CN113344598A - Data verification method, device, medium and electronic equipment - Google Patents
Data verification method, device, medium and electronic equipment Download PDFInfo
- Publication number
- CN113344598A CN113344598A CN202110733310.4A CN202110733310A CN113344598A CN 113344598 A CN113344598 A CN 113344598A CN 202110733310 A CN202110733310 A CN 202110733310A CN 113344598 A CN113344598 A CN 113344598A
- Authority
- CN
- China
- Prior art keywords
- updated
- user terminal
- verification
- terminal
- check
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The application provides a data verification method, a device, a medium and electronic equipment, which relate to the technical field of computers and comprise the following steps: when a first access request of a user terminal is detected, verifying the validity of the equipment number, the chip number, the check number and the modification times in the first access request; if the verification is successful, updating the check number and the modification times; storing the updated check number and the updated modification times; and issuing the updated check number and the updated modification times to the user terminal. Therefore, by implementing the method, numbers with different representation meanings can be added as terminal verification conditions, the validity of the terminal verification result is improved, and invalid verification is avoided.
Description
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data verification method, a data verification apparatus, a computer-readable storage medium, and an electronic device.
Background
With the development of computer technology, the market can mark the uniqueness and legality (i.e. from official routes) of a commodity by a device identification number, and the result of indicating whether the commodity is legal can be obtained by scanning the device identification number, so that counterfeit and shoddy products can be prevented from disturbing normal market order.
However, some illegal merchants can renew illegal products and serve as regular products for sale, and the existing equipment identification number serves as the unique identification of the terminal and is pasted on the equipment label, and can be easily checked and stolen in daily reports, terminal transportation and storage.
At present, a plurality of bad manufacturers selling fake goods and stringed goods can avoid the verification of the traditional fake goods and stringed goods by collecting historical stringed codes and acquiring stringed code data of the stock, and performing secondary burning, code pasting and other modes on a problem terminal, thereby easily causing the problem of invalid verification.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present application and therefore may include information that does not constitute prior art known to a person of ordinary skill in the art.
Disclosure of Invention
The application aims to provide a data verification method, a data verification device, a computer readable storage medium and electronic equipment, which can increase numbers with different representation meanings as terminal verification conditions, improve the validity of a terminal verification result and avoid invalid verification.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned by practice of the application.
According to an aspect of the present application, there is provided a data verification method, including:
when a first access request of a user terminal is detected, verifying the validity of the equipment number, the chip number, the check number and the modification times in the first access request;
if the verification is successful, updating the check number and the modification times;
storing the updated check number and the updated modification times;
and issuing the updated check number and the updated modification times to the user terminal.
In an exemplary embodiment of the present application, if the first access request is a request initiated by the user terminal for the first time, performing validity verification on the device number, the chip number, the check number, and the modification number in the first access request includes:
detecting whether the equipment number hits an equipment number library;
if the equipment number hits the equipment number library, detecting whether the chip number is the same as the check number;
if the chip number is the same as the check number, detecting whether the modification times are zero;
and if the number of times of modification is zero, judging that the verification is successful.
In an exemplary embodiment of the present application, the method further includes:
if the modification times are not zero, determining that the user terminal is a renovated terminal;
generating prompt information for indicating that the user terminal is a renovated terminal;
and sending the prompt information to the user terminal, or sending the prompt information to a specified legal terminal.
In an exemplary embodiment of the present application, after issuing the updated check number and the updated modification number to the user terminal, the method further includes:
when a second access request of the user terminal is detected, detecting whether the check number in the second access request is the same as the updated check number;
detecting whether the modification times in the second access request are the same as the updated modification times;
and if the check number in the second access request is the same as the updated check number and the modification times in the second access request are the same as the updated modification times, judging that the user terminal is a legal terminal.
In an exemplary embodiment of the present application, storing the updated check number and the updated number of modifications includes:
discarding the association relation among the equipment number, the chip number, the check number and the modification times;
and constructing and storing an association relation among the equipment number, the chip number, the updated check number and the updated modification times.
In an exemplary embodiment of the present application, the method further includes:
and if the verification fails, judging the user terminal to be an illegal terminal.
In an exemplary embodiment of the present application, updating the check number and the number of modifications includes:
generating a random number as an updated check number;
and increasing 1 on the basis of the number of modifications as the updated number of modifications.
According to an aspect of the present application, there is provided a data verification apparatus, including:
the number verification unit is used for verifying the validity of the equipment number, the chip number, the check number and the modification times in the first access request when the first access request of the user terminal is detected;
the number updating unit is used for updating the check number and the modification times when the verification is successful;
the number storage unit is used for storing the updated check number and the updated modification times;
and the number sending unit is used for sending the updated check number and the updated modification times to the user terminal.
In an exemplary embodiment of the present application, if the first access request is a request initiated by the user terminal for the first time, the number verifying unit performs validity verification on the device number, the chip number, the check number, and the modification number in the first access request, including:
detecting whether the equipment number hits an equipment number library;
if the equipment number hits the equipment number library, detecting whether the chip number is the same as the check number;
if the chip number is the same as the check number, detecting whether the modification times are zero;
and if the number of times of modification is zero, judging that the verification is successful.
In an exemplary embodiment of the present application, the apparatus further includes:
a result determination unit for determining that the user terminal is a retrofit terminal when the number of modifications is not zero;
an information generating unit for generating a prompt information for indicating that the user terminal is a retrofit terminal;
and the information sending unit is used for sending the prompt information to the user terminal or sending the prompt information to a specified legal terminal.
In an exemplary embodiment of the application, the number verifying unit is further configured to, after the number sending unit issues the updated check number and the updated modification number to the user terminal, detect whether the check number in the second access request is the same as the updated check number when the second access request of the user terminal is detected;
the number verification unit is also used for detecting whether the modification times in the second access request are the same as the updated modification times;
and the number verification unit is also used for judging that the user terminal is a legal terminal when the check number in the second access request is the same as the updated check number and the modification times in the second access request are the same as the updated modification times.
In an exemplary embodiment of the present application, the number storage unit stores the updated check number and the updated number of modifications, and includes:
discarding the association relation among the equipment number, the chip number, the check number and the modification times;
and constructing and storing an association relation among the equipment number, the chip number, the updated check number and the updated modification times.
In an exemplary embodiment of the present application, the result determining unit is further configured to determine that the user terminal is an illegal terminal when the authentication fails.
In an exemplary embodiment of the present application, the number updating unit updates the check number and the number of modifications, including:
generating a random number as an updated check number;
and increasing 1 on the basis of the number of modifications as the updated number of modifications.
According to an aspect of the present application, there is provided an electronic device including: a processor; and a memory for storing executable instructions for the processor; wherein the processor is configured to perform the method of any of the above via execution of the executable instructions.
According to an aspect of the application, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any one of the above.
According to an aspect of the application, a computer program product or computer program is provided, comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the method provided in the various alternative implementations described above.
The exemplary embodiments of the present application may have some or all of the following advantages:
in the data verification method provided in an example embodiment of the present application, when a first access request of a user terminal is detected, validity verification may be performed on a device number, a chip number, a verification number, and a modification number in the first access request; if the verification is successful, updating the check number and the modification times; storing the updated check number and the updated modification times; and issuing the updated check number and the updated modification times to the user terminal. According to the scheme description, on one hand, numbers with different representation meanings can be added as terminal verification conditions, validity of a terminal verification result is improved, and invalid verification is avoided. On the other hand of this application, thereby can avoid equipment serial number to be stolen and lead to the problem of unable effective check-up terminal, promote the check-up security, avoid counterfeit terminal to impersonate legal terminal, promote user perception degree to guarantee terminal safety and data safety.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. It is obvious that the drawings in the following description are only some embodiments of the application, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
Fig. 1 is a schematic diagram illustrating an exemplary system architecture to which a data verification method and a data verification apparatus according to an embodiment of the present application may be applied;
FIG. 2 illustrates a schematic structural diagram of a computer system suitable for use in implementing an electronic device of an embodiment of the present application;
FIG. 3 schematically illustrates a flow diagram of a data verification method according to one embodiment of the present application;
FIG. 4 schematically shows a sequence diagram of a data verification method according to an embodiment of the present application;
FIG. 5 schematically illustrates a flow diagram of a data verification method according to one embodiment of the present application;
fig. 6 schematically shows a block diagram of a data verification apparatus in an embodiment according to the present application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the application. One skilled in the relevant art will recognize, however, that the subject matter of the present application can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present application.
Furthermore, the drawings are merely schematic illustrations of the present application and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 is a schematic diagram illustrating a system architecture of an exemplary application environment to which a data verification method and a data verification apparatus according to an embodiment of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include one or more of terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. The terminal devices 101, 102, 103 may be various electronic devices having a display screen, including but not limited to desktop computers, portable computers, smart phones, tablet computers, and the like. It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The data verification method provided by the embodiment of the present application is generally executed by the server 105, and accordingly, the data verification apparatus is generally disposed in the server 105. However, it is easily understood by those skilled in the art that the data verification method provided in the embodiment of the present application may also be executed by the terminal device 101, 102, or 103, and accordingly, the data verification apparatus may also be disposed in the terminal device 101, 102, or 103, which is not particularly limited in this exemplary embodiment. For example, in an exemplary embodiment, the server 105 may perform validity verification on the device number, the chip number, the check number, and the modification number in the first access request when detecting the first access request of the user terminal; if the verification is successful, updating the check number and the modification times; storing the updated check number and the updated modification times; and issuing the updated check number and the updated modification times to the user terminal.
FIG. 2 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present application.
It should be noted that the computer system 200 of the electronic device shown in fig. 2 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 2, the computer system 200 includes a Central Processing Unit (CPU)201 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)202 or a program loaded from a storage section 208 into a Random Access Memory (RAM) 203. In the RAM 203, various programs and data necessary for system operation are also stored. The CPU 201, ROM 202, and RAM 203 are connected to each other via a bus 204. An input/output (I/O) interface 205 is also connected to bus 204.
The following components are connected to the I/O interface 205: an input portion 206 including a keyboard, a mouse, and the like; an output section 207 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 208 including a hard disk and the like; and a communication section 209 including a network interface card such as a LAN card, a modem, or the like. The communication section 209 performs communication processing via a network such as the internet. A drive 210 is also connected to the I/O interface 205 as needed. A removable medium 211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is mounted on the drive 210 as necessary, so that a computer program read out therefrom is installed into the storage section 208 as necessary.
In particular, according to embodiments of the present application, the processes described below with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 209 and/or installed from the removable medium 211. The computer program, when executed by a Central Processing Unit (CPU)201, performs various functions defined in the methods and apparatus of the present application.
The present example embodiment provides a data verification method. The data verification method may be applied to the server 105, and may also be applied to one or more of the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment. Referring to fig. 3, the data verification method may include the following steps S310 to S340.
Step S310: and when a first access request of the user terminal is detected, carrying out validity verification on the equipment number, the chip number, the check number and the modification times in the first access request.
Step S320: and if the verification is successful, updating the check number and the modification times.
Step S330: and storing the updated check number and the updated modification times.
Step S340: and issuing the updated check number and the updated modification times to the user terminal.
By implementing the method shown in fig. 3, numbers with different representation meanings can be added as terminal verification conditions, validity of a terminal verification result is improved, and invalid verification is avoided. In addition, the problem that the equipment number is stolen to cause the terminal cannot be effectively checked can be avoided, checking safety is improved, a fake terminal is prevented from being faked as a legal terminal, user perception is improved, and terminal safety and data safety are guaranteed.
The above steps of the present exemplary embodiment will be described in more detail below.
In step S310, when the first access request of the user terminal is detected, validity verification is performed on the device number, the chip number, the check number, and the modification times in the first access request.
Specifically, the device number (DeviceId) may be a device identification number (i.e., serial number), which is an identification code for identifying a unique identity of the device. The chip number (ChipID) is the number of the main chip in the user terminal, one main chip corresponds to one number, and when the main chip in the user terminal is replaced, the chip number is also replaced. When a user terminal is started for the first time, a check number (CheckKey) is consistent with a ChipID in value, after the terminal is restored to leave a factory, the CheckKey retains a modified value, if a user verifies whether the user terminal is a new product or a genuine product, an access request can be sent to a verifying party (such as a terminal management system) so that the verifying party verifies the legality of the user terminal based on an equipment number, a chip number, the check number and a modification frequency, and if the chip number is detected to be consistent with the check number and the modification frequency is zero, the user terminal can be judged to be a legal user. The number of modifications (ReNum) is used to identify the number of times the CheckKey is modified by the verifier. In addition, the device number, the chip number, the check number and the modification times can be formed by combining one or more of the following items: letters, numbers, symbols, words, etc.
In an exemplary embodiment of the present application, if the first access request is a request initiated by the user terminal for the first time, performing validity verification on the device number, the chip number, the check number, and the modification number in the first access request includes: detecting whether the equipment number hits an equipment number library; if the equipment number hits the equipment number library, detecting whether the chip number is the same as the check number; if the chip number is the same as the check number, detecting whether the modification times are zero; and if the number of times of modification is zero, judging that the verification is successful.
Specifically, if the device number does not hit the device number library, the method may further include: judging that the equipment number is not a legal number and feeding back prompt information for indicating that the user terminal is not genuine to the user terminal; the device number library is used for storing one or more device numbers, each device number corresponds to one user terminal, and the user terminal with the corresponding device number is possibly a genuine product. In addition, if the chip number is different from the check number, the method may further include: and judging that the user terminal is not checked for the first time and feeding back prompt information for indicating that the user terminal is not a new product to the user terminal.
Therefore, by implementing the optional embodiment, the three fields of the chip number, the check number and the modification times can be expanded on the basis of carrying out the unique identity identification verification of the terminal by using the original equipment number, the problem that the regular equipment number is reused and the label serves as a regular commodity on pseudo-goods and serial goods to be sold is solved, and the validity of data verification is improved.
In an exemplary embodiment of the present application, the method further includes: if the modification times are not zero, determining that the user terminal is a renovated terminal; generating prompt information for indicating that the user terminal is a renovated terminal; and sending the prompt information to the user terminal, or sending the prompt information to a specified legal terminal.
Specifically, after determining that the user terminal is a retrofit terminal, the method may further include: and determining the retreading times according to the modification times, reporting the retreading times to a server, and issuing the retreading times to the user terminal. In addition, the designated legal terminal may be a terminal corresponding to the designated IP, and the legal terminal may be a device of a terminal administrator.
Therefore, by implementing the optional embodiment, the device condition of the user terminal (for example, the user terminal is a renovated terminal, the user terminal is a legal terminal, and the like) can be determined according to the verification conditions of the device number, the chip number, the verification number and the modification times, and the device condition can be timely fed back to the terminal user, so that the user perception is improved.
In step S320, if the verification is successful, the check number and the modification times are updated.
In an exemplary embodiment of the present application, the method further includes: and if the verification fails, judging the user terminal to be an illegal terminal.
Specifically, if a number that does not satisfy the verification condition exists among the device number, the chip number, the verification number, and the number of modifications, it is determined that the verification fails.
Therefore, by implementing the optional embodiment, the validity of the verification result can be improved through multi-layer verification of the equipment number, the chip number, the verification number and the modification times.
In an exemplary embodiment of the present application, updating the check number and the number of modifications includes: generating a random number as an updated check number; and increasing 1 on the basis of the number of modifications as the updated number of modifications.
Specifically, generating a random number as an updated check number includes: generating a random number according to a random number generation algorithm as an updated check number; the random number generation algorithm may be a monte carlo method, a normal random number generation algorithm, a random number generation algorithm from U (0,1) to other probability distributions, and the like, and the embodiment of the present application is not limited. Increasing 1 on the basis of the number of modifications, wherein the updated number of modifications comprises: the number of modifications (e.g., 1) is determined and (number of modifications +1) is calculated, with the result of the calculation being the updated number of modifications (e.g., 2).
Therefore, by implementing the optional embodiment, the verification times of the user terminal can be recorded at any time by updating the verification number and the modification times, so that the user can find out real and effective terminal information.
In step S330, the updated check number and the updated number of modifications are stored.
Specifically, storing the updated check number and the updated number of modifications includes: and storing the updated check number and the updated modification times to the cloud server.
In an exemplary embodiment of the present application, storing the updated check number and the updated number of modifications includes: discarding the association relation among the equipment number, the chip number, the check number and the modification times; and constructing and storing an association relation among the equipment number, the chip number, the updated check number and the updated modification times.
Specifically, the association relationship between the device number, the chip number, the check number, and the number of modifications may be represented in a key value form, or may be represented in other data association manners, which is not limited in this embodiment of the application.
Therefore, by implementing the optional embodiment, the association relationship among the device number, the chip number, the check number and the modification times can be reestablished, so that the association relationship among the device number, the chip number, the check number and the modification times stored in the server keeps the latest association relationship, and the check accuracy of the server is improved.
In step S340, the updated check number and the updated modification number are issued to the ue.
Specifically, after the updated check number and the updated modification number are issued to the user terminal, the method may further include: and sending prompt information for indicating that the user terminal is a legal terminal to the user terminal, wherein the prompt information also can comprise a device number, a chip number, a check number and a modification number for a user to check.
In an exemplary embodiment of the present application, after issuing the updated check number and the updated modification number to the user terminal, the method further includes: when a second access request of the user terminal is detected, detecting whether the check number in the second access request is the same as the updated check number; detecting whether the modification times in the second access request are the same as the updated modification times; and if the check number in the second access request is the same as the updated check number and the modification times in the second access request are the same as the updated modification times, judging that the user terminal is a legal terminal.
Specifically, the second access request and the first access request may be the same request, and the second access request and the first access request are different only in precedence order. In addition, if the check number in the second access request is different from the updated check number or the modification frequency in the second access request is different from the updated modification frequency, the user terminal is determined to be an illegal terminal.
Therefore, by implementing the optional embodiment, the number detection can be performed according to the latest association relationship among the equipment number, the chip number, the verification number and the modification times, so that the verification precision and the validity of the verification result are improved.
Referring to fig. 4, fig. 4 schematically shows a sequence diagram of a data verification method according to an embodiment of the present application. As shown in fig. 4, the sequence diagram includes a user terminal and a terminal management system, wherein the steps shown in fig. 3 and the embodiment thereof may be executed by the terminal management system, and the terminal management system may run on a remote server. The method specifically comprises the following steps:
s410: the user terminal sends a first access request containing the equipment number, the chip number, the check number and the modification times to the terminal management system.
S420: and the terminal management system feeds back the verification result to the user terminal.
S430: and the user terminal confirms the verification result to the terminal management system.
S440: and the terminal management system updates the check number and the modification times.
S450: and the terminal management system transmits the updated check number and the updated modification times to the user terminal.
S460: and the user terminal feeds back the success of the update to the terminal management system.
S470: and the terminal management system stores the updated check number and the updated modification times.
Therefore, by implementing the method shown in fig. 4, numbers with different representation meanings can be added as terminal verification conditions, validity of a terminal verification result is improved, and invalid verification is avoided. In addition, the problem that the equipment number is stolen to cause the terminal cannot be effectively checked can be avoided, checking safety is improved, a fake terminal is prevented from being faked as a legal terminal, user perception is improved, and terminal safety and data safety are guaranteed.
Referring to fig. 5, fig. 5 schematically illustrates a flow chart of a data verification method according to an embodiment of the present application. As shown in fig. 5, the data verification method includes: step S510 to step S560.
Step S510: when a first access request of the user terminal is detected and the first access request is a request initiated by the user terminal for the first time, detecting whether the equipment number hits an equipment number library, if the equipment number hits the equipment number library, detecting whether the chip number is the same as the verification number, if the chip number is the same as the verification number, detecting whether the modification frequency is zero, and if the modification frequency is zero, judging that the verification is successful; if the number of times of modification is not zero, determining that the user terminal is a renovated terminal, and generating prompt information for indicating that the user terminal is the renovated terminal; and sending the prompt information to the user terminal, or sending the prompt information to a specified legal terminal.
Step S520: and if the verification is successful, updating the check number and the modification times. Then, step S540 is performed.
Step S530: and if the verification fails, judging the user terminal to be an illegal terminal. Then, the flow ends.
Step S540: discarding the association relationship among the equipment number, the chip number, the check number and the modification times, and constructing and storing the association relationship among the equipment number, the chip number, the updated check number and the updated modification times.
Step S550: and issuing the updated check number and the updated modification times to the user terminal.
Step S560: and when a second access request of the user terminal is detected, detecting whether the check number in the second access request is the same as the updated check number, detecting whether the modification times in the second access request is the same as the updated modification times, and if the check number in the second access request is the same as the updated check number and the modification times in the second access request is the same as the updated modification times, judging that the user terminal is a legal terminal.
It should be noted that steps S510 to S560 correspond to the steps and the embodiment shown in fig. 3, and for the specific implementation of steps S510 to S560, please refer to the steps and the embodiment shown in fig. 3, which is not described herein again.
Therefore, by implementing the method shown in fig. 5, numbers with different representation meanings can be added as terminal verification conditions, validity of a terminal verification result is improved, and invalid verification is avoided. In addition, the problem that the equipment number is stolen to cause the terminal cannot be effectively checked can be avoided, checking safety is improved, a fake terminal is prevented from being faked as a legal terminal, user perception is improved, and terminal safety and data safety are guaranteed.
Further, in this example embodiment, a data verification apparatus is also provided. Referring to fig. 6, the data verification apparatus 600 may include:
a number verification unit 601, configured to verify validity of a device number, a chip number, a verification number, and a modification number in a first access request when the first access request of the user terminal is detected;
a number updating unit 602, configured to update the check number and the modification times when the verification is successful;
a number storage unit 603 configured to store the updated check number and the updated number of modifications;
a number sending unit 604, configured to send the updated check number and the updated modification number to the user terminal.
Therefore, by implementing the device shown in fig. 6, numbers with different representation meanings can be added as terminal verification conditions, validity of a terminal verification result is improved, and invalid verification is avoided. In addition, the problem that the equipment number is stolen to cause the terminal cannot be effectively checked can be avoided, checking safety is improved, a fake terminal is prevented from being faked as a legal terminal, user perception is improved, and terminal safety and data safety are guaranteed.
In an exemplary embodiment of the present application, if the first access request is a request initiated by a user terminal for the first time, the number verifying unit 601 performs validity verification on the device number, the chip number, the check number, and the modification number in the first access request, including:
detecting whether the equipment number hits an equipment number library;
if the equipment number hits the equipment number library, detecting whether the chip number is the same as the check number;
if the chip number is the same as the check number, detecting whether the modification times are zero;
and if the number of times of modification is zero, judging that the verification is successful.
Therefore, by implementing the optional embodiment, the three fields of the chip number, the check number and the modification times can be expanded on the basis of carrying out the unique identity identification verification of the terminal by using the original equipment number, the problem that the regular equipment number is reused and the label serves as a regular commodity on pseudo-goods and serial goods to be sold is solved, and the validity of data verification is improved.
In an exemplary embodiment of the present application, the apparatus further includes:
a result determination unit (not shown) for determining that the user terminal is a refresh terminal when the number of times of modification is not zero;
an information generating unit (not shown) for generating a prompt information indicating that the user terminal is a retrofit terminal;
and an information transmitting unit (not shown) for transmitting the prompt information to the user terminal or transmitting the prompt information to a designated legitimate terminal.
Therefore, by implementing the optional embodiment, the device condition of the user terminal (for example, the user terminal is a renovated terminal, the user terminal is a legal terminal, and the like) can be determined according to the verification conditions of the device number, the chip number, the verification number and the modification times, and the device condition can be timely fed back to the terminal user, so that the user perception is improved.
In an exemplary embodiment of the present application, the number verifying unit 601 is further configured to, after the number sending unit 604 issues the updated check number and the updated modification number to the user terminal, detect whether the check number in the second access request is the same as the updated check number when the second access request of the user terminal is detected;
a number verification unit 601, configured to detect whether the number of modifications in the second access request is the same as the updated number of modifications;
the number verifying unit 601 is further configured to determine that the user terminal is a valid terminal when the check number in the second access request is the same as the updated check number and the modification number in the second access request is the same as the updated modification number.
Therefore, by implementing the optional embodiment, the number detection can be performed according to the latest association relationship among the equipment number, the chip number, the verification number and the modification times, so that the verification precision and the validity of the verification result are improved.
In an exemplary embodiment of the present application, the number storage unit 603 stores the updated check number and the updated number of modifications, and includes:
discarding the association relation among the equipment number, the chip number, the check number and the modification times;
and constructing and storing an association relation among the equipment number, the chip number, the updated check number and the updated modification times.
Therefore, by implementing the optional embodiment, the association relationship among the device number, the chip number, the check number and the modification times can be reestablished, so that the association relationship among the device number, the chip number, the check number and the modification times stored in the server keeps the latest association relationship, and the check accuracy of the server is improved.
In an exemplary embodiment of the present application, the result determining unit is further configured to determine that the user terminal is an illegal terminal when the authentication fails.
Therefore, by implementing the optional embodiment, the validity of the verification result can be improved through multi-layer verification of the equipment number, the chip number, the verification number and the modification times.
In an exemplary embodiment of the present application, the number updating unit 602 updates the check number and the number of modifications, including:
generating a random number as an updated check number;
and increasing 1 on the basis of the number of modifications as the updated number of modifications.
Therefore, by implementing the optional embodiment, the verification times of the user terminal can be recorded at any time by updating the verification number and the modification times, so that the user can find out real and effective terminal information.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
As each functional module of the data verification apparatus in the exemplary embodiment of the present application corresponds to the step of the exemplary embodiment of the data verification method, please refer to the above-mentioned embodiment of the data verification method in the present application for details that are not disclosed in the embodiment of the apparatus of the present application.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method described in the above embodiments.
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (10)
1. A method for data verification, comprising:
when a first access request of a user terminal is detected, carrying out validity verification on a device number, a chip number, a check number and a modification frequency in the first access request;
if the verification is successful, updating the check number and the modification times;
storing the updated check number and the updated modification times;
and issuing the updated check number and the updated modification times to the user terminal.
2. The method of claim 1, wherein if the first access request is a request initiated by the user terminal for the first time, performing validity verification on a device number, a chip number, a check number, and a modification number in the first access request includes:
detecting whether the equipment number hits an equipment number library;
if the equipment number hits the equipment number library, detecting whether the chip number is the same as the check number;
if the chip number is the same as the check number, detecting whether the modification times are zero;
and if the modification times are zero, judging that the verification is successful.
3. The method of claim 2, further comprising:
if the modification times are not zero, determining that the user terminal is a renovated terminal;
generating prompt information for indicating that the user terminal is the renovated terminal;
and sending the prompt information to the user terminal, or sending the prompt information to a specified legal terminal.
4. The method of claim 1, wherein after issuing the updated check number and the updated number of modifications to the ue, the method further comprises:
when a second access request of the user terminal is detected, detecting whether a check number in the second access request is the same as the updated check number;
detecting whether the modification times in the second access request are the same as the updated modification times;
and if the check number in the second access request is the same as the updated check number and the modification times in the second access request are the same as the updated modification times, judging that the user terminal is a legal terminal.
5. The method of claim 1, wherein storing the updated check number and the updated number of modifications comprises:
discarding the association relationship among the equipment number, the chip number, the check number and the modification times;
and constructing and storing the association relation among the equipment number, the chip number, the updated check number and the updated modification times.
6. The method of claim 1, further comprising:
and if the verification fails, judging the user terminal to be an illegal terminal.
7. The method of claim 1, wherein updating the check number and the number of modifications comprises:
generating a random number as an updated check number;
and increasing 1 on the basis of the modification times as updated modification times.
8. A data verification apparatus, comprising:
the number verification unit is used for verifying the validity of the equipment number, the chip number, the check number and the modification times in a first access request when the first access request of the user terminal is detected;
the number updating unit is used for updating the check number and the modification times when the verification is successful;
the number storage unit is used for storing the updated check number and the updated modification times;
and the number sending unit is used for sending the updated check number and the updated modification times to the user terminal.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1 to 7.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any of claims 1-7 via execution of the executable instructions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110733310.4A CN113344598A (en) | 2021-06-30 | 2021-06-30 | Data verification method, device, medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110733310.4A CN113344598A (en) | 2021-06-30 | 2021-06-30 | Data verification method, device, medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113344598A true CN113344598A (en) | 2021-09-03 |
Family
ID=77481680
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110733310.4A Pending CN113344598A (en) | 2021-06-30 | 2021-06-30 | Data verification method, device, medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113344598A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114462104A (en) * | 2021-12-30 | 2022-05-10 | 苏州浪潮智能科技有限公司 | Method and device for confirming customer SN (service number) and computer readable storage medium |
-
2021
- 2021-06-30 CN CN202110733310.4A patent/CN113344598A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114462104A (en) * | 2021-12-30 | 2022-05-10 | 苏州浪潮智能科技有限公司 | Method and device for confirming customer SN (service number) and computer readable storage medium |
CN114462104B (en) * | 2021-12-30 | 2023-11-14 | 苏州浪潮智能科技有限公司 | Client SN confirmation method and device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109428886B (en) | Method and system for review verification and trustworthiness scoring via blockchain | |
CN109711858B (en) | Method and system for preventing fraudulent gift cards via blockchain | |
US10073916B2 (en) | Method and system for facilitating terminal identifiers | |
CN111163182B (en) | Block chain-based device registration method and apparatus, electronic device, and storage medium | |
CN110602098B (en) | Identity authentication method, device, equipment and storage medium | |
JPWO2007088716A1 (en) | Blind signature method and system | |
CN112311779B (en) | Data access control method and device applied to block chain system | |
CN113344598A (en) | Data verification method, device, medium and electronic equipment | |
CN112132576B (en) | Payment information processing method based on block chain communication and block chain information platform | |
CN111050326B (en) | Block chain-based short message verification method, device, equipment and medium | |
CN115619395A (en) | Data processing method based on block chain and related equipment | |
CN111310242B (en) | Method and device for generating device fingerprint, storage medium and electronic device | |
CN109871294B (en) | Method and device for checking data and processing request | |
CN111917760A (en) | Network collaborative manufacturing cross-domain fusion trust management and control method based on identification analysis | |
CN111832015A (en) | Abnormal request identification method, device, system, medium and electronic equipment | |
CN116261139A (en) | Online data security transmission method and system based on 5G message and electronic equipment | |
CN112765588B (en) | Identity recognition method and device, electronic equipment and storage medium | |
CN114240436A (en) | Electronic certificate verification and cancellation method and device, computer equipment and storage medium | |
CN112686732B (en) | Abnormal address data identification method, device, equipment and medium | |
CN110688677B (en) | Method and device for executing intelligent contracts | |
CN113722690A (en) | Data transmitting method, data receiving device, certificate recording method and certificate recording device | |
CN113849802A (en) | Equipment authentication method and device, electronic equipment and storage medium | |
CN111786936A (en) | Method and device for authentication | |
CN110659476A (en) | Method and apparatus for resetting password | |
CN115114674B (en) | Cloud auditing method, device, equipment and medium supporting automatic compensation of damaged data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |