CN113222685A - Order form verification and cancellation method, device, equipment and storage medium - Google Patents

Order form verification and cancellation method, device, equipment and storage medium Download PDF

Info

Publication number
CN113222685A
CN113222685A CN202110370977.2A CN202110370977A CN113222685A CN 113222685 A CN113222685 A CN 113222685A CN 202110370977 A CN202110370977 A CN 202110370977A CN 113222685 A CN113222685 A CN 113222685A
Authority
CN
China
Prior art keywords
order
verification
mobile terminal
checking
cancellation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110370977.2A
Other languages
Chinese (zh)
Other versions
CN113222685B (en
Inventor
雷勇
陈宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Multidimensional Network Technology Co ltd
Original Assignee
Shanghai Multidimensional Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Multidimensional Network Technology Co ltd filed Critical Shanghai Multidimensional Network Technology Co ltd
Priority to CN202110370977.2A priority Critical patent/CN113222685B/en
Publication of CN113222685A publication Critical patent/CN113222685A/en
Application granted granted Critical
Publication of CN113222685B publication Critical patent/CN113222685B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • G06Q30/0637Approvals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an order form verification method, an order form verification device, order form verification equipment and a storage medium. An order cancellation method, comprising: responding to a trigger message of order verification and cancellation, and acquiring verification information of the order verification and cancellation; verifying the order verification according to the verification information of the order verification; and if the verification is not passed, the order is not checked and sold. According to the technical scheme, the order is verified according to the verification information of the order; and if the verification is not passed, the order is not checked and sold. The loss caused by the leakage of the two-dimension code of the order is avoided, and the safety of the user is improved.

Description

Order form verification and cancellation method, device, equipment and storage medium
Technical Field
The application relates to the technical field of computers, in particular to an order form verification method, an order form verification device, order form verification equipment and a storage medium.
Background
After a user generates an order by online ordering, the user can get products in an entity shop online, and when the user gets ordered goods, the user can show a two-dimensional code of the order. After the front end of the merchant scans the two-dimensional code, the server at the rear end can check and sell the order. However, in the prior art, if the two-dimensional code of the user order is leaked or stolen by a third party, the third party may steal the two-dimensional code to falsify the product of the user order, which causes loss to the user.
Disclosure of Invention
The present application mainly aims to provide an order verification method, an order verification device, an order verification apparatus, and a storage medium, so as to solve the above problems.
In order to achieve the above object, according to one aspect of the present application, there is provided an order approval method including:
responding to a trigger message of order verification and cancellation, and acquiring verification information of the order verification and cancellation;
verifying the order verification according to the verification information of the order verification;
and if the verification is not passed, the order is not checked and sold.
In one embodiment, if the check passes, the order is checked out.
In one embodiment, the verification information includes: and generating the acceleration existence state of the mobile terminal of the order, the Bluetooth address of the mobile terminal and the time stamp of the order.
In one embodiment, verifying the order verification according to the order verification information includes:
and if the acceleration state of the mobile terminal is no acceleration, sending an alarm short message to the mobile terminal to inform a user that the order is checked and sold.
In one embodiment, if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address which is sent by the mobile terminal and is subjected to encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
carrying out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, if so, a timestamp of the order is determined;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one implementation mode, if yes, the terminal is determined to be a legal terminal, and a short message confirmation message is sent to the mobile terminal, so that the user determines whether to check and sell the order;
receiving a short message reply confirmation message sent by the mobile terminal; and carrying out verification and cancellation on the order.
In order to achieve the above object, according to a second aspect of the present application, there is provided an order approval apparatus; the device includes:
the acquisition and verification information module is used for responding to a trigger message of order verification and verification to acquire verification and verification information of the order;
the checking module is used for checking the order verification according to the verification information of the order verification;
and the checking and canceling module is used for not checking and canceling the order if the checking module determines that the checking is not passed.
In one embodiment, the verification module is further configured to verify the order if the verification passes.
In an embodiment, the verification module is further configured to send an alarm short message to the mobile terminal to notify the user that the order is checked and cancelled if the acceleration of the mobile terminal is in a no-acceleration state.
In one embodiment, the checking module is further configured to receive a first encrypted MAC address which is sent by the mobile terminal and is subjected to an encryption operation if the acceleration state of the mobile terminal is acceleration;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
carrying out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, the checking module is further configured to, if so, determine a timestamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, the system further comprises a short message sending and receiving module, configured to send a short message confirmation message to the mobile terminal if the checking module determines that the time difference is greater than or equal to a predetermined threshold, so that the user determines whether to approve the order; receiving a short message reply confirmation message sent by the mobile terminal;
and the verification and cancellation module is used for verifying and canceling the order after the short message receiving and sending module receives the short message reply confirmation message sent by the mobile terminal.
To achieve the above object, according to a third aspect of the present application, there is provided an apparatus; comprising at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to perform any of the methods described above.
According to a fourth aspect of the present application, there is provided a computer readable storage medium having one or more program instructions embodied therein for performing the method of any one of the above.
According to the technical scheme, after responding to the triggering message of order verification, the server acquires verification information of the order verification; verifying the order verification according to the verification information of the order verification; and if the verification is not passed, the order is not checked and sold. The safety of the order is improved, and the risk that the user is falsely claimed due to the fact that the two-dimensional code of the order is leaked is reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
FIG. 1 is a flow chart of a method for order verification according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an order verification apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an order verification apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
When a user takes an order online, the user can show the two-dimensional code of the order, and after the front-end equipment of a merchant scans the two-dimensional code, the back-end server can check and sell the order. However, in the prior art, if the two-dimensional code of the user's order is leaked, a third party may use the stolen two-dimensional code to falsify the product of the user's order, which causes a loss to the user.
Based on this, the present application provides an order verification method, including:
step S101, responding to a trigger message of order form verification, and acquiring verification information of the order form verification;
specifically, when the user uses the two-dimensional code of the order to get the goods from the offline physical store and to check and sell the order, the user can show the two-dimensional code of the order, and after the front end scans the two-dimensional code, the trigger message of order checking and selling is sent to the server at the rear end, so that the server at the rear end checks and sells the order.
Step S102, verifying the order verification according to the verification information of the order verification;
and step S103, if the order is not verified, the order is not checked. And if the order passes the verification, checking and canceling the order.
According to the method provided by the invention, after the server receives the trigger message of order verification, the order verification is carried out, if the verification is not passed, the order verification is not carried out, so that the situations that the product is falsely claimed and the order is maliciously verified and sold due to the leakage of the user order are avoided, and the safety of the user order is improved.
In one embodiment, the verification information includes: and whether the acceleration of the mobile terminal generating the order, the Bluetooth address of the mobile terminal and the starting time of the mobile terminal exist or not.
In one embodiment, verifying the order verification according to the order verification information includes:
and if the acceleration state of the mobile terminal is no acceleration, sending an alarm short message to the mobile terminal to inform a user that the order is checked and sold.
Specifically, the method comprises the following steps: recording a time point T1 of the generation of the acceleration of the mobile terminal;
recording a time point T2 of sending a trigger message for triggering the verification and sale order to the back-end server after the order two-dimensional code is acquired;
calculating a difference value T between the time point T1 and the time point T2;
determining that an acceleration associated with the verification motion is generated if T is less than a predetermined time threshold;
if T is greater than or equal to a predetermined time threshold, it is determined that no acceleration associated with the verification motion is generated.
Illustratively, after a user a uses a mobile terminal to generate an order online, and then gets a product related to the order in a physical store, the user a needs to first draw out a mobile phone, then opens an application App, and then presents an order two-dimensional code, so that the user a can get the product and check and sell the order. The above-mentioned actions inevitably generate the acceleration of the mobile phone. And a difference value in time is generated, the difference value is generally within 5 minutes, the time threshold value can be flexibly set, and the method is not limited in the application. And if the time difference is larger than the time threshold, the mobile terminal for checking and selling the order is determined not to be the mobile terminal for generating the order, namely an illegal terminal.
If the two-dimensional code of the user A is leaked, the user C obtains the two-dimensional code. User a has not gone home to the store. No mobile phone is used, no acceleration information is generated, but a trigger message for order verification is received. Then a short message is sent to the mobile phone of the user A to inform a person to take the order product, thereby playing the role of alarming.
In one embodiment, if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address which is sent by the mobile terminal and is subjected to encryption operation;
the mobile terminal carries out Hash encryption signature operation on the Bluetooth MAC address, and a character string is obtained after encryption. And the character string is sent to the server, so that the concealment of the Bluetooth MAC address of the mobile terminal is enhanced, and the safety is improved.
The encryption algorithm can also adopt an encryption algorithm which can not decrypt reversely.
Determining the MAC address of the mobile terminal corresponding to the order according to the order;
specifically, the order includes the MAC address information of the mobile terminal that generated the order. The background server can determine the MAC address of the mobile terminal producing the order according to the order information.
The server carries out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
and if the order is different, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, if the first encrypted MAC address and the second encrypted MAC address are the same; determining a timestamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
the predetermined threshold may be 24 hours or 48 hours, and may be specifically and flexibly set, which is not limited in the present application.
If not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, if the time difference is smaller than a predetermined threshold, determining that the terminal is a legal terminal, and sending a short message confirmation message to the mobile terminal so that the user determines whether to approve the order;
receiving a short message reply confirmation message sent by the mobile terminal; and carrying out verification and cancellation on the order.
In order to achieve the above object, according to a second aspect of the present application, there is provided an order approval apparatus; referring to fig. 2, a schematic diagram of an order verification apparatus is shown; the device includes:
the acquisition check information module 21 is configured to acquire the verification information of the order in response to a trigger message for verifying the order;
the checking module 22 is configured to check the order verification according to the verification information of the order verification;
and the verification module 23 is configured to not perform verification and cancellation on the order if the verification module determines that the verification fails.
In one embodiment, the verification module 23 is further configured to verify the order if the verification passes.
In an embodiment, the checking module 22 is further configured to send an alarm short message to the mobile terminal to notify the user that the order is checked and cancelled if the acceleration of the mobile terminal is in a no-acceleration state.
In one embodiment, the checking module 22 is further configured to, if the acceleration of the mobile terminal is in an acceleration state, receive a first encrypted MAC address sent by the mobile terminal and subjected to an encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
carrying out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, the verification module 22 is further configured to, if so, determine a timestamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
In one embodiment, the system further comprises a short message sending and receiving module, configured to send a short message confirmation message to the mobile terminal if the checking module determines that the time difference is greater than or equal to a predetermined threshold, so that the user determines whether to approve the order; receiving a short message reply confirmation message sent by the mobile terminal;
and the verification and cancellation module 23 is configured to verify and cancel the order after the short message sending and receiving module receives the short message reply confirmation message sent by the mobile terminal.
According to a third aspect of the present application, there is provided an order verification apparatus; the apparatus may be arranged in a back-end server, see fig. 3, comprising at least one processor 31 and at least one memory 32; the memory 32 is for storing one or more program instructions; the processor 31 is configured to execute one or more program instructions to perform any one of the above methods.
In a fourth aspect, the present application also proposes a computer-readable storage medium having embodied therein one or more program instructions for executing the method of any one of the above.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
The volatile Memory may be a Random Access Memory (RAM) which serves as an external cache. By way of example and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), SLDRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. An order cancellation method, comprising:
responding to a trigger message of order verification and cancellation, and acquiring verification information of the order verification and cancellation;
verifying the order verification according to the verification information of the order verification;
and if the verification is not passed, the order is not checked and sold.
2. The order-checking method of claim 1, wherein the order is checked out if the check passes.
3. The order core-cancellation method of claim 1, wherein the core-cancellation verification information comprises: and generating the acceleration existence state of the mobile terminal of the order, the Bluetooth address of the mobile terminal and the time stamp of the order.
4. The order checking method of claim 3, wherein checking the order for checking according to the order checking information comprises:
and if the acceleration state of the mobile terminal is no acceleration, sending an alarm short message to the mobile terminal to inform a user that the order is checked and sold.
5. The order form verification method according to claim 4, wherein if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address which is sent by the mobile terminal and is subjected to encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
carrying out encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
6. The order core-cancellation method of claim 5,
if yes, determining the time stamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the timestamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, and not checking and canceling the order.
7. The order core-cancellation method of claim 5,
if so, determining that the terminal is a legal terminal, and sending a short message confirmation message to the mobile terminal so that the user determines whether to check and sell the order;
receiving a short message reply confirmation message sent by the mobile terminal; and carrying out verification and cancellation on the order.
8. An order verification apparatus, comprising:
the acquisition and verification information module is used for responding to a trigger message of order verification and verification to acquire verification and verification information of the order;
the checking module is used for checking the order verification according to the verification information of the order verification;
and the checking and canceling module is used for not checking and canceling the order if the checking module determines that the checking is not passed.
9. An order verification apparatus, comprising: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor, configured to execute one or more program instructions to perform the method of any of claims 1-6.
10. A computer-readable storage medium having one or more program instructions embodied therein for performing the method of any of claims 1-6.
CN202110370977.2A 2021-04-07 2021-04-07 Order verification method, device, equipment and storage medium Active CN113222685B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110370977.2A CN113222685B (en) 2021-04-07 2021-04-07 Order verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110370977.2A CN113222685B (en) 2021-04-07 2021-04-07 Order verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113222685A true CN113222685A (en) 2021-08-06
CN113222685B CN113222685B (en) 2024-02-20

Family

ID=77086474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110370977.2A Active CN113222685B (en) 2021-04-07 2021-04-07 Order verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113222685B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003022255A (en) * 2001-07-06 2003-01-24 Ufj Bank Ltd Personal confirmation method
CN107622293A (en) * 2017-08-21 2018-01-23 厦门壹码通科技有限责任公司 A kind of safe checking method based on Quick Response Code
CN107784554A (en) * 2017-09-28 2018-03-09 深圳乐信软件技术有限公司 Method, apparatus, storage medium, server and the terminal device of order processing
CN109583888A (en) * 2018-11-09 2019-04-05 山西特信环宇信息技术有限公司 A kind of certificate chain campus electronics card system
CN109993524A (en) * 2019-03-29 2019-07-09 深圳前海微众银行股份有限公司 Card certificate management method, device, equipment and computer readable storage medium
CN110245988A (en) * 2019-06-17 2019-09-17 上海华申智能卡应用系统有限公司 Two dimensional code certificate checks and writes off method, is written off terminal and checks and writes off terminal
CN110544077A (en) * 2018-05-29 2019-12-06 腾讯科技(深圳)有限公司 method for verifying and selling electronic ticket and related device
CN111292456A (en) * 2019-12-13 2020-06-16 无锡市民卡有限公司 Two-dimensional code verification and sale method
CN111507436A (en) * 2020-04-10 2020-08-07 雁于飞(厦门)科技有限公司 Two-dimensional code verification and cancellation method based on positioning information
CN111582904A (en) * 2020-03-26 2020-08-25 口碑(上海)信息技术有限公司 Information verification and cancellation system and method
CN111599062A (en) * 2019-02-03 2020-08-28 阿里巴巴集团控股有限公司 Ticket information processing method, device and system
CN111709752A (en) * 2020-05-28 2020-09-25 腾讯科技(深圳)有限公司 Virtual resource processing method and device, computer readable medium and electronic equipment
CN111861658A (en) * 2020-07-15 2020-10-30 深圳市爱乐墨科技有限公司 Data management method, terminal and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003022255A (en) * 2001-07-06 2003-01-24 Ufj Bank Ltd Personal confirmation method
CN107622293A (en) * 2017-08-21 2018-01-23 厦门壹码通科技有限责任公司 A kind of safe checking method based on Quick Response Code
CN107784554A (en) * 2017-09-28 2018-03-09 深圳乐信软件技术有限公司 Method, apparatus, storage medium, server and the terminal device of order processing
CN110544077A (en) * 2018-05-29 2019-12-06 腾讯科技(深圳)有限公司 method for verifying and selling electronic ticket and related device
CN109583888A (en) * 2018-11-09 2019-04-05 山西特信环宇信息技术有限公司 A kind of certificate chain campus electronics card system
CN111599062A (en) * 2019-02-03 2020-08-28 阿里巴巴集团控股有限公司 Ticket information processing method, device and system
CN109993524A (en) * 2019-03-29 2019-07-09 深圳前海微众银行股份有限公司 Card certificate management method, device, equipment and computer readable storage medium
CN110245988A (en) * 2019-06-17 2019-09-17 上海华申智能卡应用系统有限公司 Two dimensional code certificate checks and writes off method, is written off terminal and checks and writes off terminal
CN111292456A (en) * 2019-12-13 2020-06-16 无锡市民卡有限公司 Two-dimensional code verification and sale method
CN111582904A (en) * 2020-03-26 2020-08-25 口碑(上海)信息技术有限公司 Information verification and cancellation system and method
CN111507436A (en) * 2020-04-10 2020-08-07 雁于飞(厦门)科技有限公司 Two-dimensional code verification and cancellation method based on positioning information
CN111709752A (en) * 2020-05-28 2020-09-25 腾讯科技(深圳)有限公司 Virtual resource processing method and device, computer readable medium and electronic equipment
CN111861658A (en) * 2020-07-15 2020-10-30 深圳市爱乐墨科技有限公司 Data management method, terminal and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贾社军等: "城市轨道交通iAFC方案研究", 《铁道通信信号》, vol. 56, no. 2, pages 79 - 82 *

Also Published As

Publication number Publication date
CN113222685B (en) 2024-02-20

Similar Documents

Publication Publication Date Title
CN104765999B (en) Method, terminal and server for processing user resource information
CN111753335B (en) Editing method and device for block content
US20180047032A1 (en) Merchandise anti-counterfeiting and authentication method and the non-transitory computer readable medium thereof
CN111224786A (en) Block chain-based data security sharing method, device and medium
TWI719470B (en) Tag data generation method, tag and data processing based on near field communication (NFC) tag
CN105099675A (en) Method and device for generating authentication data for identity authentication and method and device for identity authentication
CN111342963A (en) Data uplink method, data storage method and device
US9461995B2 (en) Terminal, network locking and network unlocking method for same, and storage medium
CN104579649A (en) Identity recognition method and system
EP3479323A1 (en) Communications device, point of sale device, payment device and methods
CN107241364A (en) Document down loading method and device
CN113572715A (en) Data transmission method and system based on block chain
KR102162044B1 (en) The Method for User Authentication Based on Block Chain and The System Thereof
CN109286500B (en) Vehicle Electronic Control Unit (ECU) authentication method, device and equipment
CN113472716B (en) System access method, gateway device, server, electronic device and storage medium
CN109145641B (en) Privacy information protection method and system
CN110197398B (en) Information processing method and device for electronic ticket
WO2017166419A1 (en) Method of identifying false base station, device identifying false base station, and terminal
US20200294039A1 (en) Retail blockchain method and apparatus
CN110032846B (en) Identity data anti-misuse method and device and electronic equipment
CN111814132A (en) Security authentication method and device, security authentication chip and storage medium
CN104036406A (en) Method and device for improving safety of ordering information
CN107038540B (en) Method and device for object type distribution based on intelligent bar code
US9246677B2 (en) Method and system for secure data communication between a user device and a server
CN102867260A (en) Bluetooth-based commodity information identification method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant