CN115243230A - Service execution method, device, storage medium and electronic equipment - Google Patents

Service execution method, device, storage medium and electronic equipment Download PDF

Info

Publication number
CN115243230A
CN115243230A CN202210836170.8A CN202210836170A CN115243230A CN 115243230 A CN115243230 A CN 115243230A CN 202210836170 A CN202210836170 A CN 202210836170A CN 115243230 A CN115243230 A CN 115243230A
Authority
CN
China
Prior art keywords
user
service
information
authentication
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210836170.8A
Other languages
Chinese (zh)
Inventor
陈凯鑫
齐国强
周星辰
高鑫跃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN202210836170.8A priority Critical patent/CN115243230A/en
Publication of CN115243230A publication Critical patent/CN115243230A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The specification provides a service execution method, a service execution device, a storage medium and an electronic device. In the service execution method provided in this specification, a user may scan a graphic code on a service guide machine using a terminal to obtain service information carried in the graphic code; the terminal can send the user information and the service information to the service server so that the service server can authenticate the user for one time; when the user fails to authenticate once, the user can enable the terminal to establish close range communication connection with the service guide machine tool, and sends the authentication information received from the service guide machine tool to the service server, so that the service server performs secondary authentication on the user according to the authentication information, and provides service for the user when the secondary authentication is successful. When the method in the specification is adopted to provide offline service, the offline service can be provided in a way of enabling the terminal of the on-site user to establish close-range communication connection with the business guide machine, and the on-site graphic code can be effectively prevented from being uploaded to a network for scanning in a large quantity.

Description

Service execution method, device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a method and an apparatus for executing a service, a storage medium, and an electronic device.
Background
Today, online services are becoming more and more popular, resulting in a substantial decrease in the number of users using offline services. To promote increased use of offline services and increase the user's rate of arrival, service providers typically engage in various offline activities to encourage the user to go to a store to use the offline services in a manner that provides good quality offline services.
At present, when an offline activity is carried out, a two-dimensional code is usually set on an activity site in the existing business execution method, and a user can participate in the activity by scanning the two-dimensional code on the site to obtain the offline service.
However, the two-dimensional code used for participating in the activity is usually fixed, so there may be a phenomenon of embezzlement on line, that is, if the two-dimensional code is spread to the internet, even an off-site user can directly perform a business on line by scanning the two-dimensional code on the network, and obtain a service that would otherwise be available on line.
How to avoid the situation of embezzlement of brushing on the line is a problem which needs to be solved urgently at present.
Disclosure of Invention
The present specification provides a service execution method, device, storage medium and electronic device to at least partially solve the above problems in the prior art.
The technical scheme adopted by the specification is as follows:
the present specification provides a service execution method applied to a user's terminal, including:
when a service is executed, scanning a graphic code on a service guide machine tool to acquire service information carried in the graphic code;
sending the user information and the service information to a service server so that the service server performs one-time authentication on the user;
when a notification message of authentication failure is received, establishing near field communication connection with the service guide machine;
receiving authentication information sent by the service guide machine through the near field communication connection;
and sending the authentication information to the service server so that the service server performs secondary authentication on the user according to the authentication information and executes the service for the user when the secondary authentication is successful.
The present specification provides a service execution method applied to a service server, including:
receiving user information and service information sent by a terminal of a user when the terminal executes a service, wherein the service information is obtained by scanning a graphic code on a service guide machine by the terminal;
authenticating the user once according to at least one of the user information and the service information;
when the user fails in one authentication, a notification message of one authentication failure is sent to the terminal, so that the terminal and the service guiding machine establish close range communication connection;
receiving authentication information sent by the terminal, wherein the authentication information is sent to the terminal by the service guide machine through the near field communication connection;
performing secondary authentication on the user according to the authentication information;
and when the user is successfully authenticated for the second time, executing the service for the user.
Optionally, authenticating the user according to at least one of the user information and the service information, specifically including:
acquiring the number of users performing one-time authentication in a specified time period;
and when the number is larger than a specified threshold value, determining that the user fails to authenticate once.
Optionally, when the number is greater than a specified threshold, the method further includes:
and changing the graphic code from the valid state to the invalid state.
Optionally, the user information at least includes a location of the user;
the service information at least comprises the position of a service guide machine;
performing one-time authentication on the user according to at least one of the user information and the service information, specifically comprising:
determining the distance between the position of the user and the position of the service guide tool according to the position of the user and the position of the service guide tool;
when the distance is not greater than the designated distance, determining that the user is successfully authenticated once;
otherwise, determining that the user fails to authenticate once.
Optionally, the user information further comprises a user representation;
determining that the user successfully authenticates at one time, specifically comprising:
judging whether the position of the user is a false position or not according to the user portrait;
when the position of the user is not a false position, determining that the user is successfully authenticated once;
otherwise, determining that the user fails to authenticate once.
The present specification provides an apparatus for service execution, including:
the scanning module is used for scanning the graphic code on the service guide machine tool when the service is executed, and acquiring the service information carried in the graphic code;
the first sending module is used for sending the user information and the service information to a service server so that the service server can authenticate the user for one time;
the connection establishment module establishes near field communication connection with the service guide machine when receiving the notification message of authentication failure;
the receiving module is used for receiving authentication information sent by the service guide machine through the near field communication connection;
and the second sending module is used for sending the authentication information to the service server so that the service server performs secondary authentication on the user according to the authentication information and executes the service for the user when the secondary authentication is successful.
Another service execution apparatus provided in this specification, the apparatus includes:
the first receiving module is used for receiving user information and service information sent by a terminal of a user when the terminal executes a service, wherein the service information is obtained by scanning a graphic code on a service guide machine by the terminal;
the first authentication module is used for authenticating the user once according to at least one of the user information and the service information;
the sending module is used for sending a notification message of authentication failure to the terminal when the user fails to authenticate once so as to enable the terminal to establish close range communication connection with the service guiding machine;
the second receiving module is used for receiving authentication information sent by the terminal, wherein the authentication information is sent to the terminal by the service guide machine through the near field communication connection;
the second authentication module is used for carrying out secondary authentication on the user according to the authentication information;
and the execution module executes the service for the user when the user successfully authenticates the second time.
The present specification provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the above-described service execution method.
The present specification provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the service execution method when executing the program.
The technical scheme adopted by the specification can achieve the following beneficial effects:
in the service execution method provided in this specification, a user may scan a graphic code on a service guide machine using a terminal to obtain service information carried in the graphic code; the terminal can send the user information and the service information to the service server so that the service server can authenticate the user for one time; when the user fails to authenticate once, the user can make the terminal establish close range communication connection with the service guide machine, and sends the authentication information received from the service guide machine to the service server, so that the service server performs secondary authentication on the user according to the authentication information, and provides service for the user when the secondary authentication is successful. When the method in the specification is adopted to provide offline service, the offline service can be provided in a mode of enabling the terminal of the user on the site to establish close range communication connection with the service guiding machine, and the graphic code on the site can be effectively prevented from being uploaded to a network for scanning in a large amount.
Drawings
The accompanying drawings, which are included to provide a further understanding of the specification and are incorporated in and constitute a part of this specification, illustrate embodiments of the specification and together with the description serve to explain the specification and not to limit the specification in a non-limiting sense. In the drawings:
fig. 1 is a schematic flowchart of a service execution method applied to a terminal in this specification;
fig. 2 is a schematic diagram of a service execution method implemented in this specification;
fig. 3 is a schematic flow chart of a service execution method applied to a service server in the present specification;
fig. 4 is a schematic diagram of a service execution device provided in the present specification;
fig. 5 is a schematic diagram of a service execution apparatus provided in the present specification;
fig. 6 is a schematic diagram of an electronic device corresponding to fig. 1 provided in the present specification.
Detailed Description
At present, when a majority of service providers hold offline activities for stores, in order to ensure that users reach the stores to participate in the activities, the online services are provided for the users on the store site by setting a form of a two-dimensional code on the activity site, that is, the users can participate in the activities provided by merchants by scanning the two-dimensional code to obtain the offline services.
In practice, however, this method does not ensure that all users participating in the activity are offline users. Although the two-dimensional code is set in a store, the user himself can scan the two-dimensional code anywhere and participate in the event. As long as the two-dimensional code is shot and is spread out through the network, a large number of non-offline users can rush into the participation activity. When a service provider holds an offline event, it is generally desirable to obtain accurate statistical data to determine whether the event is successful, and obviously, the service provider cannot grasp real data due to the fact that the two-dimensional code is scanned online to participate in the event.
In order to solve the above problems, the present specification provides a more reasonable service execution method.
In order to make the objects, technical solutions and advantages of the present disclosure more clear, the technical solutions of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments obtained by a person skilled in the art based on the embodiments in the present specification without any inventive step are within the scope of the present application.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a service execution method applied to a terminal in this specification, which specifically includes the following steps:
s100: when the business is executed, the graphic code on the business guide machine tool is scanned, and the business information carried in the graphic code is obtained.
All the steps in the service execution method applied to the terminal provided by the present specification can be implemented by any terminal having a computing function.
To facilitate understanding of the methods provided herein, the present specification also provides a schematic diagram of the implementation of the offline service method, as shown in fig. 2, and the contents of the present specification can be better understood with reference to fig. 2.
Generally, when providing offline services for users, a graphic code is set in a field where the offline services are provided, and the users can scan the graphic code to obtain the offline services, wherein the graphic code may be a digital code, a two-dimensional code, a barcode, or the like.
The graphic code can be arranged at any position in the field, and is a business guide machine tool in the specification. The graphic code may contain service information, and when the user scans the graphic code on the service guide machine tool by using the terminal, the service information carried in the graphic code may be acquired. The service information is generally information that can identify an offline service, and includes, but is not limited to, information such as a location of a service guide machine, a business and a store to which the business belongs, and a corresponding offline service.
S102: and sending the user information and the service information to a service server so that the service server performs one-time authentication on the user.
And sending the acquired service information and the original user information in the terminal to a service server together, so that the service server performs one-time authentication on the user. The user information includes, but is not limited to, a user's location, a user portrait, and the like.
When the service server determines that the user successfully authenticates once, the service server can directly execute the service for the user.
S104: and when receiving a notification message of authentication failure, establishing close range communication connection with the service guide machine.
In step S102, when the service server fails to authenticate the user once, the service server sends a notification message of authentication failure to the terminal to notify the user of authentication failure. If the user still wants to acquire the offline service at this time, the available terminal establishes a short-distance communication connection with the service guide machine.
In practical application, the authentication judgment of the service server is not necessarily completely correct, and a judgment error condition may occur; moreover, there is a possibility that the user information in the terminal and the acquired service information are wrong, which may cause the judgment of the service server to be inconsistent with the actual judgment. At this point, the user may again attempt to acquire offline service by having the terminal establish a close-range communication connection with the service guide.
In addition, in order to prevent the graphic code from being transmitted to the network for embezzlement, when judging that the embezzlement risk exists, the service party can actively stop using the graphic code, and the off-line service acquisition mode is locked to be acquired only by establishing communication close-range communication connection between the terminal and the service guide machine.
The method for establishing the near field communication connection between the terminal and the service guide tool can be various, for example, the terminal can be moved to a designated area. Specifically, the terminal may be moved to a specified distance from the service guide tool, or a specified range centered on the service guide tool. At this time, the Near Field Communication connection established between the terminal and the service guide tool may be a bluetooth connection, a Near Field Communication (NFC) connection, or the like. The designated area, the designated distance and the designated range can be set and adjusted according to actual conditions.
S106: and receiving authentication information sent by the service guide machine through the near field communication connection.
After the terminal establishes the near field communication connection with the service guiding machine, the service guiding machine can send the authentication information to the terminal. The authentication information may be authentication information for identifying the service server, and the form of the authentication information may be various, including but not limited to a character string, an identifier, and the like, and the description is not limited specifically herein.
S108: and sending the authentication information to the service server so that the service server performs secondary authentication on the user according to the authentication information and executes the service for the user when the secondary authentication is successful.
The terminal sends the received authentication information to the service server, so that the service server performs secondary authentication on the user according to the authentication information, and provides an execution service for the user when the secondary authentication is successful.
In step S106, the authentication information sent by the service guidance tool and received by the terminal is sent by a short-distance connection method, such as bluetooth connection, NFC connection, and the like, which can ensure that the distance between the terminal of the user and the service guidance tool is short, i.e., ensure that the user is in the field of online leaving, so when the service server determines to receive the authentication information sent by the terminal, it can directly determine that the secondary authentication of the user is successful without any other verification and judgment, and provide offline service for the user using the terminal.
In addition, in order to ensure the security of the authentication information, the terminal may encrypt the received authentication information to obtain encrypted information, and send the encrypted information to the service server. After the service server end receives the encrypted information, a decryption method corresponding to the encryption method adopted by the terminal can be adopted for decryption, and decrypted authentication information is obtained.
When the service execution method provided by the specification is adopted to execute offline service, when the risk of stealing graphic codes exists, the graphic codes are stopped to be used, or the service server judges the error condition, the user can enable the terminal and the onsite service guiding machine to establish close range communication connection, and the authentication information sent by the service guiding machine obtained by the close range communication connection is sent to the service server, so that the service server performs secondary authentication for the user, and executes the service for the user. The method can ensure that the users acquiring the offline service are all offline users, and simultaneously ensure that the users judged by the service server by mistake can normally acquire the offline service, thereby not only avoiding the online users from pretending to be the offline users to execute the offline service, but also improving the experience of the users executing the offline service, and achieving two purposes at one stroke.
Fig. 3 is a schematic flow chart of a service execution method applied to a service server in this specification, which specifically includes the following steps:
s200: receiving user information and service information sent by a terminal of a user when the terminal executes a service, wherein the service information is obtained by scanning a graphic code on a service guide machine by the terminal.
All the steps of the service execution method applied to the service server provided by the specification can be realized by any server with a computing function.
In the process of executing the service for the user, the service server first receives user information and service information sent by a terminal of the user, wherein the service information is sent to the terminal by a service guide machine.
S202: and authenticating the user once according to at least one of the user information and the service information.
At this time, the server may authenticate the user once according to the user information and the service information. Generally, the authentication mode can be various, so the server can authenticate the user once according to at least one of the user information and the service information.
S204: and when the user fails in one authentication, sending a notification message of the failure of one authentication to the terminal so as to establish the close range communication connection between the terminal and the service guiding machine.
If it is determined in step S202 that the user has failed authentication once, a notification message indicating that the user has failed authentication once may be sent to the terminal of the user to notify that the user has failed authentication once and cannot execute the service. When the user still wishes to execute the service, the terminal may be caused to establish a close range communication connection with the service directing tool to attempt to execute the service again.
S206: and receiving authentication information sent by the terminal, wherein the authentication information is sent to the terminal by the service guide machine through the near field communication connection.
After the terminal of the user establishes the near field communication connection with the service guide machine, the service guide machine can send the authentication message to the user terminal, and the user can send the authentication message to the service server through the terminal.
S208: and performing secondary authentication on the user according to the authentication information.
No matter whether the user sends the user information and the service information to the service server before or not, or whether the service server informs that the user authentication fails before or not, when the authentication information sent by the terminal of the user is received, secondary authentication can be carried out on the user according to the authentication information.
S210: and when the user is successfully authenticated for the second time, executing the service for the user.
Because the authentication information is sent to the terminal by the service guide machine through the near field communication connection, the user can be ensured to be the user executing the service on line, so that other judgment can be not needed as long as the authentication information sent by the user terminal is received, the success of the secondary authentication of the user can be directly determined, and the service can be executed for the user.
In addition, corresponding to step S108 in the service execution method provided for the terminal in this specification, when the terminal transmits the encrypted information obtained by encrypting the authentication information to the service server, the service server may decrypt the encrypted information to obtain decrypted information, and when the decrypted information is the authentication information, it may be directly determined that the user has successfully authenticated, and a service is executed for the user. It should be noted that, the present specification does not limit the encryption method adopted by the terminal and the decryption method adopted by the service server, but it is necessary to ensure that the encryption method adopted by the terminal corresponds to the decryption method adopted by the service server.
There are a number of ways in which a service server authenticates a user, and some common embodiments are provided herein for reference.
In the case of the risk of on-line embezzlement, the service server may directly determine the user as a failure of authentication without distinction. Specifically, the number of users performing one authentication in a specified time period is obtained; and when the number is larger than a specified threshold value, determining that the user fails to authenticate once.
In practical application, the server may monitor the number of users who have performed authentication once in a specified time period in real time, where the specified time period may be set according to requirements, for example, a time period from a historical specified time to a current time, and when the number of users who have performed authentication once in the specified time period exceeds a specified threshold, the service server may consider that there are too many users currently requesting to execute a service, and a large number of on-line users may be flooded to scan graphic codes. At this time, the service server may directly assume that the current user is a user who scans the image code online, and determine that the authentication of the current user fails once. Wherein the specified threshold may be set based on the amount of traffic in the store history when offline traffic is provided.
Furthermore, when the number of users performing one-time authentication in a specified time period is too large and exceeds a specified threshold, the service server can also directly stop using the graphic code and lock the mode of applying for executing the service into the short-distance communication connection between the terminal and the service guide machine. Specifically, when the number is greater than a specified threshold, the graphic code may be directly changed from the valid state to the invalid state. In other words, in this case, the service server considers that the graphic code has been completely leaked into the network and is no longer trusted, and then all users who scan the graphic code, send the user information and the service information are determined as one authentication failure.
The failure state of the graphic code may mean that the user can still obtain the service information by scanning the graphic code through the terminal, and the user information and the service information are sent to the service server through the terminal, but the service server does not authenticate the user, but directly determines that the user authentication fails.
It should be noted that, when the number of users performing authentication once in a specified time period is too large, the service server may change the graphic code from the valid state to the invalid state even if the authentication of the user performing authentication once is successful.
In addition, the user can be authenticated according to the specific content in the user information or the service information. For example, the user may be authenticated based on the user's location. Specifically, the user information at least includes a location of the user; the service information at least comprises the position of a service guide machine; determining the distance between the position of the user and the position of the service guide tool according to the position of the user and the position of the service guide tool; when the distance is not greater than the designated distance, determining that the user is successfully authenticated once; otherwise, determining that the user fails to authenticate once.
If the position of the user scanning the graphic code is too far away from the position of the service guide tool, the user is not considered as a user performing the service offline, but obtains the offline service through scanning the graphic code online, and for the user, the service server can determine that the authentication of the user fails once. Wherein, the designated distance can be set according to specific situations.
In addition, because the position of the user can be forged by technologies such as virtual positioning, and the like, on the basis of authenticating the user according to the position of the user, a layer of judgment can be additionally added, namely, the user is further authenticated according to the information of the user. Specifically, the user information further includes a user representation; judging whether the position of the user is a false position or not according to the user portrait; when the position of the user is not a false position, determining that the user is successfully authenticated once; otherwise, determining that the user fails to authenticate once.
The user representation may include at least static information such as user gender, age, work, etc., and behavior information such as user historical consumption record, repayment record, etc. According to the user portrait in the user information, whether the user has a high enough reputation, that is, whether the user is credible can be judged. The better the past behavior of the user is, the higher the reputation of the user is, and the more credible the user is; conversely, the worse the past behavior on behalf of the user, the lower the reputation of the user will be, and the less trustworthy the user will be. At this time, the confidence level can be set according to specific requirements, the reputation of the user is compared with the confidence level, when the reputation of the user is higher than the confidence level, the position of the user can be considered as a real position, and the user is determined to be successfully authenticated once; and when the credit of the user is lower than the confidence, the position of the user can be considered as a false position, and the user is determined to fail in one-time authentication, so that the service cannot be executed in a mode of scanning the pattern code.
The above is the service execution method provided by the present specification, and based on the same idea, the present specification further provides a corresponding service execution device, as shown in fig. 4 and fig. 5.
Fig. 4 is a schematic diagram of a service execution device provided in this specification, which specifically includes:
the scanning module 300 is used for scanning the graphic code on the service guide machine and acquiring the service information carried in the graphic code when the service is executed;
a first sending module 302, configured to send user information and the service information to a service server, so that the service server performs a primary authentication on a user;
a connection establishing module 304, which establishes a short-distance communication connection with the service guiding machine when receiving the notification message of authentication failure;
a receiving module 306, configured to receive authentication information sent by the service guidance tool through the near field communication connection;
and the second sending module 308 is configured to send the authentication information to the service server, so that the service server performs secondary authentication on the user according to the authentication information, and executes the service for the user when the secondary authentication is successful.
Fig. 5 is a schematic diagram of another service execution apparatus provided in this specification, which specifically includes:
a first receiving module 400, configured to receive user information and service information sent by a terminal of a user when executing a service, where the service information is obtained by scanning a graphic code on a service guidance machine by the terminal;
a first authentication module 402, configured to authenticate the user once according to at least one of the user information and the service information;
a sending module 404, configured to send a notification message of the authentication failure to the terminal when the user fails to authenticate once, so that the terminal establishes a short-distance communication connection with the service guidance tool;
a second receiving module 406, configured to receive authentication information sent by the terminal, where the authentication information is sent to the terminal by the service guidance apparatus through the near field communication connection;
the second authentication module 408 performs secondary authentication on the user according to the authentication information;
and the execution module 410 executes the service for the user when the user succeeds in the secondary authentication.
In one specific embodiment:
the first authentication module 402 is specifically configured to obtain the number of users performing authentication once in a specified time period; and when the number is larger than a specified threshold value, determining that the user fails to authenticate once.
In one specific embodiment:
the first authentication module 402 is further configured to change the graphic code from a valid state to a disabled state.
In one specific embodiment:
the user information at least comprises the position of a user;
the service information at least comprises the position of a service guide machine;
the first authentication module 402 is specifically configured to determine a distance between the location of the user and the location of the service guide tool according to the location of the user and the location of the service guide tool; when the distance is not more than the specified distance, determining that the user is successfully authenticated once; otherwise, determining that the user fails to authenticate once.
In one specific embodiment:
the user information further comprises a user representation;
the first authentication module 402, determining whether the location of the user is a false location according to the user representation; when the position of the user is not a false position, determining that the user is successfully authenticated once; otherwise, determining that the user fails to authenticate once.
The present specification also provides a computer-readable storage medium storing a computer program, which can be used to execute the service execution method provided in fig. 1.
This specification also provides a schematic block diagram of the electronic device shown in fig. 6. As shown in fig. 6, at the hardware level, the electronic device includes a processor, an internal bus, a network interface, a memory, and a non-volatile memory, but may also include hardware required for other services. The processor reads a corresponding computer program from the non-volatile memory into the memory and then runs the computer program to implement the service execution method described in fig. 1. Of course, besides the software implementation, the present specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may be hardware or logic devices.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD) (e.g., a Field Programmable Gate Array (FPGA)) is an integrated circuit whose Logic functions are determined by a user programming the Device. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually manufacturing an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as ABEL (Advanced Boolean Expression Language), AHDL (alternate Hardware Description Language), traffic, CUPL (core universal Programming Language), HDCal, jhddl (Java Hardware Description Language), lava, lola, HDL, PALASM, rhyd (Hardware Description Language), and vhigh-Language (Hardware Description Language), which is currently used in most popular applications. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the various elements may be implemented in the same one or more software and/or hardware implementations of the present description.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the system embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and reference may be made to the partial description of the method embodiment for relevant points.
The above description is only an example of the present specification, and is not intended to limit the present specification. Various modifications and alterations to this description will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present specification should be included in the scope of the claims of the present application.

Claims (10)

1. A service execution method, applied to a user terminal, the method comprising:
when a service is executed, scanning a graphic code on a service guide machine tool to acquire service information carried in the graphic code;
sending the user information and the service information to a service server so that the service server performs one-time authentication on the user;
when receiving a notification message of authentication failure, establishing close range communication connection with the service guide machine;
receiving authentication information sent by the service guide machine through the near field communication connection;
and sending the authentication information to the service server so that the service server performs secondary authentication on the user according to the authentication information and executes the service for the user when the secondary authentication is successful.
2. A service execution method is applied to a service server, and the method comprises the following steps:
receiving user information and service information sent by a terminal of a user when the terminal executes a service, wherein the service information is obtained by scanning a graphic code on a service guide machine by the terminal;
authenticating the user once according to at least one of the user information and the service information;
when the user fails in one authentication, a notification message of one authentication failure is sent to the terminal, so that the terminal and the service guiding machine establish close range communication connection;
receiving authentication information sent by the terminal, wherein the authentication information is sent to the terminal by the service guide machine through the near field communication connection;
performing secondary authentication on the user according to the authentication information;
and when the user is successfully authenticated for the second time, executing the service for the user.
3. The method according to claim 2, wherein authenticating the user once according to at least one of the user information and the service information specifically includes:
acquiring the number of users performing one-time authentication in a specified time period;
and when the number is larger than a specified threshold value, determining that the user fails to authenticate once.
4. The method of claim 3, wherein when the number is greater than a specified threshold, the method further comprises:
and changing the graphic code from the valid state to the invalid state.
5. The method of claim 2, wherein the user information includes at least a location of a user;
the service information at least comprises the position of a service guide machine;
performing one-time authentication on the user according to at least one of the user information and the service information, specifically comprising:
determining the distance between the position of the user and the position of the service guide tool according to the position of the user and the position of the service guide tool;
when the distance is not more than the specified distance, determining that the user is successfully authenticated once;
otherwise, determining that the user fails to authenticate once.
6. The method of claim 5, wherein the user information further comprises a user representation;
determining that the user successfully authenticates at one time, specifically comprising:
judging whether the position of the user is a false position or not according to the user portrait;
when the position of the user is not a false position, determining that the user is successfully authenticated once;
otherwise, determining that the user fails to authenticate once.
7. A service execution apparatus, comprising:
the scanning module is used for scanning the graphic code on the service guide machine tool when the service is executed, and acquiring the service information carried in the graphic code;
the first sending module is used for sending the user information and the service information to a service server so that the service server can authenticate the user for one time;
the connection establishment module establishes near field communication connection with the service guide machine when receiving the notification message of authentication failure;
the receiving module is used for receiving authentication information sent by the service guide machine through the near field communication connection;
and the second sending module is used for sending the authentication information to the service server so that the service server performs secondary authentication on the user according to the authentication information and executes the service for the user when the secondary authentication is successful.
8. A service execution apparatus, comprising:
the first receiving module is used for receiving user information and service information sent by a terminal of a user when the terminal executes a service, wherein the service information is obtained by scanning a graphic code on a service guide machine by the terminal;
the first authentication module is used for authenticating the user once according to at least one of the user information and the service information;
the sending module is used for sending a notification message of authentication failure to the terminal when the user fails to authenticate once so as to enable the terminal to establish close range communication connection with the service guiding machine;
the second receiving module is used for receiving authentication information sent by the terminal, wherein the authentication information is sent to the terminal by the service guide machine through the near field communication connection;
the second authentication module is used for carrying out secondary authentication on the user according to the authentication information;
and the execution module executes the service for the user when the user succeeds in secondary authentication.
9. A computer-readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the method of any of the preceding claims 1 to 6.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 6 when executing the program.
CN202210836170.8A 2022-07-15 2022-07-15 Service execution method, device, storage medium and electronic equipment Pending CN115243230A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210836170.8A CN115243230A (en) 2022-07-15 2022-07-15 Service execution method, device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210836170.8A CN115243230A (en) 2022-07-15 2022-07-15 Service execution method, device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN115243230A true CN115243230A (en) 2022-10-25

Family

ID=83673514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210836170.8A Pending CN115243230A (en) 2022-07-15 2022-07-15 Service execution method, device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN115243230A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581630A (en) * 2014-12-31 2015-04-29 浙江融创信息产业有限公司 Self-service anti-cheating sign-in method based on position service and two-dimensional code technology
CN108197514A (en) * 2017-12-19 2018-06-22 阿里巴巴集团控股有限公司 A kind of carrier article, service information acquisition method, device and equipment
CN108509818A (en) * 2018-03-23 2018-09-07 西安艾润物联网技术服务有限责任公司 Quick Response Code barcode scanning method, apparatus and computer readable storage medium
CN112598440A (en) * 2020-12-18 2021-04-02 深圳市思为软件技术有限公司 Activity management method and related device
CN113065622A (en) * 2021-03-26 2021-07-02 中国工商银行股份有限公司 Business handling method, terminal and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581630A (en) * 2014-12-31 2015-04-29 浙江融创信息产业有限公司 Self-service anti-cheating sign-in method based on position service and two-dimensional code technology
CN108197514A (en) * 2017-12-19 2018-06-22 阿里巴巴集团控股有限公司 A kind of carrier article, service information acquisition method, device and equipment
CN108509818A (en) * 2018-03-23 2018-09-07 西安艾润物联网技术服务有限责任公司 Quick Response Code barcode scanning method, apparatus and computer readable storage medium
CN112598440A (en) * 2020-12-18 2021-04-02 深圳市思为软件技术有限公司 Activity management method and related device
CN113065622A (en) * 2021-03-26 2021-07-02 中国工商银行股份有限公司 Business handling method, terminal and server

Similar Documents

Publication Publication Date Title
CN110463161B (en) Password state machine for accessing protected resources
JP7241814B2 (en) Authentication and authorization method and authentication server
CN108990059B (en) Verification method and device
CN113641983B (en) Account binding method, device and system of application program
CN109815684B (en) Identity authentication method, system, server and storage medium
KR102372571B1 (en) Mobile payment methods, devices and systems
CN115396114A (en) Authorization method, device, equipment and system based on verifiable statement
CN104620250A (en) Systems and methods of using a temporary private key between two devices
US10032044B2 (en) Multi-party authentication and authorization
WO2021143547A1 (en) Session establishing method and cross-border payment method, apparatus, and system
CN112287376B (en) Method and device for processing privacy data
CN113590930A (en) System and method for data access control using short-range transceivers
CN115001817B (en) Off-line identity recognition method, device and equipment
KR101600455B1 (en) Method, system and recording medium for service account authentication
CN113807856B (en) Resource transfer method, device and equipment
CN117375986A (en) Application access method, device and server
CN110457959B (en) Information transmission method and device based on Trust application
CN113572827B (en) Registration processing method and device
CN115243230A (en) Service execution method, device, storage medium and electronic equipment
CN110166452B (en) Access control method and system based on JavaCard shared interface
US20220108014A1 (en) Group attestations
US20230198981A1 (en) Systems and methods for credentials sharing
CN117579674B (en) Remote control system and method
CN118364445A (en) Method and device for three-party nuclear body, storage medium and electronic equipment
CN114239023A (en) Display method, device and equipment for mobile terminal operation data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination