CN113222685A - Order form verification and cancellation method, device, equipment and storage medium - Google Patents
Order form verification and cancellation method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN113222685A CN113222685A CN202110370977.2A CN202110370977A CN113222685A CN 113222685 A CN113222685 A CN 113222685A CN 202110370977 A CN202110370977 A CN 202110370977A CN 113222685 A CN113222685 A CN 113222685A
- Authority
- CN
- China
- Prior art keywords
- order
- verification
- mobile terminal
- checking
- cancellation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 107
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000001133 acceleration Effects 0.000 claims description 26
- 238000012790 confirmation Methods 0.000 claims description 12
- 238000010586 diagram Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
- G06Q30/0637—Approvals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses an order form verification method, an order form verification device, order form verification equipment and a storage medium. An order cancellation method, comprising: responding to a trigger message of order verification and cancellation, and acquiring verification information of the order verification and cancellation; verifying the order verification according to the verification information of the order verification; and if the verification is not passed, the order is not checked and sold. According to the technical scheme, the order is verified according to the verification information of the order; and if the verification is not passed, the order is not checked and sold. The loss caused by the leakage of the two-dimension code of the order is avoided, and the safety of the user is improved.
Description
Technical Field
The application relates to the technical field of computers, in particular to an order form verification method, an order form verification device, order form verification equipment and a storage medium.
Background
After a user generates an order by online ordering, the user can get products in an entity shop online, and when the user gets ordered goods, the user can show a two-dimensional code of the order. After the front end of the merchant scans the two-dimensional code, the server at the rear end can check and sell the order. However, in the prior art, if the two-dimensional code of the user order is leaked or stolen by a third party, the third party may steal the two-dimensional code to falsify the product of the user order, which causes loss to the user.
Disclosure of Invention
The present application mainly aims to provide an order verification method, an order verification device, an order verification apparatus, and a storage medium, so as to solve the above problems.
In order to achieve the above object, according to one aspect of the present application, there is provided an order approval method including:
responding to a trigger message of order verification and cancellation, and acquiring verification information of the order verification and cancellation;
verifying the order verification according to the verification information of the order verification;
and if the verification is not passed, the order is not checked and sold.
In one embodiment, if the check passes, the order is checked out.
In one embodiment, the verification information includes: and generating the acceleration existence state of the mobile terminal of the order, the Bluetooth address of the mobile terminal and the time stamp of the order.
In one embodiment, verifying the order verification according to the order verification information includes:
and if the acceleration state of the mobile terminal is no acceleration, sending an alarm short message to the mobile terminal to inform a user that the order is checked and sold.
In one embodiment, if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address which is sent by the mobile terminal and is subjected to encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
carrying out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, if so, a timestamp of the order is determined;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one implementation mode, if yes, the terminal is determined to be a legal terminal, and a short message confirmation message is sent to the mobile terminal, so that the user determines whether to check and sell the order;
receiving a short message reply confirmation message sent by the mobile terminal; and carrying out verification and cancellation on the order.
In order to achieve the above object, according to a second aspect of the present application, there is provided an order approval apparatus; the device includes:
the acquisition and verification information module is used for responding to a trigger message of order verification and verification to acquire verification and verification information of the order;
the checking module is used for checking the order verification according to the verification information of the order verification;
and the checking and canceling module is used for not checking and canceling the order if the checking module determines that the checking is not passed.
In one embodiment, the verification module is further configured to verify the order if the verification passes.
In an embodiment, the verification module is further configured to send an alarm short message to the mobile terminal to notify the user that the order is checked and cancelled if the acceleration of the mobile terminal is in a no-acceleration state.
In one embodiment, the checking module is further configured to receive a first encrypted MAC address which is sent by the mobile terminal and is subjected to an encryption operation if the acceleration state of the mobile terminal is acceleration;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
carrying out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, the checking module is further configured to, if so, determine a timestamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, the system further comprises a short message sending and receiving module, configured to send a short message confirmation message to the mobile terminal if the checking module determines that the time difference is greater than or equal to a predetermined threshold, so that the user determines whether to approve the order; receiving a short message reply confirmation message sent by the mobile terminal;
and the verification and cancellation module is used for verifying and canceling the order after the short message receiving and sending module receives the short message reply confirmation message sent by the mobile terminal.
To achieve the above object, according to a third aspect of the present application, there is provided an apparatus; comprising at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform any of the methods described above.
According to a fourth aspect of the present application, there is provided a computer readable storage medium having one or more program instructions embodied therein for performing the method of any one of the above.
According to the technical scheme, after responding to the triggering message of order verification, the server acquires verification information of the order verification; verifying the order verification according to the verification information of the order verification; and if the verification is not passed, the order is not checked and sold. The safety of the order is improved, and the risk that the user is falsely claimed due to the fact that the two-dimensional code of the order is leaked is reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a flow chart of a method for order verification according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an order verification apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an order verification apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
When a user takes an order online, the user can show the two-dimensional code of the order, and after the front-end equipment of a merchant scans the two-dimensional code, the back-end server can check and sell the order. However, in the prior art, if the two-dimensional code of the user's order is leaked, a third party may use the stolen two-dimensional code to falsify the product of the user's order, which causes a loss to the user.
Based on this, the present application provides an order verification method, including:
step S101, responding to a trigger message of order form verification, and acquiring verification information of the order form verification;
specifically, when the user uses the two-dimensional code of the order to get the goods from the offline physical store and to check and sell the order, the user can show the two-dimensional code of the order, and after the front end scans the two-dimensional code, the trigger message of order checking and selling is sent to the server at the rear end, so that the server at the rear end checks and sells the order.
Step S102, verifying the order verification according to the verification information of the order verification;
and step S103, if the order is not verified, the order is not checked. And if the order passes the verification, checking and canceling the order.
According to the method provided by the invention, after the server receives the trigger message of order verification, the order verification is carried out, if the verification is not passed, the order verification is not carried out, so that the situations that the product is falsely claimed and the order is maliciously verified and sold due to the leakage of the user order are avoided, and the safety of the user order is improved.
In one embodiment, the verification information includes: and whether the acceleration of the mobile terminal generating the order, the Bluetooth address of the mobile terminal and the starting time of the mobile terminal exist or not.
In one embodiment, verifying the order verification according to the order verification information includes:
and if the acceleration state of the mobile terminal is no acceleration, sending an alarm short message to the mobile terminal to inform a user that the order is checked and sold.
Specifically, the method comprises the following steps: recording a time point T1 of the generation of the acceleration of the mobile terminal;
recording a time point T2 of sending a trigger message for triggering the verification and sale order to the back-end server after the order two-dimensional code is acquired;
calculating a difference value T between the time point T1 and the time point T2;
determining that an acceleration associated with the verification motion is generated if T is less than a predetermined time threshold;
if T is greater than or equal to a predetermined time threshold, it is determined that no acceleration associated with the verification motion is generated.
Illustratively, after a user a uses a mobile terminal to generate an order online, and then gets a product related to the order in a physical store, the user a needs to first draw out a mobile phone, then opens an application App, and then presents an order two-dimensional code, so that the user a can get the product and check and sell the order. The above-mentioned actions inevitably generate the acceleration of the mobile phone. And a difference value in time is generated, the difference value is generally within 5 minutes, the time threshold value can be flexibly set, and the method is not limited in the application. And if the time difference is larger than the time threshold, the mobile terminal for checking and selling the order is determined not to be the mobile terminal for generating the order, namely an illegal terminal.
If the two-dimensional code of the user A is leaked, the user C obtains the two-dimensional code. User a has not gone home to the store. No mobile phone is used, no acceleration information is generated, but a trigger message for order verification is received. Then a short message is sent to the mobile phone of the user A to inform a person to take the order product, thereby playing the role of alarming.
In one embodiment, if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address which is sent by the mobile terminal and is subjected to encryption operation;
the mobile terminal carries out Hash encryption signature operation on the Bluetooth MAC address, and a character string is obtained after encryption. And the character string is sent to the server, so that the concealment of the Bluetooth MAC address of the mobile terminal is enhanced, and the safety is improved.
The encryption algorithm can also adopt an encryption algorithm which can not decrypt reversely.
Determining the MAC address of the mobile terminal corresponding to the order according to the order;
specifically, the order includes the MAC address information of the mobile terminal that generated the order. The background server can determine the MAC address of the mobile terminal producing the order according to the order information.
The server carries out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
and if the order is different, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, if the first encrypted MAC address and the second encrypted MAC address are the same; determining a timestamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
the predetermined threshold may be 24 hours or 48 hours, and may be specifically and flexibly set, which is not limited in the present application.
If not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, if the time difference is smaller than a predetermined threshold, determining that the terminal is a legal terminal, and sending a short message confirmation message to the mobile terminal so that the user determines whether to approve the order;
receiving a short message reply confirmation message sent by the mobile terminal; and carrying out verification and cancellation on the order.
In order to achieve the above object, according to a second aspect of the present application, there is provided an order approval apparatus; referring to fig. 2, a schematic diagram of an order verification apparatus is shown; the device includes:
the acquisition check information module 21 is configured to acquire the verification information of the order in response to a trigger message for verifying the order;
the checking module 22 is configured to check the order verification according to the verification information of the order verification;
and the verification module 23 is configured to not perform verification and cancellation on the order if the verification module determines that the verification fails.
In one embodiment, the verification module 23 is further configured to verify the order if the verification passes.
In an embodiment, the checking module 22 is further configured to send an alarm short message to the mobile terminal to notify the user that the order is checked and cancelled if the acceleration of the mobile terminal is in a no-acceleration state.
In one embodiment, the checking module 22 is further configured to, if the acceleration of the mobile terminal is in an acceleration state, receive a first encrypted MAC address sent by the mobile terminal and subjected to an encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
carrying out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, the verification module 22 is further configured to, if so, determine a timestamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, the system further comprises a short message sending and receiving module, configured to send a short message confirmation message to the mobile terminal if the checking module determines that the time difference is greater than or equal to a predetermined threshold, so that the user determines whether to approve the order; receiving a short message reply confirmation message sent by the mobile terminal;
and the verification and cancellation module 23 is configured to verify and cancel the order after the short message sending and receiving module receives the short message reply confirmation message sent by the mobile terminal.
According to a third aspect of the present application, there is provided an order verification apparatus; the apparatus may be arranged in a back-end server, see fig. 3, comprising at least one processor 31 and at least one memory 32; the memory 32 is for storing one or more program instructions; the processor 31 is configured to execute one or more program instructions to perform any one of the above methods.
In a fourth aspect, the present application also proposes a computer-readable storage medium having embodied therein one or more program instructions for executing the method of any one of the above.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
The volatile Memory may be a Random Access Memory (RAM) which serves as an external cache. By way of example and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), SLDRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. An order cancellation method, comprising:
responding to a trigger message of order verification and cancellation, and acquiring verification information of the order verification and cancellation;
verifying the order verification according to the verification information of the order verification;
and if the verification is not passed, the order is not checked and sold.
2. The order-checking method of claim 1, wherein the order is checked out if the check passes.
3. The order core-cancellation method of claim 1, wherein the core-cancellation verification information comprises: and generating the acceleration existence state of the mobile terminal of the order, the Bluetooth address of the mobile terminal and the time stamp of the order.
4. The order checking method of claim 3, wherein checking the order for checking according to the order checking information comprises:
and if the acceleration state of the mobile terminal is no acceleration, sending an alarm short message to the mobile terminal to inform a user that the order is checked and sold.
5. The order form verification method according to claim 4, wherein if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address which is sent by the mobile terminal and is subjected to encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
carrying out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
6. The order core-cancellation method of claim 5,
if yes, determining the time stamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
7. The order core-cancellation method of claim 5,
if so, determining that the terminal is a legal terminal, and sending a short message confirmation message to the mobile terminal so that the user determines whether to check and sell the order;
receiving a short message reply confirmation message sent by the mobile terminal; and carrying out verification and cancellation on the order.
8. An order verification apparatus, comprising:
the acquisition and verification information module is used for responding to a trigger message of order verification and verification to acquire verification and verification information of the order;
the checking module is used for checking the order verification according to the verification information of the order verification;
and the checking and canceling module is used for not checking and canceling the order if the checking module determines that the checking is not passed.
9. An order verification apparatus, comprising: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor, configured to execute one or more program instructions to perform the method of any of claims 1-6.
10. A computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110370977.2A CN113222685B (en) | 2021-04-07 | 2021-04-07 | Order verification method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110370977.2A CN113222685B (en) | 2021-04-07 | 2021-04-07 | Order verification method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113222685A true CN113222685A (en) | 2021-08-06 |
CN113222685B CN113222685B (en) | 2024-02-20 |
Family
ID=77086474
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110370977.2A Active CN113222685B (en) | 2021-04-07 | 2021-04-07 | Order verification method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113222685B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003022255A (en) * | 2001-07-06 | 2003-01-24 | Ufj Bank Ltd | Personal confirmation method |
CN107622293A (en) * | 2017-08-21 | 2018-01-23 | 厦门壹码通科技有限责任公司 | A kind of safe checking method based on Quick Response Code |
CN107784554A (en) * | 2017-09-28 | 2018-03-09 | 深圳乐信软件技术有限公司 | Method, apparatus, storage medium, server and the terminal device of order processing |
CN109583888A (en) * | 2018-11-09 | 2019-04-05 | 山西特信环宇信息技术有限公司 | A kind of certificate chain campus electronics card system |
CN109993524A (en) * | 2019-03-29 | 2019-07-09 | 深圳前海微众银行股份有限公司 | Card certificate management method, device, equipment and computer readable storage medium |
CN110245988A (en) * | 2019-06-17 | 2019-09-17 | 上海华申智能卡应用系统有限公司 | Two dimensional code certificate checks and writes off method, is written off terminal and checks and writes off terminal |
CN110544077A (en) * | 2018-05-29 | 2019-12-06 | 腾讯科技(深圳)有限公司 | method for verifying and selling electronic ticket and related device |
CN111292456A (en) * | 2019-12-13 | 2020-06-16 | 无锡市民卡有限公司 | Two-dimensional code verification and sale method |
CN111507436A (en) * | 2020-04-10 | 2020-08-07 | 雁于飞(厦门)科技有限公司 | Two-dimensional code verification and cancellation method based on positioning information |
CN111582904A (en) * | 2020-03-26 | 2020-08-25 | 口碑(上海)信息技术有限公司 | Information verification and cancellation system and method |
CN111599062A (en) * | 2019-02-03 | 2020-08-28 | 阿里巴巴集团控股有限公司 | Ticket information processing method, device and system |
CN111709752A (en) * | 2020-05-28 | 2020-09-25 | 腾讯科技(深圳)有限公司 | Virtual resource processing method and device, computer readable medium and electronic equipment |
CN111861658A (en) * | 2020-07-15 | 2020-10-30 | 深圳市爱乐墨科技有限公司 | Data management method, terminal and storage medium |
-
2021
- 2021-04-07 CN CN202110370977.2A patent/CN113222685B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003022255A (en) * | 2001-07-06 | 2003-01-24 | Ufj Bank Ltd | Personal confirmation method |
CN107622293A (en) * | 2017-08-21 | 2018-01-23 | 厦门壹码通科技有限责任公司 | A kind of safe checking method based on Quick Response Code |
CN107784554A (en) * | 2017-09-28 | 2018-03-09 | 深圳乐信软件技术有限公司 | Method, apparatus, storage medium, server and the terminal device of order processing |
CN110544077A (en) * | 2018-05-29 | 2019-12-06 | 腾讯科技(深圳)有限公司 | method for verifying and selling electronic ticket and related device |
CN109583888A (en) * | 2018-11-09 | 2019-04-05 | 山西特信环宇信息技术有限公司 | A kind of certificate chain campus electronics card system |
CN111599062A (en) * | 2019-02-03 | 2020-08-28 | 阿里巴巴集团控股有限公司 | Ticket information processing method, device and system |
CN109993524A (en) * | 2019-03-29 | 2019-07-09 | 深圳前海微众银行股份有限公司 | Card certificate management method, device, equipment and computer readable storage medium |
CN110245988A (en) * | 2019-06-17 | 2019-09-17 | 上海华申智能卡应用系统有限公司 | Two dimensional code certificate checks and writes off method, is written off terminal and checks and writes off terminal |
CN111292456A (en) * | 2019-12-13 | 2020-06-16 | 无锡市民卡有限公司 | Two-dimensional code verification and sale method |
CN111582904A (en) * | 2020-03-26 | 2020-08-25 | 口碑(上海)信息技术有限公司 | Information verification and cancellation system and method |
CN111507436A (en) * | 2020-04-10 | 2020-08-07 | 雁于飞(厦门)科技有限公司 | Two-dimensional code verification and cancellation method based on positioning information |
CN111709752A (en) * | 2020-05-28 | 2020-09-25 | 腾讯科技(深圳)有限公司 | Virtual resource processing method and device, computer readable medium and electronic equipment |
CN111861658A (en) * | 2020-07-15 | 2020-10-30 | 深圳市爱乐墨科技有限公司 | Data management method, terminal and storage medium |
Non-Patent Citations (1)
Title |
---|
贾社军等: "城市轨道交通iAFC方案研究", 《铁道通信信号》, vol. 56, no. 2, pages 79 - 82 * |
Also Published As
Publication number | Publication date |
---|---|
CN113222685B (en) | 2024-02-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104765999B (en) | Method, terminal and server for processing user resource information | |
CN111753335B (en) | Editing method and device for block content | |
US20180047032A1 (en) | Merchandise anti-counterfeiting and authentication method and the non-transitory computer readable medium thereof | |
CN111224786A (en) | Block chain-based data security sharing method, device and medium | |
TWI719470B (en) | Tag data generation method, tag and data processing based on near field communication (NFC) tag | |
CN105099675A (en) | Method and device for generating authentication data for identity authentication and method and device for identity authentication | |
CN111342963A (en) | Data uplink method, data storage method and device | |
US9461995B2 (en) | Terminal, network locking and network unlocking method for same, and storage medium | |
CN104579649A (en) | Identity recognition method and system | |
EP3479323A1 (en) | Communications device, point of sale device, payment device and methods | |
CN107241364A (en) | Document down loading method and device | |
CN113572715A (en) | Data transmission method and system based on block chain | |
KR102162044B1 (en) | The Method for User Authentication Based on Block Chain and The System Thereof | |
CN109286500B (en) | Vehicle Electronic Control Unit (ECU) authentication method, device and equipment | |
CN113472716B (en) | System access method, gateway device, server, electronic device and storage medium | |
CN109145641B (en) | Privacy information protection method and system | |
CN110197398B (en) | Information processing method and device for electronic ticket | |
WO2017166419A1 (en) | Method of identifying false base station, device identifying false base station, and terminal | |
US20200294039A1 (en) | Retail blockchain method and apparatus | |
CN110032846B (en) | Identity data anti-misuse method and device and electronic equipment | |
CN111814132A (en) | Security authentication method and device, security authentication chip and storage medium | |
CN104036406A (en) | Method and device for improving safety of ordering information | |
CN107038540B (en) | Method and device for object type distribution based on intelligent bar code | |
US9246677B2 (en) | Method and system for secure data communication between a user device and a server | |
CN102867260A (en) | Bluetooth-based commodity information identification method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |