CN113570377A - Verification method, device and equipment - Google Patents

Verification method, device and equipment Download PDF

Info

Publication number
CN113570377A
CN113570377A CN202110804300.5A CN202110804300A CN113570377A CN 113570377 A CN113570377 A CN 113570377A CN 202110804300 A CN202110804300 A CN 202110804300A CN 113570377 A CN113570377 A CN 113570377A
Authority
CN
China
Prior art keywords
app
client
otp
mobile
client app
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110804300.5A
Other languages
Chinese (zh)
Inventor
杜荣军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110804300.5A priority Critical patent/CN113570377A/en
Publication of CN113570377A publication Critical patent/CN113570377A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/325Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the specification discloses a checking method, a checking device and checking equipment. The method comprises the following steps: when a client APP needs to be checked, mobile equipment where a mobile number bound by the client APP is located automatically receives information of an OTP string code sent based on an exclusive number; the client APP automatically reads the information of the OTP string code on the mobile equipment where the client APP is located, and a reading result is obtained; and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client APP is located, the verification is passed. By adopting the method provided by the embodiment of the specification, the non-sensing verification of the client APP can be realized, the user experience is improved, the manual participation is not needed, the verification failure caused by GSM network signals can be reduced, the verification success rate and the payment success rate are increased, and the safety of the client APP is ensured.

Description

Verification method, device and equipment
The application relates to a verification method, a verification device and verification equipment (application date: 3/4/2020, application number: 202010141463.5) ".
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a verification method, device and apparatus.
Background
In some underdeveloped countries, because the overall education level of the user is relatively low and the smart phone is not popularized yet, in the operation of the electronic wallet, the electronic wallet in a ussd (unstructured Supplementary Service data) mode is mainly used, that is, all operations of the electronic wallet are data interaction based on a GSM network, and the use requirements of the electronic wallet mainly include transfer remittance, mobile phone recharging and the like. With the popularization of mobile internet, the smart phone based electronic wallet APP gradually enters the market, and at this time, migration of the USSD user to the electronic wallet APP user is inevitably involved.
In the USSD era, since the electronic wallet service is strongly bound based on the mobile phone number, the SIM card, and the GSM network, the user generally does not need to be authenticated except for password verification, and only if the SIM card or the mobile phone is lost and the password is revealed, the user needs to be authenticated, so that the overall security is high. In the APP era, because the strong binding of the GSM network is lost, in order to ensure data security, an OTP (One Time Password) mode is often adopted to perform core for the APP user of the electronic wallet, so as to perform risk control.
In the underdeveloped countries, on the one hand, because the user is educated to a low degree, the user does not understand and understand how to use the OTP, and even the user cannot read the characters contained in the OTP, if the OTP is adopted for verification, a large number of USSD users are deceived to reveal the OTP, and a thief breaks through the user account by logging in the APP, so that the fund loss is caused. Or in underdeveloped countries, even in partial underdeveloped areas of China, the mobile phone signals are poor, the user fails to acquire the OTP, the account operation and the transaction cannot be completed, and the user experience is influenced.
Therefore, a new verification method is needed to realize the verification of the user of the electronic wallet APP.
Disclosure of Invention
The embodiment of the specification provides a verification method, a verification device and verification equipment, which are used for solving the following technical problems:
in order to solve the above technical problem, the embodiments of the present specification are implemented as follows:
an embodiment of the present specification provides a verification method, including:
when a client APP needs to be checked, a mobile device where a mobile number bound by the client APP is located automatically receives information of an OTP string code sent based on an exclusive number, wherein the exclusive number is generated by the client APP and a network operator according to an encryption protocol;
the client side APP automatically reads information of the OTP character string codes on the mobile equipment where the client side APP is located to obtain reading results, wherein the reading results comprise reading results of the OTP character string codes on the mobile equipment where the client side APP is located and reading results of the exclusive numbers on the mobile equipment where the client side APP is located;
and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client APP is located, the verification is passed.
An embodiment of the present specification further provides a verification apparatus, including:
the mobile equipment comprises a receiving module, a verification module and a verification module, wherein when a client APP needs to be verified, the mobile equipment where a mobile number bound by the client APP is located automatically receives information of an OTP (one time password) character string code sent based on an exclusive number, wherein the exclusive number is generated by the client APP and a network operator according to an encryption protocol;
the client side APP automatically reads the information of the OTP character string codes on the mobile equipment where the client side APP is located to obtain reading results, and the reading results comprise the reading results of the OTP character string codes on the mobile equipment where the client side APP is located and the reading results of the exclusive numbers on the mobile equipment where the client side APP is located;
and the first checking module is used for passing the checking if the reading result is consistent with the OTP character string code which is automatically received by the mobile equipment where the mobile number bound by the client APP is located and is sent based on the exclusive number.
An embodiment of the present specification further provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
when a client APP needs to be checked, a mobile device where a mobile number bound by the client APP is located automatically receives information of an OTP string code sent based on an exclusive number, wherein the exclusive number is generated by the client APP and a network operator according to an encryption protocol;
the client side APP automatically reads information of the OTP character string codes on the mobile equipment where the client side APP is located to obtain reading results, wherein the reading results comprise reading results of the OTP character string codes on the mobile equipment where the client side APP is located and reading results of the exclusive numbers on the mobile equipment where the client side APP is located;
and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client APP is located, the verification is passed.
This description embodiment carries out the check-up of client APP based on OTP string code, when OTP string exists unusually, checks up based on data network information transmission ICCID equipment information, can realize client APP's no perception check-up, promotes user experience, need not artifical the participation, and can reduce because the check-up failure that GSM network signal brought increases the check-up success rate, and the payment success rate, guarantees client APP's security.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart of a verification method provided in an embodiment of the present disclosure;
fig. 2 is a flowchart of checking an electronic wallet APP provided by an embodiment of the present specification;
FIG. 3 is a flow chart of another verification method provided by embodiments of the present disclosure;
fig. 4 is a flowchart of a verification process of an electronic wallet APP provided by an embodiment of the present specification;
FIG. 5 is a block diagram of a verification method provided in an embodiment of the present disclosure;
fig. 6 is a schematic diagram of a verification apparatus provided in an embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any inventive step based on the embodiments of the present disclosure, shall fall within the scope of protection of the present application.
In less developed areas, migration of USSD users to electronic wallet APP users requires user authentication. In a risk control scenario, an electronic wallet APP user often needs to check through OTP to realize user identity verification. The OTP is a password which can be used only once, and the password is an unpredictable random number combination generated every 60 seconds according to a special algorithm, has wide application in user verification and can effectively protect the user security. However, the OTP verification has the following problems: users with lower education in less developed areas do not understand how to use the OTP, or even cannot read the OTP; the user is vulnerable to fraud, being cheated into the OTP, resulting in theft of the account. At present, aiming at the risk of account number theft (ATO) or card theft, OTP verification is preferably adopted except for a password. Whether only single-factor verification of OTP is adopted or double-factor verification of password and OTP is adopted at the same time, normal users without risks are disturbed by one layer, and the user experience is not facilitated; in addition, under the condition that the signal network of the mobile phone is poor, the OTP cannot be normally acquired, so that the user cannot complete the OTP verification.
Based on the above problems, a new verification method is needed to implement the verification of the user. In the embodiment of the specification, when risk occurs in the client side APP, the OTP is used for checking, so that the user can check the user, the disturbance to a normal user can be reduced, and the user experience is improved. Further, when the OTP cannot be normally acquired, the ICCID equipment information is transmitted based on the data network signal for verification, so that the problem that the OTP verification cannot be completed by a user under the condition of poor mobile phone signal network is solved.
Fig. 1 is a flowchart of a verification method provided in an embodiment of the present specification, where the verification method specifically includes:
step S101: when the client side APP needs to be checked, the mobile device where the mobile number bound by the client side APP is located automatically receives information of the OTP string code sent based on the exclusive number, wherein the exclusive number is generated by the client side APP and a network operator according to an encryption protocol.
In an embodiment of the present specification, the client APP is a client APP with a payment function.
In this embodiment of the present specification, when the client APP needs to be verified, it means that when some operations are performed by the client and a risk occurs, the client APP needs to be verified. In an embodiment of the present specification, when the client APP needs to be verified, it means that when the client APP detects that the client APP has a risk during login, and/or password modification, and/or payment, the client APP needs to be verified.
In one embodiment of the present description, the client APP is an electronic wallet APP. When the client side APP needs to be verified, the client side APP means that when the electronic wallet APP detects that the electronic wallet APP is at risk during login, and/or password modification, and/or payment, the electronic wallet APP needs to be verified.
In the embodiment of the present specification, the electronic wallet APP refers to an electronic wallet APP having a payment function, which is mainly used for payment. In the embodiment of the specification, the electronic wallet APP can be a unionpay wallet cloud flash payment mobile phone client, a WeChat mobile phone client, a Paibao and the like. Of course, the specific type of electronic wallet APP does not constitute a limitation of the present application.
In an embodiment of the present specification, the dedicated number is a dedicated number generated by the client APP and the network operator according to an encryption protocol, and the dedicated number sends the OTP string code and the encrypted dedicated number to the mobile device in a form of a short message.
In this embodiment of the present description, when a client APP needs to be checked, a mobile device where a mobile number bound to the client APP is located automatically receives information of an OTP string code sent based on an exclusive number. It should be noted that, the information of the OTP string code is sent to the mobile device by the dedicated number in the form of a short message. Therefore, the Mobile device must have GSM (Global System for Mobile Communications) network signals. The mobile device may be a device with GSM network functionality, and the specific type of mobile device does not constitute a limitation of the present application. When the client side APP needs to be checked, the special number can automatically send the character string codes to the mobile equipment where the mobile number bound by the client side APP is located, and the OTP character string codes can be obtained under the condition that a user does not sense, so that disturbance to the user is reduced.
In the embodiment of the present specification, the OTP string code may be a 36-bit or 64-bit or 128-bit long character, and the number of bits of the string does not constitute a limitation of the present application. The OTP string code is a combination of numbers and characters.
Step S103: the client side APP automatically reads information of the OTP character string codes on the mobile equipment where the client side APP is located, reading results are obtained, and the reading results comprise reading results of the OTP character string codes on the mobile equipment where the client side APP is located and reading results of the exclusive numbers on the mobile equipment where the client side APP is located.
After the mobile equipment where the mobile number bound by the client side APP is located automatically receives the information of the OTP character string codes sent based on the exclusive number, the client side APP identifies the exclusive number within the preset time and automatically reads the OTP character string codes to obtain a reading result. As mentioned above, the dedicated number is a number generated by the client APP and the encryption protocol, and may also be referred to as a unique identifier. It should be noted that, in the specific implementation process, the dedicated number may be switched in real time through encryption, so as to ensure that the dedicated number cannot be captured by a third party, and therefore, the security is improved.
In an embodiment of the present specification, identifying, by a client APP, an exclusive number on a mobile device where the client APP is located within a preset time refers to decrypting, by the client APP, the exclusive number on the mobile device where the client APP is located within the preset time according to the encryption protocol; the reading result comprises a decryption result of the exclusive number on the mobile equipment where the client side APP is located and a reading result of the OTP character string code on the mobile equipment where the client side APP is located. In the process of sending the OTP character string, the exclusive number is sent to the mobile equipment where the mobile number bound by the client side APP is located in an encryption mode, and in the subsequent automatic reading process, the client side APP decrypts the encrypted exclusive number according to an encryption protocol.
In the embodiments of the present specification, the preset time may be 30s or 60s, and the length of the preset time does not limit the present application. However, in order to ensure that the user has a better use experience, the time for the client APP to automatically read the OTP string code is not too long. Because the client APP automatically reads the OTP string codes within a short preset time, the user does not need any participation, and the time is short, so that the user can obtain the OTP string codes without perception, the disturbance to the user is reduced, and better use experience is brought to the user.
It should be particularly noted that when the client APP needs to be verified, the mobile device where the mobile number bound to the client APP is located automatically receives the information of the OTP string code sent based on the dedicated number; and when automatic reading, client APP reads the information of OTP string code on the mobile device that client APP belongs to automatically, obtains the reading result to can guarantee under the condition that mobile device is stolen, client APP's security.
Step S105: and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client APP is located, the verification is passed.
Continuing the above steps, the client APP automatically reads the information of the OTP string code on the mobile device where the client APP is located, and after the reading result is obtained, further comparison is needed to verify whether the check is passed. If the reading result is consistent with an OTP character string code sent based on an exclusive number and automatically received by the mobile device where the mobile number bound by the client APP is located, the check is passed, and the method specifically includes:
if the read result of the exclusive number in the read result is consistent with the exclusive number on the mobile equipment where the mobile number bound by the client side APP is located, and the OTP character string code in the read result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client side APP is located, the check is passed;
and if the read result of the exclusive number in the read result is inconsistent with the exclusive number on the mobile equipment where the mobile number bound by the client side APP is located, and/or the OTP character string code in the read result is inconsistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client side APP is located, the verification fails.
The verification method provided by the embodiment of the specification can realize automatic verification under the condition that a user does not sense, reduces disturbance to the user, and can ensure the account safety of the client APP without considering the cultural degree of the user.
As described above, the client APP is an electronic wallet APP, and to further understand the method provided in the embodiment of the present specification, fig. 2 is a flowchart illustrating a verification method of the electronic wallet APP provided in the embodiment of the present specification, where the verification method specifically includes:
step S201: when the electronic wallet APP needs to be checked, the mobile device where the mobile number bound by the electronic wallet APP is located automatically receives information of the OTP string code sent based on the exclusive number, wherein the exclusive number is obtained by the electronic wallet APP and a network operator according to an encryption protocol.
Step S203: the method comprises the steps that the information of the OTP string codes on the mobile equipment where the electronic wallet APP is located is automatically read by the electronic wallet APP, and the reading result is obtained and comprises the reading result of the OTP string codes on the mobile equipment where the electronic wallet APP is located and the reading result of the exclusive number on the mobile equipment where the electronic wallet APP is located.
Step S205: and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the electronic wallet APP is located, the verification is passed.
The verification method provided by the embodiment of the specification can realize automatic verification under the condition that the user does not sense, reduces disturbance to the user, and can ensure the account safety of the electronic wallet APP without considering the cultural degree of the user.
In order to avoid the security verification in the presence of an abnormal OTP string code, an embodiment of the present specification further provides another verification method, and fig. 3 is a flowchart of another verification method provided by the embodiment of the present specification, where the verification method specifically includes:
step S301: when the client side APP needs to be checked, the mobile equipment where the mobile number bound by the client side APP is located automatically receives information of the OTP string code sent based on the exclusive number, wherein the exclusive number is obtained by the client side APP and a network operator according to an encryption protocol.
Step S303: the client side APP automatically reads information of the OTP character string codes on the mobile equipment where the client side APP is located to obtain reading results, wherein the reading results comprise reading results of the OTP character string codes on the mobile equipment where the client side APP is located and reading results of the exclusive numbers on the mobile equipment where the client side APP is located;
step S305: and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client APP is located, the verification is passed.
Step S307: and if the OTP character string code is abnormal, the client APP transmits ICCID equipment information based on a data network signal to check.
In this embodiment of the present specification, the existence of the exception in the OTP string code includes that the mobile device where the mobile number bound by the client APP is located fails to receive the OTP string code information sent based on the dedicated number, or the information that the client APP automatically reads the OTP string code on the mobile device where the client APP is located is overtime. In a specific implementation process, the reason that the failure of the mobile device where the mobile number bound by the client APP is located to receive the OTP character string code information sent based on the dedicated number may be that a GSM network signal is weak; the time-out of the information of the OTP character string code on the mobile device where the client APP is automatically read by the client APP may be due to slow system operation or due to inconsistency between the mobile device where the client APP is located and the mobile device where the mobile number bound to the client APP is located. When the OTP string code is abnormal, the client APP transmits the ICCID device information based on the data network signal, and performs verification, specifically including:
if the mobile equipment where the mobile number bound by the client APP is located fails to receive the OTP string code information sent based on the exclusive number, or if the information that the client APP automatically reads the OTP string code on the mobile equipment where the client APP is located is overtime, the client APP checks the ICCID equipment information and the established trusted relationship pair based on data network signal transmission;
if the ICCID equipment information transmitted by the client APP based on the data network signal is consistent with the information of the established trusted relationship pair, the checking is passed;
and if the ICCID equipment information transmitted by the client APP based on the data network signal is inconsistent with the information of the established trusted relationship pair, the verification fails.
In an embodiment of the present specification, the established trusted relationship pair is a trusted relationship pair of ICCID device information and a user account established by the wind control decision engine based on a history record, and the trusted relationship pair adopts a hierarchical scoring evaluation manner, where the history record refers to a record of the ICCID device information and the user account corresponding to the client APP that pass OTP string code verification.
In a specific implementation process, the established trusted relationship pair is that the wind control decision engine passes through a history record, specifically, the record that the ICCID device information and the user account corresponding to the client APP pass through the OTP character string code verification, if the user passes through the ICCID device information, and the user account (UserID) corresponding to the client APP completes the OTP verification through the OTP character string code, the relationship between the ICCID and the user account is considered to be more trusted; if the user uses the same ICCID all the time in a long period of history, the relationship between the ICCID and the user account is considered to be very trusted.
In order to distinguish different credibility degrees of the credible relationship pair, the credible relationship pair is established by adopting a hierarchical scoring evaluation mode. In a specific implementation process, the principle of hierarchical scoring may be based on the length of time that the user uses the ICCID and/or the number of times that the user passes the OTP verification based on the same ICCID, according to the history, to score the trusted relationship pair. The longer the user uses the ICCID, the more times the user passes the OTP check based on the same ICCID, the higher the score is, and the higher the credibility of the credibility relationship pair is.
It should be noted that the recognition degree of the trusted relationship pair may depend on the specific application scenario. In one embodiment of the present description, the tier score is 6, with 1 being the least trustworthy and 6 being the most trustworthy. For links such as login and the like, weak management and control can be adopted, and the links with scores of more than or equal to 3 are credible; and the links such as secret modification and the like can be strongly controlled, and the credibility is obtained when the score is more than or equal to 5.
The fixed line is a unique identification code of the SIM Card in the SIM Card, and the ICCID is a unique identification number of the IC Card and is composed of 20 digits in total. Thus, unique identification can be achieved based on the ICCID device information.
The client side APP checks the ICCID device information and the established trusted relationship pair based on data network signal transmission, and the method specifically comprises the following steps:
transmitting ICCID equipment information transmitted by the client APP based on data network signals to the wind control decision engine;
the wind control decision engine judges whether the ICCID equipment information transmitted by the client APP based on the data network signal is consistent with the ICCID equipment information and the credible relationship pair of the user account or not according to the established credible relationship pair;
if the client APP is consistent with the ICCID equipment information and the user account credible relationship pair based on data network signal transmission, the verification is passed;
and if the ICCID equipment information transmitted by the client APP based on the data network signal is inconsistent with the credible relationship between the ICCID equipment information and the user account, the verification fails.
In this embodiment of the present specification, the client APP may send a verification failure prompt to the user if the client APP is inconsistent with the ICCID device information transmitted based on the data network signal and the trusted relationship between the ICCID device information and the user account, and may also automatically receive the information of the OTP string code sent based on the dedicated number after the verification fails and the mobile device where the mobile number bound to the client APP is located, and perform the verification.
By adopting the verification method provided by the embodiment of the specification, the verification of the client side APP can be ensured under the condition that the OTP string code is abnormal, so that the problem that the OTP verification cannot be completed under the condition that the signal of the mobile phone signal network is poor is solved, and the safety of the user using the client side APP is ensured.
Continuing with the previous example, the client APP is an electronic wallet APP, and to further understand the method provided in the embodiment of the present specification, fig. 4 is a flowchart illustrating a verification method of the electronic wallet APP provided in the embodiment of the present specification, where the verification method specifically includes:
step S401: when the electronic wallet APP needs to be checked, the mobile device where the mobile number bound by the electronic wallet APP is located automatically receives information of the OTP string code sent based on the exclusive number, wherein the exclusive number is obtained by the electronic wallet APP and a network operator according to an encryption protocol.
Step S403: the method comprises the steps that the information of the OTP string codes on the mobile equipment where the electronic wallet APP is located is automatically read by the electronic wallet APP, and the reading result is obtained and comprises the reading result of the OTP string codes on the mobile equipment where the electronic wallet APP is located and the reading result of the exclusive number on the mobile equipment where the electronic wallet APP is located.
Step S405: and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the electronic wallet APP is located, the verification is passed.
Step S407: and if the OTP character string code is abnormal, the electronic wallet APP transmits ICCID equipment information based on a data network signal for verification.
By adopting the verification method provided by the embodiment of the specification, under the condition that the OTP string code is abnormal, the verification of the electronic wallet APP can be ensured, so that the problem that the OTP verification cannot be completed under the condition that the signal network signal of the mobile phone is poor is solved, and the safety of the user using the electronic wallet APP is ensured.
To further understand the verification method provided in the embodiments of the present specification, fig. 5 is a block diagram of a verification method provided in the embodiments of the present specification, where the method includes:
step S501: when the client side APP needs to be checked, the mobile equipment where the mobile number bound by the client side APP is located automatically receives information of the OTP string code sent based on the exclusive number, wherein the exclusive number is obtained by the client side APP and a network operator according to an encryption protocol.
Step S503: and the client side APP automatically reads the information of the OTP string code on the mobile equipment where the client side APP is located, and the verification is carried out.
Step S505: and if the OTP character string code is abnormal, the client APP transmits ICCID equipment information based on a data network signal to check.
If the mobile equipment where the mobile number bound by the client side APP is located fails to receive the OTP character string code information sent based on the exclusive number, or if the information that the client side APP automatically reads the OTP character string code on the mobile equipment where the client side APP is located is overtime, the client side APP transmits ICCID equipment information based on the data network information, and verification is carried out.
By adopting the method provided by the embodiment of the specification, the non-sensing verification of the client APP can be realized, the user experience can be improved, the manual participation is not needed, the verification failure caused by GSM network signals can be reduced, the verification success rate and the payment success rate are increased, and the safety of the client APP is ensured.
The above details a verification method, and accordingly, the present specification also provides a verification apparatus, as shown in fig. 6. Fig. 6 is a schematic diagram of a verification apparatus provided in an embodiment of the present disclosure, where the verification apparatus includes:
a receiving module 601, where when a client APP needs to be verified, a mobile device where a mobile number bound to the client APP is located automatically receives information of an OTP string code sent based on an exclusive number, where the exclusive number is an exclusive number obtained by the client APP and a network operator according to an encryption protocol;
the reading module 603 is configured to automatically read information of the OTP string code on the mobile device where the client APP is located by the client APP, and obtain a reading result, where the reading result includes a reading result of the OTP string code on the mobile device where the client APP is located and a reading result of the dedicated number on the mobile device where the client APP is located;
the first checking module 605, if the read result is consistent with the OTP string code sent based on the dedicated number and automatically received by the mobile device where the mobile number bound by the client APP is located, passes the checking.
Further, the apparatus further comprises:
and a second checking module 607, configured to, if the OTP string code is abnormal, check the client APP based on the ICCID device information transmitted by the data network signal.
Further, the receiving module 601 specifically includes:
the client side APP is an electronic wallet APP, and when the client side APP needs to be checked, the client side APP needs to be checked when the electronic wallet APP detects that a risk exists during login, and/or password modification and/or payment.
Further, the reading module 603 specifically includes:
the client side APP automatically reads the information of the OTP string code on the mobile device where the client side APP is located, and a reading result is obtained, and the method specifically comprises the following steps:
the client side APP identifies the exclusive number on the mobile equipment where the client side APP is located within the preset time, the OTP character string code on the mobile equipment where the client side APP is located is automatically read, and the reading result is obtained.
Further, the identification, by the client APP, of the exclusive number on the mobile device where the client APP is located within a preset time means that the client APP decrypts the exclusive number on the mobile device where the client APP is located within the preset time according to the encryption protocol; the reading result comprises a decryption result of the exclusive number on the mobile equipment where the client side APP is located and a reading result of the OTP character string code on the mobile equipment where the client side APP is located.
Further, the first verification module 605 specifically includes:
if the reading result is consistent with an OTP string code sent based on an exclusive number and automatically received by the mobile device where the mobile number bound by the client APP is located, the check is passed, and the method specifically comprises the following steps:
if the read result of the exclusive number in the read result is consistent with the exclusive number on the mobile equipment where the mobile number bound by the client side APP is located, and the OTP character string code in the read result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client side APP is located, the check is passed;
and if the read result of the exclusive number in the read result is inconsistent with the exclusive number on the mobile equipment where the mobile number bound by the client side APP is located, and/or the OTP character string code in the read result is inconsistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client side APP is located, the verification fails.
Further, the second check module 607 specifically includes:
if the OTP string code is abnormal, transmitting ICCID device information based on a data network signal, and performing verification, specifically including:
if the OTP string code is abnormal, the client APP checks based on the ICCID device information transmitted by the data network signal, and specifically includes:
if the mobile equipment where the mobile number bound by the client APP is located fails to receive the OTP string code information sent based on the exclusive number, or if the information that the client APP automatically reads the OTP string code on the mobile equipment where the client APP is located is overtime, the client APP checks the ICCID equipment information and the established trusted relationship pair based on data network signal transmission;
if the ICCID equipment information transmitted by the client APP based on the data network signal is consistent with the information of the established trusted relationship pair, the checking is passed;
and if the ICCID equipment information transmitted by the client APP based on the data network signal is inconsistent with the information of the established trusted relationship pair, the verification fails.
Further, the established credible relationship pair is the credible relationship pair of the ICCID equipment information and the user account established by the wind control decision engine based on historical records, the credible relationship pair adopts a layered grading evaluation mode, and the historical records refer to records of the ICCID equipment information and the user account corresponding to the client APP, which pass the OTP string code verification.
Further, the verifying the client APP based on the data network signaling ICCID device information and the established trusted relationship pair specifically includes:
transmitting ICCID equipment information transmitted by the client APP based on data network signals to the wind control decision engine;
the wind control decision engine judges whether the ICCID equipment information transmitted by the client APP based on the data network signal is consistent with the ICCID equipment information and the credible relationship pair of the user account or not according to the established credible relationship pair;
if the client APP is consistent with the ICCID equipment information and the user account credible relationship pair based on data network signal transmission, the verification is passed;
and if the ICCID equipment information transmitted by the client APP based on the data network signal is inconsistent with the credible relationship between the ICCID equipment information and the user account, the verification fails.
An embodiment of the present specification further provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
when a client APP needs to be checked, a mobile device where a mobile number bound by the client APP is located automatically receives information of an OTP string code sent based on an exclusive number, wherein the exclusive number is generated by the client APP and a network operator according to an encryption protocol;
the client side APP automatically reads information of the OTP character string codes on the mobile equipment where the client side APP is located to obtain reading results, wherein the reading results comprise reading results of the OTP character string codes on the mobile equipment where the client side APP is located and reading results of the exclusive numbers on the mobile equipment where the client side APP is located;
and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client APP is located, the verification is passed.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the embodiments of the apparatus, the electronic device, and the nonvolatile computer storage medium, since they are substantially similar to the embodiments of the method, the description is simple, and the relevant points can be referred to the partial description of the embodiments of the method.
The apparatus, the electronic device, the nonvolatile computer storage medium and the method provided in the embodiments of the present description correspond to each other, and therefore, the apparatus, the electronic device, and the nonvolatile computer storage medium also have similar advantageous technical effects to the corresponding method.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: the ARC625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more software and/or hardware implementations in implementing one or more embodiments of the present description.
As will be appreciated by one skilled in the art, the present specification embodiments may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium which can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present specification, and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (19)

1. A method of verification, comprising:
when a client APP needs to be checked, mobile equipment where a mobile number bound by the client APP is located automatically receives information of an OTP string code sent based on an exclusive number;
the client side APP automatically reads information of the OTP character string codes on the mobile equipment where the client side APP is located to obtain reading results, wherein the reading results comprise reading results of the OTP character string codes on the mobile equipment where the client side APP is located and reading results of the exclusive numbers on the mobile equipment where the client side APP is located;
and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client APP is located, the verification is passed.
2. The method of claim 1, the method further comprising:
and if the OTP character string code is abnormal, the client APP transmits ICCID equipment information based on a data network signal to check.
3. The method of claim 1, wherein the client APP is an electronic wallet APP, and the client APP needs to be verified when a risk is detected during login, password modification, and/or payment of the electronic wallet APP.
4. The method according to claim 1, wherein the client APP automatically reads information of the OTP string code on the mobile device where the client APP is located to obtain a read result, specifically including:
the client side APP identifies the exclusive number on the mobile equipment where the client side APP is located within the preset time, the OTP character string code on the mobile equipment where the client side APP is located is automatically read, and the reading result is obtained.
5. The method according to claim 4, wherein the identification, by the client APP, of the specific number on the mobile device where the client APP is located within a predetermined time means that the client APP decrypts, according to the encryption protocol, the specific number on the mobile device where the client APP is located within the predetermined time, and the read result includes a decryption result of the specific number on the mobile device where the client APP is located and a read result of the OTP string code on the mobile device where the client APP is located.
6. The method according to claim 1, wherein if the read result is consistent with an OTP string code sent based on a dedicated number and automatically received by a mobile device where a mobile number bound to the client APP is located, the checking is passed, specifically including:
if the read result of the exclusive number in the read result is consistent with the exclusive number on the mobile equipment where the mobile number bound by the client side APP is located, and the OTP character string code in the read result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client side APP is located, the check is passed;
and if the read result of the exclusive number in the read result is inconsistent with the exclusive number on the mobile equipment where the mobile number bound by the client side APP is located, and/or the OTP character string code in the read result is inconsistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client side APP is located, the verification fails.
7. The method according to claim 2, wherein if the OTP string code is abnormal, the client APP checks based on ICCID device information transmitted by a data network signal, specifically including:
if the mobile equipment where the mobile number bound by the client APP is located fails to receive the OTP string code information sent based on the exclusive number, or if the information that the client APP automatically reads the OTP string code on the mobile equipment where the client APP is located is overtime, the client APP checks the ICCID equipment information and the established trusted relationship pair based on data network signal transmission;
if the ICCID equipment information transmitted by the client APP based on the data network signal is consistent with the information of the established trusted relationship pair, the checking is passed;
and if the ICCID equipment information transmitted by the client APP based on the data network signal is inconsistent with the information of the established trusted relationship pair, the verification fails.
8. The method of claim 7, wherein the established trusted relationship pair is a trusted relationship pair of the ICCID device information and the user account established by the wind control decision engine based on a history record, and the trusted relationship pair adopts a hierarchical scoring evaluation manner, wherein the history record refers to a record that the ICCID device information and the user account corresponding to the client APP pass OTP string code verification.
9. The method of claim 7, wherein the client APP verifies the pair based on the ICCID device information signaled by the data network and the established trusted relationship, and specifically comprises:
transmitting ICCID equipment information transmitted by the client APP based on data network signals to the wind control decision engine;
the wind control decision engine judges whether the ICCID equipment information transmitted by the client APP based on the data network signal is consistent with the ICCID equipment information and the credible relationship pair of the user account or not according to the established credible relationship pair;
if the client APP is consistent with the ICCID equipment information and the user account credible relationship pair based on data network signal transmission, the verification is passed;
and if the ICCID equipment information transmitted by the client APP based on the data network signal is inconsistent with the credible relationship between the ICCID equipment information and the user account, the verification fails.
10. A verification device, comprising:
the method comprises the following steps that a receiving module is used, when a client APP needs to be checked, mobile equipment where a mobile number bound by the client APP is located automatically receives information of OTP character string codes sent based on an exclusive number;
the client side APP automatically reads the information of the OTP character string codes on the mobile equipment where the client side APP is located to obtain reading results, and the reading results comprise the reading results of the OTP character string codes on the mobile equipment where the client side APP is located and the reading results of the exclusive numbers on the mobile equipment where the client side APP is located;
and the first checking module is used for passing the checking if the reading result is consistent with the OTP character string code which is automatically received by the mobile equipment where the mobile number bound by the client APP is located and is sent based on the exclusive number.
11. The apparatus of claim 10, the apparatus further comprising:
and the second checking module is used for checking the client APP based on the ICCID equipment information transmitted by the data network signal if the OTP character string code is abnormal.
12. The apparatus of claim 10, wherein the client APP is an electronic wallet APP, and the client APP needs to be verified when a risk is detected during login, password modification, and/or payment of the electronic wallet APP.
13. The apparatus of claim 10, wherein the client APP automatically reads information of the OTP string code on the mobile device where the client APP is located to obtain a read result, and specifically includes:
the client side APP identifies the exclusive number on the mobile equipment where the client side APP is located within the preset time, the OTP character string code on the mobile equipment where the client side APP is located is automatically read, and the reading result is obtained.
14. The apparatus according to claim 13, where the client APP recognizes the specific number on the mobile device where the client APP is located within a predetermined time, in which the client APP decrypts the specific number on the mobile device where the client APP is located according to the encryption protocol within the predetermined time, and the read result includes a decryption result of the specific number on the mobile device where the client APP is located and a read result of the OTP string code on the mobile device where the client APP is located.
15. The apparatus according to claim 10, wherein if the read result is consistent with an OTP string code sent based on a dedicated number and automatically received by a mobile device where a mobile number bound to the client APP is located, the checking is passed, specifically including:
if the read result of the exclusive number in the read result is consistent with the exclusive number on the mobile equipment where the mobile number bound by the client side APP is located, and the OTP character string code in the read result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client side APP is located, the check is passed;
and if the read result of the exclusive number in the read result is inconsistent with the exclusive number on the mobile equipment where the mobile number bound by the client side APP is located, and/or the OTP character string code in the read result is inconsistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client side APP is located, the verification fails.
16. The apparatus according to claim 11, wherein if the OTP string code is abnormal, the client APP checks based on ICCID device information transmitted by a data network signal, specifically including:
if the mobile equipment where the mobile number bound by the client APP is located fails to receive the OTP string code information sent based on the exclusive number, or if the information that the client APP automatically reads the OTP string code on the mobile equipment where the client APP is located is overtime, the client APP checks the ICCID equipment information and the established trusted relationship pair based on data network signal transmission;
if the ICCID equipment information transmitted by the client APP based on the data network signal is consistent with the information of the established trusted relationship pair, the checking is passed;
and if the ICCID equipment information transmitted by the client APP based on the data network signal is inconsistent with the information of the established trusted relationship pair, the verification fails.
17. The apparatus of claim 16, wherein the established trusted relationship pair is a trusted relationship pair of ICCID device information and a user account established by the wind control decision engine based on a history record, and the trusted relationship pair adopts a hierarchical scoring evaluation manner, and the history record refers to a record of verification of OTP string codes of the ICCID device information and the user account corresponding to the client APP.
18. The apparatus of claim 16, wherein the client APP verifies the pair of ICCID device information based on data network signaling and the established trusted relationship, specifically comprising:
transmitting ICCID equipment information transmitted by the client APP based on data network signals to the wind control decision engine;
the wind control decision engine judges whether the ICCID equipment information transmitted by the client APP based on the data network signal is consistent with the ICCID equipment information and the credible relationship pair of the user account or not according to the established credible relationship pair;
if the client APP is consistent with the ICCID equipment information and the user account credible relationship pair based on data network signal transmission, the verification is passed;
and if the ICCID equipment information transmitted by the client APP based on the data network signal is inconsistent with the credible relationship between the ICCID equipment information and the user account, the verification fails.
19. An electronic device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
when a client APP needs to be checked, mobile equipment where a mobile number bound by the client APP is located automatically receives information of an OTP string code sent based on an exclusive number;
the client side APP automatically reads information of the OTP character string codes on the mobile equipment where the client side APP is located to obtain reading results, wherein the reading results comprise reading results of the OTP character string codes on the mobile equipment where the client side APP is located and reading results of the exclusive numbers on the mobile equipment where the client side APP is located;
and if the reading result is consistent with the OTP character string code sent based on the exclusive number and automatically received by the mobile equipment where the mobile number bound by the client APP is located, the verification is passed.
CN202110804300.5A 2020-03-04 2020-03-04 Verification method, device and equipment Pending CN113570377A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110804300.5A CN113570377A (en) 2020-03-04 2020-03-04 Verification method, device and equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110804300.5A CN113570377A (en) 2020-03-04 2020-03-04 Verification method, device and equipment
CN202010141463.5A CN111292091B (en) 2020-03-04 2020-03-04 Verification method, device and equipment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202010141463.5A Division CN111292091B (en) 2020-03-04 2020-03-04 Verification method, device and equipment

Publications (1)

Publication Number Publication Date
CN113570377A true CN113570377A (en) 2021-10-29

Family

ID=71030224

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010141463.5A Active CN111292091B (en) 2020-03-04 2020-03-04 Verification method, device and equipment
CN202110804300.5A Pending CN113570377A (en) 2020-03-04 2020-03-04 Verification method, device and equipment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010141463.5A Active CN111292091B (en) 2020-03-04 2020-03-04 Verification method, device and equipment

Country Status (2)

Country Link
CN (2) CN111292091B (en)
WO (1) WO2021174969A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745172A (en) * 2022-04-08 2022-07-12 中国银行股份有限公司 APP login information processing method and device

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111292091B (en) * 2020-03-04 2021-06-04 支付宝(杭州)信息技术有限公司 Verification method, device and equipment
CN111797645A (en) * 2020-07-08 2020-10-20 北京京东振世信息技术有限公司 Method and apparatus for identifying bar code
CN114741231B (en) * 2022-04-19 2023-06-27 深圳鲲云信息科技有限公司 Data reading and writing method, device, equipment and storage medium based on memory
CN116501727B (en) * 2023-06-29 2023-09-19 深圳市华磊迅拓科技有限公司 Equipment data verification method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104703151A (en) * 2013-12-09 2015-06-10 浙江融创信息产业有限公司 Client dynamic password authentication method, device and terminal
CN108965331A (en) * 2018-08-29 2018-12-07 腾讯科技(深圳)有限公司 Log in method of calibration, device and login system
US20200044851A1 (en) * 2018-07-31 2020-02-06 Jpmorgan Chase Bank, N.A. System and method for implementing channel dynamic multifactor authentication

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428691A (en) * 2012-05-24 2013-12-04 希姆通信息技术(上海)有限公司 Mobile phone bank safety certificating method and system
CN203984441U (en) * 2012-08-17 2014-12-03 天地融科技股份有限公司 A kind of dynamic password generation system and device
KR20150124868A (en) * 2014-04-29 2015-11-06 이선형 Secure user two factor authentication method and system from Personal infomation leaking and smishing
CN104079562B (en) * 2014-06-09 2017-07-11 中国建设银行股份有限公司 A kind of safety certifying method and relevant apparatus based on payment terminal
US10050942B2 (en) * 2015-03-17 2018-08-14 Ca, Inc. System and method of mobile authentication
CN105119722B (en) * 2015-08-07 2018-05-01 杭州朗和科技有限公司 A kind of auth method, equipment and system
CN105825377A (en) * 2015-12-22 2016-08-03 广东亿迅科技有限公司 Secure payment verification method, payment verification device, server and system
CN107453871B (en) * 2016-05-30 2020-07-03 阿里巴巴集团控股有限公司 Password generation method, password verification method, payment method and payment device
CN106600278A (en) * 2016-12-01 2017-04-26 努比亚技术有限公司 Mobile payment device and method
IT201700044688A1 (en) * 2017-04-24 2018-10-24 Just Log Me S R L AUTHENTICATION AND MANAGEMENT SYSTEM IDENTITY WITHOUT PASSWORD BY MEANS OF QR CODE DISPOSABLE AND RELATIVE METHOD
CN108197940A (en) * 2018-01-17 2018-06-22 武汉轻工大学 Payment request response method, mobile terminal and the readable storage medium storing program for executing of mobile terminal
CN111292091B (en) * 2020-03-04 2021-06-04 支付宝(杭州)信息技术有限公司 Verification method, device and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104703151A (en) * 2013-12-09 2015-06-10 浙江融创信息产业有限公司 Client dynamic password authentication method, device and terminal
US20200044851A1 (en) * 2018-07-31 2020-02-06 Jpmorgan Chase Bank, N.A. System and method for implementing channel dynamic multifactor authentication
CN108965331A (en) * 2018-08-29 2018-12-07 腾讯科技(深圳)有限公司 Log in method of calibration, device and login system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
廖文军;叶喜民;: "基于OTP的数字校园身份认证系统的设计", 郑州轻工业学院学报(自然科学版), no. 03, pages 299 - 307 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745172A (en) * 2022-04-08 2022-07-12 中国银行股份有限公司 APP login information processing method and device

Also Published As

Publication number Publication date
CN111292091B (en) 2021-06-04
CN111292091A (en) 2020-06-16
WO2021174969A1 (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN111292091B (en) Verification method, device and equipment
CN109087106B (en) Wind control model training and wind control method, device and equipment for recognizing fraudulent use of secondary number-paying account
AU2016201188B2 (en) Systems, methods, and computer program products for securing and managing applications on secure elements
ES2808954T3 (en) Procedure and device for use in risk management of application information
JP2020508593A (en) Consensus verification method and device
US20150244718A1 (en) Biometric authentication
CN113572715A (en) Data transmission method and system based on block chain
US20160239841A1 (en) Method, apparatus, and system for secure online payment
KR20220119308A (en) Secure authentication based on identity data stored on contactless cards
CN113704826A (en) Privacy protection-based business risk detection method, device and equipment
JP2023521997A (en) Determination of specific conditions for contactless card activation
CN114080619A (en) Limiting transaction capabilities of contactless cards
CN111582868A (en) Transaction request processing method, device and equipment
CN109299944B (en) Data encryption method, system and terminal in transaction process
CN111386690A (en) Authentication payment card
CN111930846A (en) Data processing method, device and equipment
US10263781B2 (en) IC chip and authentication method for user authentication
CN105574425B (en) Access the method and device of storage data
KR20220115919A (en) Secure authentication based on passport data stored on contactless card
ES2878161T3 (en) Method of managing a procedure of an emergency mode of transaction and associated device
CN111741115A (en) Service processing method, device and system and electronic equipment
CN110781472A (en) Fingerprint data storage and verification method, terminal and storage medium
CN103824029A (en) Smart cart data processing method and device
CN113810413B (en) Method, device and equipment for processing equipment account
KR102140374B1 (en) Device and method for preventing cache side channel attack of blockchain wallet system, recording medium for performing the method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination