for removing account authority limit
CN100413368C (en) A method for verifying user card validity
US20220147986A1 (en) Method and system for single purpose public keys for public ledgers
CN109587683B (en) Method and system for preventing short message from being monitored, application program and terminal information database
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
CN106778334A (en) The guard method of account information and mobile terminal
CN114553573A (en) Identity authentication method and device
CN112564915B (en) Verification method, one-number multi-terminal management server and terminal
CN112950199B (en) Anti-theft method and server for communication identification
CN112954688B (en) Communication identifier verification method, server and core network equipment
CN112566098A (en) Identification information verification method and server
KR101152892B1 (en) Method and apparatus for mmanaging withdrawal with bank card
US20160371676A1 (en) Checking the validity of a transaction via the location of a terminal
KR20040040412A (en) Management System and method of Social Security number
KR20050010606A (en) Method for preventing illegal use of service informations registered and System using the same
KR20050121358A (en) Protection method of financial accounts using the password
WO2022085265A1 (en) Fraud detection device for checking and authenticating person, application fraud detection method, and application fraud detection program
CN116691415B (en) Charging information management method, system, equipment and medium
CN101753314A (en) Another circuit security system and method operated by adopting account in telephone limiting server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant