CN115392903A - 5G message payment authentication method, terminal, platform, system, medium and product - Google Patents

5G message payment authentication method, terminal, platform, system, medium and product Download PDF

Info

Publication number
CN115392903A
CN115392903A CN202210945561.3A CN202210945561A CN115392903A CN 115392903 A CN115392903 A CN 115392903A CN 202210945561 A CN202210945561 A CN 202210945561A CN 115392903 A CN115392903 A CN 115392903A
Authority
CN
China
Prior art keywords
authentication
user
identification code
target identification
terminal information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210945561.3A
Other languages
Chinese (zh)
Inventor
姜铁城
侯腾
杨阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN202210945561.3A priority Critical patent/CN115392903A/en
Publication of CN115392903A publication Critical patent/CN115392903A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/346Cards serving only as information carrier of service
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application provides a 5G message payment authentication method, a terminal, a platform, a system, a medium and a product, wherein the method comprises the following steps: sending an application request related to 5G message payment to a payment platform based on the 5G message; under the condition that an identity authentication request fed back by a payment platform in response to an application request is received, acquiring a target identification code input by a user, and authenticating the target identification code; and under the condition that the target identification code authentication is successful, sending a result of successful target identification code authentication to the payment platform so that the payment platform responds to the result of successful target identification code authentication to process the application request. The embodiment of the application can improve the safety of 5G message payment.

Description

5G message payment authentication method, terminal, platform, system, medium and product
Technical Field
The application belongs to the technical field of payment security, and particularly relates to a 5G message payment authentication method, a terminal, a platform, a system, a medium and a product.
Background
With the development of 5G technology, wireless communication has also met with a new technological revolution, and the traditional short message service has met with a new revolution opportunity. The converged Communication (RCS) is a new generation of international standard for message service and is based on the re-architecture and implementation of the bottom layer short message application of a user terminal, so that the application different from the prior pure text short message is realized, and a plurality of Rich media messages such as pictures, texts, audios and videos, group chat, file transmission, content sharing in conversation and the like can be realized in a message window to form one-stop service experience, such as search, interaction, sharing, payment and the like.
The 5G message payment is a novel payment mode which can provide multimedia and richer interactive capability by taking a short message application as an interactive basis. However, 5G message payment also has the problems of payment security and/or information leakage while providing users with a lightweight and convenient use experience.
Disclosure of Invention
The embodiment of the application provides a 5G message payment authentication method, a terminal, a platform, a system, a medium and a product, which can solve the problems of payment safety and/or information leakage and the like in 5G message payment.
In a first aspect, an embodiment of the present application provides a method for authenticating 5G message payment, which is applied to a user terminal, and the method includes: sending an application request related to 5G message payment to a payment platform based on the 5G message; under the condition that an identity authentication request fed back by a payment platform in response to an application request is received, acquiring a target identification code input by a user, and authenticating the target identification code; and under the condition that the target identification code authentication is successful, sending a result of successful target identification code authentication to the payment platform so that the payment platform responds to the result of successful target identification code authentication to process the application request.
In a second aspect, an embodiment of the present application provides a 5G message payment authentication method, which is applied to an authentication service platform, and the method includes: receiving terminal information of a user terminal sent by the user terminal; authenticating the terminal information to generate an authentication result of the terminal information; feeding back the authentication result of the terminal information to the user terminal; the user terminal is used for sending a result of successful terminal information authentication to the payment platform under the condition that the terminal information authentication is successful; under the condition that terminal information authentication fails, acquiring a target identification code input by a user, authenticating the target identification code, and sending a result of successful target identification code authentication to a payment platform when the target identification code authentication is successful; and the payment platform is used for responding to the result of successful terminal information authentication or the result of successful target identification code authentication to process the application request related to the 5G message payment.
In a third aspect, an embodiment of the present application provides a 5G message payment authentication method, which is applied to a payment platform, and the method includes: receiving an application request which is sent by a user terminal and is related to 5G message payment; responding to the application request, and sending an identity authentication request to the user terminal, wherein the identity authentication request is used for indicating that the target identification code input by the user is authenticated; and processing the application request under the condition of receiving a result of successful target identification code authentication sent by the user terminal.
In a fourth aspect, an embodiment of the present application provides a user terminal, where the user terminal includes: the first sending module is used for sending an application request related to 5G message payment to the payment platform based on the 5G message; the first authentication module is used for acquiring a target identification code input by a user and authenticating the target identification code under the condition of receiving an identity authentication request fed back by the payment platform in response to the application request; the first sending module is further used for sending a result of successful target identification code authentication to the payment platform under the condition that the target identification code authentication is successful, so that the payment platform responds to the result of successful target identification code authentication to process the application request.
In a fifth aspect, an embodiment of the present application provides an authentication service platform, where the authentication service platform includes: the first receiving module is used for receiving terminal information of the user terminal sent by the user terminal; the second authentication module is used for authenticating the terminal information and generating an authentication result of the terminal information; the second sending module is used for feeding back the authentication result of the terminal information to the user terminal; the user terminal is used for sending a result of successful terminal information authentication to the payment platform under the condition that the terminal information authentication is successful; under the condition that terminal information authentication fails, acquiring a target identification code input by a user, authenticating the target identification code, and sending a result of successful target identification code authentication to the payment platform when the target identification code authentication is successful; and the payment platform is used for responding to the result of successful terminal information authentication or the result of successful target identification code authentication to process the application request related to the 5G message payment.
In a sixth aspect, an embodiment of the present application provides a payment platform, where the payment platform includes: the second receiving module is used for receiving an application request which is sent by the user terminal and is related to 5G message payment; the third sending module is used for responding to the application request and sending an identity authentication request to the user terminal, wherein the identity authentication request is used for indicating that the target identification code input by the user is authenticated; and the processing module is used for processing the application request under the condition of receiving the result of successful target identification code authentication sent by the user terminal.
In a seventh aspect, an embodiment of the present application provides a user terminal, where the user terminal includes: a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements a 5G message payment authentication method as provided by the first aspect.
In an eighth aspect, an embodiment of the present application provides an authentication service platform, where the authentication service platform includes: a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements a 5G message payment authentication method as provided by the second aspect.
In a ninth aspect, an embodiment of the present application provides a payment platform, where the payment platform includes: a processor and a memory storing computer program instructions; the processor, when executing the computer program instructions, implements the 5G message payment authentication method as provided by the third aspect.
In a tenth aspect, an embodiment of the present application provides a 5G message payment authentication system, which is characterized by including the user terminal as provided in the seventh aspect, the authentication service platform as provided in the eighth aspect, and the payment platform as provided in the ninth aspect.
In an eleventh aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium has stored thereon computer program instructions, and when executed by a processor, the computer program instructions implement the 5G message payment authentication method according to any one of the first, second, or third aspects.
In a twelfth aspect, embodiments of the present application provide a computer program product, where the computer program product is stored in a non-volatile storage medium, and the computer program product when executed by at least one processor implements the 5G message payment authentication method according to any one of the first, second, or third aspects.
The 5G message payment authentication method, the terminal, the platform, the system, the medium and the product of the embodiment of the application comprise the following steps: sending an application request related to 5G message payment to a payment platform based on the 5G message; under the condition that an identity authentication request fed back by a payment platform in response to an application request is received, acquiring a target identification code input by a user, and authenticating the target identification code; and under the condition that the target identification code authentication is successful, sending a result of successful target identification code authentication to the payment platform so that the payment platform responds to the result of successful target identification code authentication to process the application request. Because only the actual owner of the user terminal and/or the SIM card used by the user terminal generally knows the correct target identification code, when the 5G message is paid, the target identification code input by the user is authenticated, and only under the condition that the target identification code is successfully authenticated, the application request related to the 5G message payment is processed, so that the 5G message payment by an illegal user through the user terminal of other people can be effectively avoided, and the safety of the 5G message payment is ensured. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing the target identification code authentication.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings may be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an application scenario of a 5G message payment authentication method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an embodiment of a payment authentication method for a 5G message provided in the first aspect of the present application;
fig. 3 is a schematic flowchart of another embodiment of a payment authentication method for 5G messages provided in the first aspect of the present application;
fig. 4 is a schematic flowchart of an embodiment of S310 in the method for authenticating payment by using a 5G message provided in the first aspect of the present application;
fig. 5 is a schematic flowchart of a payment authentication method for a 5G message provided in the first aspect of the present application according to yet another embodiment;
fig. 6 is a schematic flowchart of an embodiment of S510 in the method for authenticating payment by using 5G messages according to the first aspect of the present application;
fig. 7 is a schematic flowchart of an embodiment of S220 in the method for authenticating payment by using a 5G message provided in the first aspect of the present application;
fig. 8 is a schematic communication interaction diagram of an embodiment of a method for authenticating payment by using a 5G message provided in the first aspect of the present application;
fig. 9 is a schematic communication interaction diagram of another embodiment of a method for authenticating payment through a 5G message provided in the first aspect of the present application;
fig. 10 is a schematic flowchart of an embodiment of S310 in the method for authenticating payment by using a 5G message provided in the first aspect of the present application;
fig. 11 is a schematic communication interaction diagram of a payment authentication method for 5G messages according to yet another embodiment of the present application;
fig. 12 is a schematic flowchart of an embodiment of a payment authentication method for 5G messages according to a second aspect of the present application;
fig. 13 is a schematic flowchart of another embodiment of a payment authentication method for 5G messages according to the second aspect of the present application;
fig. 14 is a schematic flowchart of a payment authentication method for 5G messages according to a second aspect of the present application;
fig. 15 is a schematic flowchart of a payment authentication method using 5G messages according to a second aspect of the present application;
fig. 16 is a schematic flowchart of an embodiment of a payment authentication method for 5G messages according to a third aspect of the present application;
fig. 17 is a schematic flowchart of another embodiment of a payment authentication method for 5G messages according to a third aspect of the present application;
fig. 18 is a schematic communication interaction diagram of an embodiment of a method for authenticating payment by using a 5G message provided in the fourth aspect of the present application;
fig. 19 is a schematic communication interaction diagram of another embodiment of a payment authentication method for 5G messages according to a fourth aspect of the present application;
fig. 20 is a schematic communication interaction diagram of a payment authentication method using 5G messages according to a further embodiment of the present application;
fig. 21 is a schematic communication interaction diagram of a payment authentication method for 5G messages according to a further embodiment of the fourth aspect of the present application;
fig. 22 is a schematic structural diagram of an embodiment of a user terminal according to the present application;
FIG. 23 is a block diagram of an authentication service platform according to an embodiment of the present application;
FIG. 24 is a schematic structural diagram of an embodiment of a payment platform according to the present application;
fig. 25 is a schematic structural diagram of an embodiment of a user terminal according to an eighth aspect of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising 8230; \8230;" comprises 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
It should be understood that the term "and/or" as used herein is merely a relationship that describes an associated object, meaning that three relationships may exist, e.g., a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application cover the modifications and variations of this application provided they come within the scope of the corresponding claims (the claimed technology) and their equivalents. It should be noted that the embodiments provided in the embodiments of the present application can be combined with each other without contradiction.
Before explaining the technical solutions provided in the embodiments of the present application, in order to facilitate understanding of the embodiments of the present application, the present application first specifically describes the problems existing in the related art:
through research by the inventor of the application, it is found that in the related art, at present, 5G message payment has no specific authentication scheme, for example, even if a user is verified, the corresponding application account is verified only when the user jumps to the related 5G payment application. This leads to at least the following problems:
(1) The payment safety risk exists, because the 5G message payment is generally based on short message application, an object sending the payment request is only bound with the SIM card, and whether the payment request is initiated by the SIM card user or initiated by an illegal user cannot be known;
(2) Based on the current scheme without user authentication, once the user terminal and/or the SIM card is lost, an illegal user can acquire the privacy information of the card owner without account verification, so that the privacy of the user terminal and/or the owner of the SIM card used by the user terminal is leaked.
In view of the above research findings of the inventors, embodiments of the present application provide a method, a terminal, a platform, a system, a medium, and a product for authenticating 5G message payment, which can solve the technical problems of payment security and/or information leakage in 5G message payment in the related art.
For ease of understanding, the following description will first be made of a structure to which the embodiments of the present application are applied.
Fig. 1 is a schematic structural diagram of an application scenario of a 5G message payment authentication method according to an embodiment of the present application. As shown in fig. 1, an architecture system of a 5G message payment authentication method provided in the embodiment of the present application may include a user terminal 11, a payment platform 12, and an authentication service platform 13. The user terminal 11 may specifically include a mobile phone, a tablet computer, a smart wearable device, and the like, and the specific type of the user terminal 11 is not limited herein. The 5G message application is installed in the user terminal 11, and the 5G message application can transmit a 5G message. The user may send an application request related to 5G message payment to the payment platform 12 through the 5G message application in the user terminal 11. Taking bank credit card repayment as an example, the application request related to 5G message payment may include a request for obtaining a monthly repayment bill, a request for inquiring the current credit card balance, or a request for inquiring the current repayment record, etc. Of course, the application request related to the 5G message payment may also be another request related to payment, which is not limited in this embodiment of the application.
The payment platform 12 may be, for example, a 5G messaging application backend, such as a respective bank backend, for processing application requests related to 5G messaging payments sent by a 5G messaging application (front-end). For example, the payment platform 12 may specifically include a plurality of electronic devices such as servers, and the type and number of electronic devices in the payment platform 12 are not limited herein.
The authentication service platform 13 may be in communication interaction with the user terminal 11, and in some examples, the authentication service platform 13 may be configured to complete 5G message payment authentication with the user terminal 11. For example, the authentication service platform 13 may specifically include a plurality of electronic devices such as servers, and the type and number of the electronic devices in the authentication service platform 13 are not limited herein.
Based on the architecture provided by the embodiment of the present application shown in fig. 1, the following describes in detail the payment authentication method for 5G messages provided by the embodiment of the present application.
The first aspect of the present application provides a 5G message payment authentication method, which may be applied to a user terminal, that is, the 5G message payment authentication method may be executed by the user terminal. For specific contents of the user terminal, reference may be made to the relevant description in the above embodiments, and details are not described herein again.
Fig. 2 is a schematic flowchart of an embodiment of a payment authentication method for a 5G message provided in the first aspect of the present application. As shown in fig. 2, the 5G message payment authentication method may include steps S210 to S230.
And S210, sending an application request related to 5G message payment to the payment platform based on the 5G message.
For example, when the user needs to pay for the 5G message, the user terminal may input an operation related to the 5G message payment, such as inputting an application request related to the 5G message payment. The user terminal can send an application request related to 5G message payment to the payment platform through the 5G message application installed by the user terminal. Taking bank credit card repayment as an example, the application request related to 5G message payment may include a request for obtaining a monthly repayment bill, a request for inquiring the current credit card balance, or a request for inquiring the current repayment record, etc. Of course, the application request related to the 5G message payment may also be another request related to payment, which is not limited in this embodiment of the present application.
S220, under the condition that an identity authentication request fed back by the payment platform in response to the application request is received, acquiring a target identification code input by a user, and authenticating the target identification code.
When the payment platform receives an application request related to 5G message payment, the payment platform feeds an identity authentication request back to the user terminal, wherein the identity authentication request can be used for indicating the user terminal to authenticate the identity of the user, and specifically can authenticate a target identification code input by the user.
In S220, the user terminal may obtain the target identification code input by the user and authenticate the target identification code when receiving the identity authentication request sent by the payment platform. For example, the user terminal may display an interface for asking the user to input the target identification code, so that the user can input the target identification code. After the user inputs the target identification code, the target identification code input by the user may be authenticated. In some embodiments, the target Identification code includes, but is not limited to, a Personal Identification Number (PIN) of a SIM card (Subscriber Identity Module), and may also be, for example, an Identification code that is notified to the user (i.e., the user terminal and/or an owner of the SIM card used by the user terminal) or set by the user in advance, which is not limited in this embodiment of the present application.
And S230, under the condition that the target identification code authentication is successful, sending a result of successful target identification code authentication to the payment platform, so that the payment platform responds to the result of successful target identification code authentication and processes the application request.
In S230, in the case that the target identity authentication is successful, the user terminal sends a result that the target identity authentication is successful to the payment platform, so as to inform that the payment platform can process the application request related to the 5G message payment.
The 5G message payment authentication method of the embodiment of the application sends an application request related to 5G message payment to a payment platform based on a 5G message; under the condition that an identity authentication request fed back by a payment platform in response to an application request is received, acquiring a target identification code input by a user, and authenticating the target identification code; and under the condition that the target identification code authentication is successful, sending a result of successful target identification code authentication to the payment platform so that the payment platform responds to the result of successful target identification code authentication to process the application request. Because only the actual owner of the user terminal and/or the SIM card used by the user terminal generally knows the correct target identification code, when the 5G message is paid, the target identification code input by the user is authenticated, and only under the condition that the target identification code is successfully authenticated, the application request related to the 5G message payment is processed, so that the 5G message payment by an illegal user through the user terminal of other people can be effectively avoided, and the safety of the 5G message payment is ensured. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing the target identification code authentication.
The 5G message payment authentication method provided by the embodiment of the application can be suitable for various authentication scenes, a docking application manufacturer can authenticate a user by calling a corresponding authentication interface, and enterprise drainage can be achieved.
The inventors of the present application further consider: for the 5G message payment scenario, each time the user sends a 5G message in the 5G message application, the identity of the 5G message payment initiator should be authenticated, which may increase the complexity of the user for using the 5G message payment and affect the user experience. Therefore, in order to improve the user experience, the embodiment of the application considers that the number of times of the user manually inputting the target identification code authentication can be reduced, so that the user is provided with the experience of the payment authentication of the approximately-imperceptible 5G message.
Fig. 3 is a flowchart illustrating another embodiment of a method for authenticating payment by using a 5G message provided in the first aspect of the present application. As shown in fig. 3, according to some embodiments of the present application, optionally before S220, the 5G message payment authentication method may further include the following steps S310 to S340.
S310, sending the terminal information of the user terminal to an authentication service platform, wherein the authentication service platform is used for authenticating the terminal information.
In S310, the user terminal may transmit terminal information of the user terminal to the authentication service platform. The authentication service platform can authenticate the terminal information of the user terminal. For example, the authentication service platform may compare the terminal information of the user terminal sent by the user terminal with the stored terminal information of the user terminal to verify whether the terminal information of the user terminal sent by the user terminal is consistent with the stored terminal information of the user terminal.
Illustratively, the terminal information of the user terminal may include necessary information and optional information for verifying the identity of the user terminal. The essential information may be one or a combination of a series of information that uniquely identifies the user terminal without frequent changes, such as but not limited to the model number of the user terminal, the manufacturer of the user terminal, the system version or mac address of the user terminal, etc. The optional information may be some auxiliary information, for example, the optional information includes, but is not limited to, a geographical location or an IP address of the user terminal, etc.
And S320, receiving the authentication result of the terminal information fed back by the authentication service platform.
S330, under the condition that the terminal information authentication is successful, sending a result of the terminal information authentication to the payment platform so that the payment platform responds to the result of the terminal information authentication and processes the application request.
Under the condition that the terminal information of the user terminal is successfully authenticated, the user terminal can send a result that the terminal information is successfully authenticated to the payment platform. And the payment platform can process the application request related to the 5G message payment after receiving the result of successful terminal information authentication.
S340, under the condition that the terminal information authentication fails, the steps of acquiring the target identification code input by the user and authenticating the target identification code are executed.
In case that the terminal information authentication of the user terminal fails, the user terminal may perform the above-described steps S220 to S230. For brevity, the detailed processes of steps S220 to S230 are not described herein.
Therefore, the terminal information of the user terminal is uploaded to the authentication service platform for authentication, and if the terminal information of the user terminal changes, the target identification code input by the user is authenticated; if the terminal information of the user terminal is not changed, the application request related to 5G message payment can be directly processed, the user is prevented from inputting the target identification code repeatedly, namely, the target identification code is prevented from being called repeatedly for authentication, the times of manually inputting the target identification code by the user for authentication are reduced, and the authentication experience of approximate non-inductive 5G message payment is provided for the user.
Fig. 4 is a flowchart illustrating an embodiment of S310 in the method for authenticating 5G message payment provided in the first aspect of the present application. As shown in fig. 4, according to some embodiments of the present application, optionally, S310, sending the terminal information of the user terminal to the authentication service platform may specifically include the following steps S410 and S420.
S410, encrypting the terminal information of the user terminal to generate a target user authentication label.
In S410, before the user terminal sends the terminal information of the user terminal to the authentication service platform, the terminal information of the user terminal may be encrypted to generate a target user authentication tag (token). In some examples, the user terminal may encrypt the terminal information of the user terminal through a symmetric encryption algorithm, for example, to generate the target user authentication tag. In other examples, for example, the user terminal may also encrypt the terminal information of the user terminal through an asymmetric encryption algorithm to generate the target user authentication tag, which is not limited in this embodiment of the present application. The symmetric encryption algorithm uses the same key for encryption and decryption, and the asymmetric encryption algorithm uses two keys, for example, a public key for encryption and a private key for decryption.
And S420, sending the target user authentication label to the authentication service platform.
The authentication service platform is used for comparing terminal information in the target user authentication tag with terminal information in the first user authentication tag and generating an authentication result of the terminal information in the target user authentication tag. The first user authentication tag may be the same user authentication tag as the user and/or SIM card corresponding to the target user authentication tag.
For example, the target user authentication tag carries the identity information of the user and/or the identity information of the SIM card. The authentication service platform can query a user authentication tag which is the same as the user identity information and/or the SIM card identity information carried in the target user authentication tag from the database according to the user identity information and/or the SIM card identity information carried in the target user authentication tag to obtain a first user authentication tag. Then, the terminal information in the target user authentication tag is compared with the terminal information in the first user authentication tag, and an authentication result of the terminal information in the target user authentication tag is generated.
After receiving the authentication result of the terminal information in the target user authentication tag sent by the authentication service platform, the user terminal performs the above step S330 or S340. For brevity, the specific process of step S330 or S340 is not described herein again.
Therefore, the terminal information of the user terminal is encrypted, so that the safety of information transmission can be ensured, and the safety of 5G message payment is further improved.
According to some embodiments of the present application, optionally, the user may be required to input the target identification code and authenticate the target identification code input by the user when the user performs the target identification code authentication for the first time, that is, when the user does not perform the target identification code authentication before. And after the target identification code input by the user is successfully authenticated, when the user initiates the application request of 5G message payment again, the terminal information or the target user authentication tag of the user terminal is authenticated, and if the terminal information or the target user authentication tag of the user terminal changes, the target identification code input by the user is authenticated, so that the times of manually inputting the target identification code by the user for authentication are reduced, and the user experience is improved.
Fig. 5 is a schematic flowchart of a payment authentication method using a 5G message according to a further embodiment of the first aspect of the present application. Specifically, as shown in fig. 5, before sending the terminal information of the user terminal to the authentication service platform S310, the 5G message payment authentication method may further include the following step S510.
S510, judging whether the user performs target identification code authentication for the first time.
In S510, the user terminal determines whether the user performs the target identifier authentication for the first time, that is, whether the user has already been authenticated by the target identifier before and the target identifier authentication is successful.
Correspondingly, S310, sending the terminal information of the user terminal to the authentication service platform may specifically include the following steps: and under the condition that the user does not authenticate the target identification code for the first time, sending the terminal information of the user terminal to the authentication service platform so that the authentication service platform authenticates the terminal information.
Accordingly, the 5G message payment authentication method may further include the following step S520: and under the condition that the user does not authenticate the target identification code for the first time, acquiring the target identification code input by the user, authenticating the target identification code, and sending the successful authentication result of the target identification code to the authentication service platform when the target identification code is successfully authenticated. That is, in the case where the user does not perform the target identification code authentication for the first time, the user terminal may perform the above-described steps S220 to S230. For brevity, the detailed processes of steps S220 to S230 are not described herein again.
Therefore, when the user firstly authenticates the target identification code, namely when the user does not authenticate the target identification code before, the user is required to input the target identification code, and the safety of the 5G message payment is improved for the target identification code authentication input by the user. And after the target identification code input by the user is successfully authenticated, when the user initiates the application request of 5G message payment again, the terminal information or the target user authentication tag of the user terminal is authenticated, and if the terminal information or the target user authentication tag of the user terminal changes, the target identification code input by the user is authenticated, so that the times of manually inputting the target identification code by the user for authentication are reduced, and the user experience is improved.
According to some embodiments of the present application, optionally, although terminal information of the user terminal or target user authentication tag authentication is introduced, in order to ensure higher security of 5G message payment, the user may be required to input a target identification code every preset time period and authenticate the target identification code input by the user. The size of the preset time period can be flexibly set according to the actual situation, and the embodiment of the application does not limit the size. For example, in some examples, the target identity authentication input by the user may be valid only one day, and on the second day, if the user initiates the application request of 5G message payment again, the user is required to input the target identity again, and the target identity authentication input by the user is authenticated, so that once the user terminal is lost, other people can be effectively prevented from using the user terminal to perform 5G message payment, and the 5G message payment is guaranteed to have higher security.
According to some embodiments of the application, optionally, when the amount paid by the 5G message is greater than the preset amount, the user is required to input the target identification code, and the target identification code input by the user is authenticated, so that higher security of 5G message payment is ensured. The preset amount of money can be flexibly set according to actual conditions, and the embodiment of the application does not limit the preset amount of money.
Fig. 6 is a flowchart illustrating an embodiment of S510 in the method for authenticating 5G message payment provided in the first aspect of the present application. As shown in fig. 6, according to some embodiments of the present application, optionally, S510 may specifically include the following steps S610 to S640, where the step of determining whether the user performs the target identifier authentication for the first time is performed.
S610, sending target identity information of a user and/or an SIM card corresponding to the user terminal to the authentication service platform. The authentication service platform stores the successful authentication results of the target identification codes corresponding to the plurality of users and/or the SIM cards, and is used for inquiring whether the successful authentication results of the target identification codes corresponding to the target identity information exist or not and generating the inquiry results.
Specifically, the user terminal may send identity information (e.g., a user ID) of a user corresponding to the user terminal and/or identity information of the SIM card to the authentication service platform. For the convenience of differentiation, the identity information of the user corresponding to the user terminal and/or the identity information of the SIM card is referred to as target identity information.
The authentication service platform can store the successful authentication results of the target identification codes corresponding to a plurality of users and/or SIM cards. After receiving the target identity information sent by the user terminal, the authentication service platform may query whether a result that the target identity authentication corresponding to the target identity information is successful exists from the stored results that the target identity authentication corresponding to the plurality of users and/or SIM cards is successful, and generate a query result.
S620, receiving the query result sent by the authentication service platform.
S630, under the condition that the query result is that the target identification code corresponding to the target identity information is successfully authenticated in the authentication service platform, determining that the user does not perform the target identification code authentication for the first time.
When the result that the target identification code corresponding to the target identity information is successfully authenticated is found in the authentication service platform, the target identification code authentication is completed by the user before, and the user can be determined not to perform the target identification code authentication for the first time.
And S640, determining that the user performs target identification code authentication for the first time under the condition that the query result is that the target identification code corresponding to the target identity information does not exist in the authentication service platform.
When the result that the target identification code corresponding to the target identity information is successfully authenticated does not exist in the authentication service platform, the target identification code authentication is not completed before the user is inquired, and the user can be determined to perform the target identification code authentication for the first time.
Fig. 7 is a flowchart illustrating an embodiment of S220 in the method for authenticating 5G message payment provided in the first aspect of the present application. As previously mentioned, the target identification code may include a personal identification number of the SIM card. As shown in fig. 7, according to some embodiments of the present application, optionally, S220, obtaining a target identification code input by a user, and authenticating the target identification code may specifically include the following steps S710 to S740.
S710, sending request information for acquiring a personal identification number of the SIM card used by the user terminal to the operator.
The user terminal may send request information for acquiring the PIN code of the SIM card to an operator of the SIM card to acquire the PIN code of the SIM card used by the user terminal.
S720, receiving the personal identification password sent by the operator.
And the user terminal receives the PIN code of the SIM card used by the operator of the SIM card in response to the user terminal requesting the information feedback.
And S730, comparing the personal identification password input by the user with the personal identification password sent by the operator.
The user terminal may display an interface for entering the PIN code for the user to enter the PIN code of the SIM card. After the user inputs the PIN code of the SIM card, the PIN code of the SIM card input by the user is compared with the PIN code of the SIM card sent by the operator.
S740, determining that the personal identification number authentication is successful when the personal identification number inputted by the user matches the personal identification number transmitted by the operator.
If the PIN code of the SIM card input by the user is matched with the PIN code of the SIM card sent by the operator, the successful authentication of the PIN code of the SIM card input by the user can be determined.
If the PIN of the SIM card input by the user is not matched with the PIN of the SIM card sent by the operator, the authentication failure of the PIN of the SIM card input by the user can be determined.
When the PIN authentication of the SIM card input by the user fails, the payment platform cannot receive the result of successful authentication of the target identification code, so that the application request related to 5G message payment cannot be processed. In some examples, optionally, when the PIN code authentication of the SIM card input by the user fails, the user terminal may inform the user that the PIN code authentication of the SIM card input by the user fails. Further, the user may be required to input the PIN code of the SIM card again until the PIN code of the SIM card input by the user is successfully authenticated or the input times reach the preset times. The preset times can be flexibly set according to actual conditions, and the embodiment of the application does not limit the preset times.
Therefore, only the actual owner of the SIM card used by the user terminal and/or the user terminal knows the correct PIN code of the SIM card, so that the PIN code of the SIM card input by the user is authenticated during 5G message payment, and the application request related to 5G message payment is processed only under the condition that the PIN code authentication of the SIM card is successful, so that an illegal user can be effectively prevented from performing 5G message payment through the user terminal of another person, for example, the 5G message payment initiator and the SIM card owner are the same person, and the security of 5G message payment is ensured. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing PIN code authentication of the SIM card.
Fig. 8 is a schematic communication interaction diagram of an embodiment of a method for authenticating payment through a 5G message provided in the first aspect of the present application. As shown in fig. 8, the capability for 5G payment authentication may optionally be enabled in the form of a software development kit SDK for a 5G messaging application, according to some embodiments of the present application.
In particular, the user terminal 11 may include a 5G messaging application 81 and a software development kit SDK integrated with the 5G messaging application. The 5G message application 81 may perform step S210, sending an application request related to 5G message payment to the payment platform based on the 5G message. The SDK may perform step S220, and in case of receiving the identity authentication request forwarded by the 5G message application, obtain the target identification code input by the user, and authenticate the target identification code. In S230, in the case where the target identification code authentication is successful, the SDK transmits a result of the target identification code authentication success to the 5G message application 81, so that the 5G message application 81 transmits the result of the target identification code authentication success to the payment platform 12.
Therefore, the target identification code input by the user is authenticated by adding the SDK, and the application request related to the 5G message payment is processed only under the condition that the target identification code authentication is successful, so that the condition that an illegal user carries out the 5G message payment through a user terminal of another person can be effectively avoided, and the safety of the 5G message payment is ensured. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing the target identification code authentication.
Fig. 9 is a schematic communication interaction diagram of another embodiment of a 5G message payment authentication method provided in the first aspect of the present application. As shown in fig. 9, according to some embodiments of the present application, optionally, before acquiring the target identification code input by the user at S220, the 5G message payment authentication method may further include the following steps S310 to S340.
S310, the SDK sends the terminal information of the user terminal to an authentication service platform, and the authentication service platform is used for authenticating the terminal information.
In S310, the user terminal may transmit terminal information of the user terminal to the authentication service platform through the SDK. The authentication service platform can authenticate the terminal information of the user terminal.
S320, the SDK receives the authentication result of the terminal information fed back by the authentication service platform.
S330, under the condition that the terminal information is successfully authenticated, the SDK sends the result that the terminal information is successfully authenticated to the 5G message application program, so that the 5G message application program sends the result that the terminal information is successfully authenticated to the payment platform. The payment platform 12 may be configured to process the application request in response to a result of the terminal information authentication being successful.
S340, under the condition that the terminal information authentication fails, the SDK executes the steps of acquiring the target identification code input by the user and authenticating the target identification code.
Specifically, in the case where the terminal information authentication of the user terminal fails, the SDK may perform the above-described steps S220 to S230.
The above steps S220 to S230 and steps S310 to S340 have already been described in detail above, and are not repeated herein for brevity.
In this way, the terminal information of the user terminal is uploaded to the authentication service platform through the SDK for authentication, and if the terminal information of the user terminal changes, the SDK authenticates the target identification code input by the user; if the terminal information of the user terminal is not changed, the application request related to 5G message payment can be directly processed, the user is prevented from inputting the target identification code repeatedly, namely, the target identification code is prevented from being called repeatedly for authentication, the times of manually inputting the target identification code by the user for authentication are reduced, and the authentication experience of approximate non-inductive 5G message payment is provided for the user.
Fig. 10 is a flowchart illustrating an embodiment of S310 in the method for authenticating 5G message payment provided in the first aspect of the present application. As shown in fig. 10, according to some embodiments of the application, optionally, S310, sending the terminal information of the user terminal to the authentication service platform may specifically include the following steps S410 and S420.
S410, the SDK encrypts the terminal information of the user terminal to generate a target user authentication label.
In S410, before sending the terminal information of the user terminal to the authentication service platform, the SDK may encrypt the terminal information of the user terminal to generate a target user authentication tag (token).
S420, sending the target user authentication label to the authentication service platform by the SDK.
The authentication service platform is used for comparing terminal information in a target user authentication tag with terminal information in a first user authentication tag and generating an authentication result of the terminal information in the target user authentication tag, wherein the first user authentication tag is a user authentication tag which is the same as a user and/or an SIM card corresponding to the target user authentication tag.
The steps S410 and S420 are described in detail above, and are not described herein again for brevity.
Therefore, the SDK can ensure the safety of information transmission by encrypting the terminal information of the user terminal, and further improve the safety of 5G message payment.
Fig. 11 is a schematic communication interaction diagram of a payment authentication method for 5G messages according to still another embodiment of the first aspect of the present application. As shown in fig. 11, according to some embodiments of the present application, optionally, before the SDK sends the terminal information of the user terminal to the authentication service platform at S310, the 5G message payment authentication method may further include the following step S510.
S510, the SDK judges whether the user performs the target identification code authentication for the first time.
Correspondingly, S310, the SDK sending the terminal information of the user terminal to the authentication service platform may specifically include the following steps: and under the condition that the user does not authenticate the target identification code for the first time, the SDK sends the terminal information of the user terminal to the authentication service platform so that the authentication service platform authenticates the terminal information.
And under the condition that the user does not authenticate the target identification code for the first time, the SDK acquires the target identification code input by the user, authenticates the target identification code, and sends the successful authentication result of the target identification code to the authentication service platform when the target identification code is successfully authenticated. That is, in the case where the user does not perform the target identification code authentication for the first time, the SDK may perform the above-described steps S220 to S230.
The above steps S220 to S230, and S510 have been described in detail above, and are not described herein again for brevity.
Therefore, when the user firstly authenticates the target identification code, namely when the user does not authenticate the target identification code before, the user is required to input the target identification code, and the safety of the 5G message payment is improved for the target identification code authentication input by the user. And after the target identification code input by the user is successfully authenticated, when the user initiates the application request of 5G message payment again, the terminal information or the target user authentication tag of the user terminal is authenticated, and if the terminal information or the target user authentication tag of the user terminal changes, the SDK authenticates the target identification code input by the user, so that the number of times of manually inputting the target identification code authentication by the user is reduced, and the user experience is improved.
The second aspect of the present application provides a 5G message payment authentication method, which is applicable to an authentication service platform, that is, the 5G message payment authentication method can be executed by the authentication service platform. For the specific content of the authentication service platform, reference may be made to the relevant description in the above embodiments, and details are not described herein again.
Fig. 12 is a flowchart illustrating an embodiment of a payment authentication method for a 5G message according to a second aspect of the present application. As shown in fig. 12, the 5G message payment authentication method may include steps S1210 to S1230.
And S1210, receiving the terminal information of the user terminal sent by the user terminal.
In S1210, the authentication service platform may receive terminal information of the user terminal transmitted by the user terminal. Illustratively, the terminal information of the user terminal may include necessary information and optional information for verifying the identity of the user terminal. The essential information may be one or a combination of a series of information that uniquely identifies the user terminal without frequent changes, such as but not limited to the model number of the user terminal, the manufacturer of the user terminal, the system version or mac address of the user terminal, etc. The optional information may be some auxiliary information, for example, the optional information includes, but is not limited to, a geographical location or an IP address of the user terminal, etc.
S1220 authenticates the terminal information, and generates an authentication result of the terminal information.
The authentication service platform can compare the terminal information of the user terminal sent by the user terminal with the stored terminal information of the user terminal to verify whether the terminal information of the user terminal sent by the user terminal is consistent with the stored terminal information of the user terminal and generate an authentication result of the terminal information.
And S1230, feeding back the authentication result of the terminal information to the user terminal.
In S1230, the authentication service platform may feed back the authentication result of the terminal information to the user terminal.
The user terminal may be configured to send a result of successful terminal information authentication to the payment platform in a case that the terminal information authentication is successful. The user terminal may be configured to, in a case that the terminal information authentication fails, acquire the target identification code input by the user, authenticate the target identification code, and, when the target identification code authentication succeeds, send a result that the target identification code authentication succeeds to the payment platform, that is, perform steps S220 and S230 described above. The payment platform may be configured to process an application request related to the 5G message payment in response to a result of successful authentication of the terminal information or a result of successful authentication of the target identification code.
According to the 5G message payment authentication method, due to the fact that only the actual owner of the SIM card used by the user terminal and/or the user terminal generally knows the correct target identification code, when the 5G message is paid, the target identification code input by the user is authenticated, and only under the condition that the target identification code is successfully authenticated, the application request related to 5G message payment is processed, the 5G message payment by an illegal user through the user terminal of other people can be effectively avoided, and the safety of the 5G message payment is guaranteed. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing the target identification code authentication.
In addition, the terminal information of the user terminal is uploaded to the authentication server platform for authentication, and if the terminal information of the user terminal changes, the target identification code input by the user is authenticated; if the terminal information of the user terminal is not changed, the application request related to 5G message payment can be directly processed, the user is prevented from inputting the target identification code repeatedly, namely, the target identification code is prevented from being called repeatedly for authentication, the times of manually inputting the target identification code by the user for authentication are reduced, and the authentication experience of approximate non-inductive 5G message payment is provided for the user.
Fig. 13 is a flowchart illustrating another embodiment of a payment authentication method for a 5G message according to a second aspect of the present application. As shown in fig. 13, according to some embodiments of the present application, optionally, the receiving terminal information of the user terminal in S1210 may specifically include the following steps: and receiving a target user authentication tag sent by the user terminal, wherein the target user authentication tag carries the encrypted terminal information of the user terminal.
Specifically, before sending the terminal information of the user terminal to the authentication service platform, the user terminal may encrypt the terminal information of the user terminal to generate a target user authentication tag (token). In some examples, the user terminal may encrypt the terminal information of the user terminal through a symmetric encryption algorithm, for example, to generate the target user authentication tag. In other examples, for example, the user terminal may also encrypt the terminal information of the user terminal through an asymmetric encryption algorithm to generate the target user authentication tag, which is not limited in this embodiment of the present application. The authentication service platform can receive a target user authentication tag sent by the user terminal.
It is readily understood that the authentication service platform may store a plurality of user authentication tags. Accordingly, S1220, the authentication of the terminal information, and the generation of the authentication result of the terminal information may specifically include the following steps S1310 and S1320.
S1310, decrypt the target user authentication tag and the first user authentication tag, where the first user authentication tag is the same user authentication tag as the user and/or SIM card corresponding to the target user authentication tag.
For example, the target user authentication tag carries the identity information of the user and/or the identity information of the SIM card. The authentication service platform can decrypt the target user authentication tag by using a decryption algorithm corresponding to the symmetric encryption algorithm or the asymmetric encryption algorithm to obtain the identity information of the user and/or the identity information of the SIM card and the terminal information of the user terminal carried in the target user authentication tag. The authentication service platform can query a user authentication tag which is the same as the user identity information and/or the identity information of the SIM card carried in the target user authentication tag from the database according to the identity information and/or the identity information of the SIM card carried in the target user authentication tag, so as to obtain a first user authentication tag. The first user authentication tag is then decrypted.
S1320, comparing the terminal information in the target user authentication tag with the terminal information in the first user authentication tag, and generating an authentication result of the terminal information in the target user authentication tag.
And S1230, feeding back the authentication result of the terminal information in the target user authentication tag to the user terminal.
Therefore, the terminal information of the user terminal is encrypted and decrypted, so that the safety of information transmission can be ensured, and the safety of 5G message payment is further improved.
According to some embodiments of the present application, optionally, the step S1210 of receiving the terminal information of the user terminal sent by the user terminal may specifically include the following steps: and receiving the terminal information of the user terminal sent by the user terminal under the condition that the user does not authenticate the target identification code for the first time.
Accordingly, the 5G message payment authentication method may further include the steps of: and under the condition that the user firstly authenticates the target identification code, receiving and storing a successful target identification code authentication result sent by the user terminal.
That is, when the user performs the target identification code authentication for the first time, that is, when the user does not perform the target identification code authentication before, the user is required to input the target identification code, and the security of the 5G message payment is improved for the target identification code authentication input by the user. And after the target identification code input by the user is successfully authenticated, when the user initiates the application request of 5G message payment again, the terminal information of the user terminal or the target user authentication tag is authenticated, and if the terminal information of the user terminal or the target user authentication tag changes, the target identification code input by the user is authenticated, so that the number of times of manually inputting the target identification code by the user for authentication is reduced, and the user experience is improved.
According to some embodiments of the present application, optionally, the authentication service platform stores a result of successful authentication of the target identification codes corresponding to a plurality of users and/or SIM cards. Fig. 14 is a flowchart illustrating a payment authentication method using 5G messages according to a second aspect of the present application. As shown in fig. 14, the 5G message payment authentication method may further include steps S1410 to S1430 before S1210.
And S1410, receiving first request information sent by the user terminal. The first request information carries target identity information of a user and/or an SIM card corresponding to the user terminal, and the first request information is used for indicating whether a result of successful target identification code authentication corresponding to the target identity information exists in inquiry.
Specifically, the authentication service platform may receive first request information sent by the user terminal, where the first request information may be used to indicate whether the authentication service platform queries whether a result of successful authentication of the target identifier corresponding to the target identity information exists. The first request information may carry identity information (e.g., a user ID) of a user corresponding to the user terminal and/or identity information of the SIM card. For the convenience of distinction, the identity information of the user corresponding to the user terminal and/or the identity information of the SIM card is referred to as target identity information.
S1420, responding to the first request information, inquiring whether a result of successful target identification code authentication corresponding to the target identity information exists in results of successful target identification code authentication corresponding to a plurality of users and/or SIM cards, and generating an inquiry result.
After receiving the first request information sent by the user terminal, the authentication service platform may query whether a result that the target identification code corresponding to the target identity information is successfully authenticated exists in stored results that the target identification codes corresponding to the plurality of users and/or SIM cards are successfully authenticated, and generate a query result.
And S1430, sending the query result to the user terminal so that the user terminal can judge whether the user performs target identification code authentication for the first time according to the query result.
The authentication service platform may send the query result to the user terminal. The user terminal can judge whether the user performs target identification code authentication for the first time according to the query result. For example, when a result that the target identification code corresponding to the target identity information is successfully authenticated is found in the authentication service platform, it is indicated that the user has previously completed the target identification code authentication, and it may be determined that the user does not perform the target identification code authentication for the first time. When the result that the target identification code corresponding to the target identity information is successfully authenticated does not exist in the authentication service platform, the target identification code authentication is not completed before the user is inquired, and the user can be determined to perform the target identification code authentication for the first time.
Fig. 15 is a flowchart illustrating a payment authentication method using a 5G message according to a further embodiment of the second aspect of the present application. As shown in fig. 15, according to some embodiments of the present application, optionally, after authenticating the terminal information and generating an authentication result of the terminal information at S1220, the 5G message payment authentication method may further include steps S1510 to S1530.
S1510 stores the terminal information that failed authentication, when the authentication of the terminal information failed.
In case that the terminal information authentication of the user terminal fails, the authentication service platform may store the terminal information of the user terminal that failed in the authentication.
S1520, receiving the result of successful target identification code authentication sent by the user terminal and the terminal information of the user terminal when the target identification code authentication is successful.
If the terminal information authentication of the user terminal fails, the user terminal may request the user to input the target identification code again, and authenticate the target identification code input by the user. And if the target identification code input by the user is successfully authenticated, the user terminal sends a result that the target identification code is successfully authenticated and terminal information of the user terminal when the target identification code is successfully authenticated to the authentication service platform.
S1530, the terminal information of the user terminal that failed authentication is updated based on the terminal information of the user terminal when the target identification code authentication succeeds.
The authentication service platform may update the stored terminal information of the user terminal that failed in authentication based on the terminal information of the user terminal when the received target identification code authentication is successful.
Therefore, the method can be used for subsequent transaction tracing of wind control and 5G message payment by storing the terminal information of the user terminal with failed authentication.
With continued reference to FIG. 9, according to some embodiments of the present application, the user terminal 11 may optionally include a 5G messaging application 81 and a software development kit SDK integrated with the 5G messaging application.
Correspondingly, S1210, receiving the terminal information of the user terminal sent by the user terminal, may specifically include the following steps: and receiving the terminal information of the user terminal sent by the SDK.
S1230, feeding back the authentication result of the terminal information to the user terminal, which may specifically include the following steps: and feeding back the authentication result of the terminal information to the SDK.
The SDK is configured to, in a case where the terminal information authentication is successful, send a result of the terminal information authentication success to the 5G message application 81, so that the 5G message application 81 sends the result of the terminal information authentication success to the payment platform. The SDK is used for acquiring the target identification code input by the user under the condition that the terminal information authentication fails, authenticating the target identification code, and sending the result of successful target identification code authentication to the payment platform when the target identification code authentication is successful.
In this way, the terminal information of the user terminal is uploaded to the authentication service platform through the SDK for authentication, and if the terminal information of the user terminal changes, the SDK authenticates the target identification code input by the user; if the terminal information of the user terminal is not changed, the application request related to 5G message payment can be directly processed, the user is prevented from inputting the target identification code repeatedly, namely, the target identification code is prevented from being called repeatedly for authentication, the times of manually inputting the target identification code by the user for authentication are reduced, and the authentication experience of approximate non-inductive 5G message payment is provided for the user.
According to some embodiments of the present application, optionally, the step S1210 of receiving the terminal information of the user terminal sent by the user terminal may specifically include the following steps: and receiving a target user authentication tag sent by the SDK, wherein the target user authentication tag carries the encrypted terminal information of the user terminal. After receiving the target user authentication tag, the authentication service platform compares the terminal information in the target user authentication tag with the terminal information in the first user authentication tag, and generates an authentication result of the terminal information in the target user authentication tag. S1230, feeding back the authentication result of the terminal information to the user terminal, which may specifically include the following steps: and feeding back the authentication result of the terminal information in the target user authentication label to the SDK.
Therefore, the terminal information of the user terminal is encrypted and decrypted, so that the safety of information transmission can be ensured, and the safety of 5G message payment is further improved.
According to some embodiments of the present application, optionally, the step S1210 of receiving the terminal information of the user terminal sent by the SDK may specifically include the following steps: and receiving the terminal information of the user terminal sent by the SDK under the condition that the user does not authenticate the target identification code for the first time.
Accordingly, the 5G message payment authentication method may further include the steps of: and under the condition that the user firstly authenticates the target identification code, receiving and storing a result of successful authentication of the target identification code sent by the SDK.
Therefore, when the user firstly authenticates the target identification code, namely when the user does not authenticate the target identification code before, the user is required to input the target identification code, and the safety of the 5G message payment is improved for the target identification code authentication input by the user. And after the target identification code input by the user is successfully authenticated, when the user initiates the application request of 5G message payment again, the terminal information or the target user authentication tag of the user terminal is authenticated, and if the terminal information or the target user authentication tag of the user terminal changes, the target identification code input by the user is authenticated, so that the times of manually inputting the target identification code by the user for authentication are reduced, and the user experience is improved.
The third aspect of the present application provides a 5G message payment authentication method, which is applicable to a payment platform, that is, the 5G message payment authentication method can be executed by the payment platform. For specific contents of the payment platform, reference may be made to the relevant description in the above embodiments, and details are not described herein again.
Fig. 16 is a flowchart illustrating an embodiment of a payment authentication method for a 5G message provided in the third aspect of the present application. As shown in fig. 16, the 5G message payment authentication method may include steps S1610 to S1630.
S1610, receiving an application request which is sent by the user terminal and is related to 5G message payment.
S1620, in response to the application request, sending an identity authentication request to the user terminal, where the identity authentication request is used to instruct to authenticate the target identification code input by the user.
After receiving an application request related to 5G message payment sent by a user terminal, the payment platform may send an identity authentication request to the user terminal, where the identity authentication request may be used to instruct the user terminal to authenticate a target identification code input by a user. The user terminal can acquire the target identification code input by the user and authenticate the target identification code under the condition of receiving the identity authentication request sent by the payment platform.
S1630, the application request is processed when the target identification code transmitted by the user terminal is successfully authenticated.
And the user terminal sends a result of successful target identification code authentication to the payment platform under the condition of successful target identification code authentication. And the payment platform processes the application request which is sent by the user terminal and is related to the 5G message payment under the condition of receiving the result of successful target identification code authentication sent by the user terminal.
According to the 5G message payment authentication method, due to the fact that only the actual owner of the SIM card used by the user terminal and/or the user terminal generally knows the correct target identification code, when the 5G message is paid, the target identification code input by the user is authenticated, and only under the condition that the target identification code is successfully authenticated, the application request related to 5G message payment is processed, the 5G message payment by an illegal user through the user terminal of other people can be effectively avoided, and the safety of the 5G message payment is guaranteed. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing the target identification code authentication.
Fig. 17 is a flowchart illustrating a payment authentication method using a 5G message according to another embodiment of the third aspect of the present application. As shown in fig. 17, according to some embodiments of the present application, optionally, the 5G message payment authentication method may further include steps S1710 and S1720.
And S1710, receiving a result of successful authentication of the terminal information of the user terminal sent by the user terminal.
The user terminal may transmit terminal information of the user terminal to the authentication service platform. The authentication service platform can authenticate the terminal information of the user terminal. Under the condition that the terminal information of the user terminal is successfully authenticated, the user terminal can send a result that the terminal information is successfully authenticated to the payment platform.
And S1720, responding to the result of successful terminal information authentication, and processing the application request.
And the payment platform can process the application request related to the 5G message payment after receiving the result of successful terminal information authentication.
Therefore, the terminal information of the user terminal is uploaded to the authentication service platform for authentication, and if the terminal information of the user terminal changes, the target identification code input by the user is authenticated; if the terminal information of the user terminal is not changed, the application request related to 5G message payment can be directly processed, the user is prevented from inputting the target identification code repeatedly, namely, the target identification code is prevented from being called repeatedly for authentication, the times of manually inputting the target identification code by the user for authentication are reduced, and the authentication experience of approximate non-inductive 5G message payment is provided for the user.
With continued reference to FIG. 9, according to some embodiments of the present application, the user terminal 11 may optionally include a 5G messaging application 81 and a software development kit SDK integrated with the 5G messaging application. The payment platform 12 may be communicatively coupled to the 5G messaging application 81, and the 5G messaging application 81 may send an application request and a result of successful target identification authentication associated with the 5G messaging payment to the payment platform 12. The payment platform 12 may send the authentication request to the 5G messaging application 81, and the 5G messaging application 81 may be used to forward the authentication request to the SDK. After receiving the identity authentication request, the SDK may authenticate the target identification code entered by the user.
Correspondingly, S1710 of receiving a result of successful authentication of the terminal information of the user terminal sent by the user terminal may specifically include the following steps: and receiving a result of successful authentication of the terminal information of the user terminal sent by the 5G message application program.
The fourth aspect of the present application provides a 5G message payment authentication method, which is applicable to a 5G message payment authentication system, that is, the 5G message payment authentication method can be executed by the 5G message payment authentication system. Fig. 18 is a schematic communication interaction diagram of an embodiment of a method for authenticating payment by using a 5G message according to a fourth aspect of the present application. As shown in fig. 18, the 5G message payment authentication system may include a user terminal 11, a payment platform 12, and an authentication service platform 13. The 5G message payment authentication method may include the following steps S1810 to S1850.
S1810, the user terminal 11 sends an application request related to 5G message payment to the payment platform 12 based on the 5G message.
S1820, the payment platform 12 sends, in response to the application request, an identity authentication request to the user terminal 11, where the identity authentication request is used to instruct the user terminal 11 to authenticate the target identification code input by the user.
S1830, under the condition that the user terminal 11 receives an identity authentication request fed back by the payment platform in response to the application request, acquiring a target identifier input by the user, and authenticating the target identifier.
S1840, if the target identification code authentication is successful, the user terminal 11 sends the result of the successful target identification code authentication to the payment platform 12.
S1850, the payment platform 12 processes the application request when receiving the result of successful target identification authentication sent by the user terminal.
The specific implementation process of the above steps S1810 to S1850 has been described in detail above, and for brevity, no further description is provided here.
In the 5G message payment authentication method in the embodiment of the application, the user terminal sends an application request related to 5G message payment to a payment platform based on the 5G message; under the condition that an identity authentication request fed back by a payment platform in response to an application request is received, a user terminal acquires a target identification code input by a user and authenticates the target identification code; and under the condition that the target identification code authentication is successful, the user terminal sends a result of successful target identification code authentication to the payment platform so that the payment platform responds to the result of successful target identification code authentication to process the application request. Because only the actual owner of the SIM card used by the user terminal and/or the user terminal generally knows the correct target identification code, when the 5G message is paid, the target identification code input by the user is authenticated, and only under the condition that the target identification code is successfully authenticated, the application request related to the 5G message payment is processed, so that the 5G message payment of an illegal user through the user terminal of another person can be effectively avoided, and the safety of the 5G message payment is ensured. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing the target identification code authentication.
For the convenience of understanding, the following describes in detail a 5G message payment authentication method according to an embodiment of the present application with reference to some specific application embodiments.
Fig. 19 is a schematic communication interaction diagram of another embodiment of a payment authentication method for 5G messages according to the fourth aspect of the present application. As shown in fig. 19, according to some embodiments of the present application, the user terminal 11 may optionally include a 5G messaging application 81 and a software development kit SDK integrated with the 5G messaging application.
Taking the case that the user performs the 5G message payment authentication for the first time and the authentication succeeds, as shown in fig. 19, the 5G message payment authentication method may include the following steps S1910 to S1980.
S1910, 5G message application 81 sends an application request related to 5G message payment to payment platform 12.
S1920, the payment platform 12 sends an identity authentication request to the 5G messaging application 81 in response to the application request.
S1930, 5G messaging application 81 forwards the authentication request to the SDK.
S1940, the SDK acquires the target identification code input by the user and authenticates the target identification code.
S1950, if the target id is successfully authenticated, the SDK sends the result of the successful target id authentication to the 5G message application 81, and at the same time, the SDK encrypts the result of the successful target id authentication and the terminal information of the user terminal and sends the result to the authentication service platform 13.
S1960, the authentication service platform 13 stores the user authentication tag sent by the SDK.
The S1970, 5G message application 81 sends the result of successful target identification authentication to the payment platform 12.
S1980, the payment platform 12 processes the application request related to the 5G message payment, in case of receiving the result of successful target identification authentication sent by the 5G message application 81.
Fig. 20 is a schematic communication interaction diagram of a payment authentication method using 5G messages according to a further embodiment of the fourth aspect of the present application. As shown in fig. 20, after the user first-time target identifier authentication is successful, the user initiates the application request again, and if the authentication is successful, the 5G message payment authentication method may include the following steps S2010 to S2090.
S2010, 5G message application 81 sends an application request related to 5G message payment to payment platform 12.
S2020, the payment platform 12 sends an identity authentication request to the 5G messaging application 81 in response to the application request.
The S2030, 5G message application 81 forwards the identity authentication request to the SDK.
S2040, after the SDK judges that the user is not authenticated by the first target identification code, the terminal information of the user terminal is encrypted to generate a target user authentication tag, and the target user authentication tag is sent to the authentication service platform 13.
S2050, the authentication service platform 13 authenticates the terminal information of the user terminal in the target user authentication tag.
S2060, the authentication service platform 13 feeds back the authentication result of the terminal information to the SDK.
S2070, in case of successful terminal information authentication, the SDK sends the result of successful terminal information authentication to the 5G message application 81.
The S2080, 5G message application 81 sends the result of the successful terminal information authentication to the payment platform 12.
S2090, when receiving the result of successful authentication of the terminal information sent by the 5G message application 81, the payment platform 12 processes the application request related to 5G message payment.
Fig. 21 is a schematic communication interaction diagram of a payment authentication method for 5G messages according to a further embodiment of the fourth aspect of the present application. As shown in fig. 21, after the user successfully authenticates the target identifier for the first time, the user initiates the application request again, and if the authentication fails, the 5G message payment authentication method may include the following steps S2110 to S2220.
S2110, 5G messaging application 81 sends an application request related to 5G messaging payment to payment platform 12.
S2120, payment platform 12 sends an identity authentication request to 5G messaging application 81 in response to the application request.
S2130, 5G message application 81 forwards the identity authentication request to the SDK.
S2140, after the SDK judges that the user is not authenticated by the first target identification code, the terminal information of the user terminal is encrypted to generate a target user authentication label, and the target user authentication label is sent to the authentication service platform 13.
S2150, the authentication service platform 13 authenticates the terminal information of the user terminal in the target user authentication tag.
S2160, the authentication service platform 13 feeds back the authentication result of the terminal information to the SDK.
S2170, in case of the terminal information authentication failure, the authentication service platform 13 stores the terminal information of the user terminal whose authentication failed.
And S2180, under the condition that the terminal information authentication fails, the SDK acquires a target identification code input by a user and authenticates the target identification code.
S2190, when the target identifier is successfully authenticated, the SDK sends the result of the successful target identifier authentication to the 5G message application 81, and at the same time, the SDK encrypts the result of the successful target identifier authentication and the terminal information of the user terminal and sends the result to the authentication service platform 13.
S2200, the authentication service platform 13 updates the terminal information of the user terminal that failed in authentication based on the terminal information of the user terminal when the target identification code authentication is successful.
The S2210, 5G message application 81 sends the result of the successful target identity authentication to the payment platform 12.
S2220, the payment platform 12 processes the application request related to the 5G message payment when receiving the result that the target identification code authentication sent by the 5G message application 81 is successful.
It should be noted that, the steps in fig. 19 to fig. 21 have been described in detail above, and are not described again here.
Based on the 5G message payment authentication method provided by the first aspect of the present application, correspondingly, the fifth aspect of the present application further provides a user terminal. Fig. 22 is a schematic structural diagram of an embodiment of a user terminal according to the present application. As shown in fig. 22, the user terminal 2200 may include:
a first sending module 2201, configured to send an application request related to 5G message payment to the payment platform based on the 5G message;
a first authentication module 2202, configured to, in a case where an identity authentication request fed back by the payment platform in response to the application request is received, obtain a target identification code input by the user, and authenticate the target identification code;
the first sending module 2201 is further configured to, in case the target identification code authentication is successful, send a result of the target identification code authentication success to the payment platform, so that the payment platform processes the application request in response to the result of the target identification code authentication success.
In the user terminal provided in the embodiment of the present application, the first sending module 2201 is configured to send, to the payment platform, an application request related to 5G message payment based on the 5G message; the first authentication module 2202 is configured to, in a case where an identity authentication request fed back by the payment platform in response to the application request is received, acquire a target identification code input by a user, and authenticate the target identification code; the first sending module 2201 is further configured to, in case the target identification code authentication is successful, send a result of the target identification code authentication success to the payment platform, so that the payment platform processes the application request in response to the result of the target identification code authentication success. Because only the actual owner of the user terminal and/or the SIM card used by the user terminal generally knows the correct target identification code, when the 5G message is paid, the target identification code input by the user is authenticated, and only under the condition that the target identification code is successfully authenticated, the application request related to the 5G message payment is processed, so that the 5G message payment by an illegal user through the user terminal of other people can be effectively avoided, and the safety of the 5G message payment is ensured. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by adding the target identification code authentication.
In some embodiments, the first sending module 2201 is further configured to send the terminal information of the user terminal to an authentication service platform, which is configured to authenticate the terminal information. The user terminal may further include a receiving module, configured to receive an authentication result of the terminal information fed back by the authentication service platform. The first sending module 2201 is further configured to, in case that the terminal information authentication is successful, send a result of the terminal information authentication success to the payment platform, so that the payment platform processes the application request in response to the result of the terminal information authentication success. The first authentication module 2202 is specifically configured to, in a case where the terminal information authentication fails, perform a step of acquiring a target identification code input by a user and authenticating the target identification code.
In some embodiments, the first sending module 2201 is specifically configured to encrypt the terminal information of the user terminal to generate a target user authentication tag; and sending a target user authentication tag to an authentication service platform, wherein the authentication service platform stores a plurality of user authentication tags, and is used for comparing terminal information in the target user authentication tag with terminal information in a first user authentication tag and generating an authentication result of the terminal information in the target user authentication tag, and the first user authentication tag is a user authentication tag which is the same as a user and/or an SIM card corresponding to the target user authentication tag.
In some embodiments, the user terminal may further include a determining module, configured to determine whether the user performs target identity authentication for the first time. The first sending module 2201 is specifically configured to, in a case where the user does not perform the target identity authentication for the first time, send the terminal information of the user terminal to the authentication service platform, so that the authentication service platform authenticates the terminal information. The first authentication module 2202 is specifically configured to, when the user does not perform the target identification code authentication for the first time, acquire the target identification code input by the user, and authenticate the target identification code.
In some embodiments, the determining module is specifically configured to send target identity information of a user and/or an SIM card corresponding to the user terminal to the authentication service platform, where the authentication service platform stores a result of successful authentication of target identification codes corresponding to a plurality of users and/or SIM cards, and the authentication service platform is configured to query whether a result of successful authentication of the target identification codes corresponding to the target identity information exists, and generate a query result; receiving a query result sent by the authentication service platform; determining that the user does not perform target identification code authentication for the first time under the condition that the query result is the result that the target identification code corresponding to the target identity information is successfully authenticated in the authentication service platform; and under the condition that the query result is the result that the target identification code corresponding to the target identity information does not exist in the authentication service platform, determining that the user performs the target identification code authentication for the first time.
In some embodiments, the target identification code comprises a personal identification number of the SIM card.
In some embodiments, the first authentication module 2202 is specifically configured to send, to the operator, request information for obtaining a personal identification code of a SIM card used by the user terminal; receiving a personal identification password sent by an operator; comparing the personal identification password input by the user with the personal identification password sent by the operator; and in the case that the personal identification code input by the user matches the personal identification code transmitted by the operator, determining that the personal identification code authentication is successful.
In some embodiments, the user terminal includes a 5G messaging application and a software development kit SDK integrated with the 5G messaging application; the SDK acquires a target identification code input by a user and authenticates the target identification code under the condition of receiving an identity authentication request forwarded by a 5G message application program; and under the condition that the target identification code is successfully authenticated, the SDK sends the result that the target identification code is successfully authenticated to the 5G message application program, so that the 5G message application program sends the result that the target identification code is successfully authenticated to the payment platform.
In some embodiments, the SDK sends the terminal information of the user terminal to an authentication service platform, and the authentication service platform is configured to authenticate the terminal information; the SDK receives an authentication result of the terminal information fed back by the authentication service platform; under the condition that the terminal information is successfully authenticated, the SDK sends a result that the terminal information is successfully authenticated to the 5G message application program, so that the 5G message application program sends the result that the terminal information is successfully authenticated to the payment platform, and the payment platform is used for responding to the result that the terminal information is successfully authenticated and processing the application request; and under the condition that the terminal information authentication fails, the SDK executes the steps of acquiring the target identification code input by the user and authenticating the target identification code.
In some embodiments, the SDK encrypts terminal information of the user terminal to generate a target user authentication tag; the SDK sends a target user authentication label to an authentication service platform, the authentication service platform stores a plurality of user authentication labels, the authentication service platform is used for comparing terminal information in the target user authentication label with terminal information in a first user authentication label and generating an authentication result of the terminal information in the target user authentication label, and the first user authentication label is a user authentication label which is the same as a user and/or an SIM card corresponding to the target user authentication label.
In some embodiments, the SDK determines whether the user first performs target identity authentication; under the condition that the user does not authenticate the target identification code for the first time, the SDK sends the terminal information of the user terminal to the authentication service platform so that the authentication service platform authenticates the terminal information; and under the condition that the user does not authenticate the target identification code for the first time, the SDK acquires the target identification code input by the user, authenticates the target identification code, and sends the successful authentication result of the target identification code to the authentication service platform when the target identification code is successfully authenticated.
Based on the 5G message payment authentication method provided in the second aspect of the present application, correspondingly, the sixth aspect of the present application further provides an authentication service platform. Fig. 23 is a schematic structural diagram of an authentication service platform according to an embodiment of the present application. As shown in fig. 23, the authentication service platform 2300 may include:
a first receiving module 2301, configured to receive terminal information of a user terminal sent by the user terminal;
a second authentication module 2302 for authenticating the terminal information and generating an authentication result of the terminal information;
a second sending module 2303, configured to feed back an authentication result of the terminal information to the user terminal;
the user terminal is used for sending a result of successful terminal information authentication to the payment platform under the condition that the terminal information authentication is successful; under the condition that terminal information authentication fails, acquiring a target identification code input by a user, authenticating the target identification code, and sending a result of successful target identification code authentication to a payment platform when the target identification code authentication is successful;
and the payment platform is used for responding to the result of successful terminal information authentication or the result of successful target identification code authentication to process the application request related to the 5G message payment.
According to the authentication service platform, only the actual owner of the SIM card used by the user terminal and/or the user terminal generally knows the correct target identification code, so that when the 5G message is paid, the target identification code input by the user is authenticated, and only under the condition that the target identification code is successfully authenticated, the application request related to the 5G message payment is processed, the 5G message payment can be effectively avoided by an illegal user through the user terminal of other people, and the safety of the 5G message payment is ensured. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing the target identification code authentication.
In addition, the terminal information of the user terminal is uploaded to the authentication server platform for authentication, and if the terminal information of the user terminal changes, the target identification code input by the user is authenticated; if the terminal information of the user terminal is not changed, the application request related to 5G message payment can be directly processed, the user is prevented from inputting the target identification code repeatedly, namely, the target identification code is prevented from being called repeatedly for authentication, the times of manually inputting the target identification code by the user for authentication are reduced, and the authentication experience of approximate non-inductive 5G message payment is provided for the user.
In some embodiments, the first receiving module 2301 is specifically configured to receive a target user authentication tag sent by a user terminal, where the target user authentication tag carries encrypted terminal information of the user terminal. The authentication service platform stores a plurality of user authentication tags, and the second authentication module 2302 is specifically configured to: decrypting the target user authentication tag and the first user authentication tag, wherein the first user authentication tag is a user authentication tag which is the same as a user and/or an SIM card corresponding to the target user authentication tag; and comparing the terminal information in the target user authentication tag with the terminal information in the first user authentication tag, and generating an authentication result of the terminal information in the target user authentication tag.
In some embodiments, the first receiving module 2301 is specifically configured to receive terminal information of the user terminal sent by the user terminal when the user does not perform target identification code authentication for the first time; and under the condition that the user firstly authenticates the target identification code, receiving and storing a successful target identification code authentication result sent by the user terminal.
In some embodiments, the first receiving module 2301 is further configured to receive first request information sent by the user terminal, where the first request information carries target identity information of a user and/or an SIM card corresponding to the user terminal, and the first request information is used to indicate whether a result of successful target identity authentication corresponding to the target identity information exists in the query. The authentication service platform may further include a query module, configured to query whether a result that the target identity information corresponding to the target identity information is successfully authenticated exists in the results that the target identity information corresponding to the plurality of users and/or SIM cards is successfully authenticated in response to the first request information, and generate a query result. The second sending module 2303 is further configured to send the query result to the user terminal, so that the user terminal determines whether the user performs the target identification code authentication for the first time according to the query result.
In some embodiments, the authentication service platform may further include a storage module, configured to store, in a case where the authentication of the terminal information fails, the terminal information that failed in the authentication; receiving a result of successful target identification code authentication sent by the user terminal and terminal information of the user terminal when the target identification code authentication is successful; and updating the terminal information failed in authentication based on the terminal information of the user terminal when the target identification code authentication is successful.
In some embodiments, the user terminal includes a 5G messaging application and a software development kit SDK integrated with the 5G messaging application. The first receiving module 2301 is specifically configured to receive the terminal information of the user terminal sent by the SDK. The second sending module 2303 is specifically configured to feed back the authentication result of the terminal information to the SDK; the SDK is used for sending the result of successful terminal information authentication to the 5G message application program under the condition that the terminal information authentication is successful, so that the 5G message application program sends the result of successful terminal information authentication to the payment platform; the SDK is used for acquiring the target identification code input by the user under the condition that the terminal information authentication fails, authenticating the target identification code, and sending the result of successful target identification code authentication to the payment platform when the target identification code authentication is successful.
In some embodiments, the first receiving module 2301 is specifically configured to receive a target user authentication tag sent by the SDK, where the target user authentication tag carries encrypted terminal information of the user terminal. The second sending module 2303 is specifically configured to feed back the authentication result of the terminal information in the target user authentication tag to the SDK.
In some embodiments, the first receiving module 2301 is specifically configured to receive, when the user does not perform the target identifier authentication for the first time, terminal information of the user terminal sent by the SDK; and under the condition that the user does not authenticate the target identification code for the first time, receiving and storing a result of successful authentication of the target identification code sent by the SDK.
Based on the 5G message payment authentication method provided in the third aspect of the present application, correspondingly, the seventh aspect of the present application further provides a payment platform. Fig. 24 is a schematic structural diagram of an embodiment of a payment platform according to an embodiment of the present application. As shown in fig. 24, the payment platform 2400 may include:
a second receiving module 2401, configured to receive an application request related to 5G message payment sent by a user terminal;
a third sending module 2402, configured to send, in response to the application request, an identity authentication request to the user terminal, where the identity authentication request is used to indicate that the target identification code input by the user is to be authenticated;
a processing module 2403, configured to process the application request when receiving a result that the target identifier sent by the user terminal succeeds in authentication.
According to the payment platform, only the actual owner of the SIM card used by the user terminal and/or the user terminal generally knows the correct target identification code, so that when the 5G message is paid, the target identification code input by the user is authenticated, and only under the condition that the target identification code is successfully authenticated, the application request related to the 5G message payment is processed, the 5G message payment can be effectively avoided by an illegal user through the user terminal of other people, and the safety of the 5G message payment is ensured. In addition, when the user terminal and/or the SIM card used by the user terminal is lost, the risk of privacy disclosure of the user terminal and/or the owner of the SIM card used by the user terminal can be reduced by increasing the target identification code authentication.
In some embodiments, the second receiving module 2401 is further configured to receive a result that the authentication of the terminal information of the user terminal sent by the user terminal is successful. The processing module 2403 is further configured to process the application request in response to a result of successful authentication of the terminal information.
In some embodiments, the user terminal includes a 5G messaging application and a software development kit SDK integrated with the 5G messaging application; the payment platform is in communication connection with the 5G message application program, the application request and the result of successful target identification code authentication are sent to the payment platform through the 5G message application program, the identity authentication request is sent to the 5G message application program, and the 5G message application program is used for forwarding the identity authentication request to the SDK.
In some embodiments, the second receiving module 2401 is specifically configured to receive a result of successful authentication of the terminal information of the user terminal sent by the 5G message application.
The eighth aspect of the present application further provides a user terminal. Fig. 25 is a schematic structural diagram of an embodiment of a user terminal according to an eighth aspect of the present application. As shown in fig. 25, the user terminal 1200 includes a memory 1201, a processor 1202, and a computer program stored on the memory 1201 and executable on the processor 1202. The processor 1202, when executing the computer program instructions, implements a 5G message payment authentication method as provided by the first aspect.
In one example, the processor 1202 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of embodiments of the present Application.
Memory 1201 may include Read-Only Memory (ROM), random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash Memory devices, electrical, optical, or other physical/tangible Memory storage devices. Thus, in general, the memory includes one or more tangible (non-transitory) computer-readable storage media (e.g., a memory device) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors), it is operable to perform the operations described with reference to the payment methods in embodiments according to the second aspect of the application.
The processor 1202 runs a computer program corresponding to the executable program code by reading the executable program code stored in the memory 1201 for implementing the payment method in the above-described second aspect embodiment.
In some examples, user terminal 1200 can also include a communication interface 1203 and a bus 1204. As shown in fig. 25, the memory 1201, the processor 1202, and the communication interface 1203 are connected via a bus 1204 to perform communication with each other.
The communication interface 1203 is mainly used for implementing communication between modules, apparatuses, units and/or devices in this embodiment of the application. Input devices and/or output devices are also accessible through communication interface 1203.
The bus 1204 comprises hardware, software, or both coupling the components of the user terminal 1200 to each other. By way of example and not limitation, bus 1204 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (Front Side Bus, FSB), a Hyper Transport (HT) Interconnect, an Industry Standard Architecture (ISA) Bus, an infiniband Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a Peripheral Component Interconnect (PCI) Bus, a PCI-Express (PCI-E) Bus, a Serial Advanced Technology Attachment (attached) Bus, an attached Local Electronics Standard Association (vldo) Bus, a Local Electronics Standard Association (vldo) Bus, or a combination of two or more of these as appropriate. Bus 1204 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
A ninth aspect of the present application provides an authentication service platform that may include a memory, a processor, and a computer program stored on the memory and executable on the processor. In some examples, the authentication service platform may also include a communication interface and a bus. The memory, the processor and the communication interface can be connected through a bus and can complete mutual communication.
The connection relationship and the example description of the memory, the processor, the communication interface and the bus can refer to the relevant description in the above embodiment of the user terminal, and are not described again here. The authentication service platform differs from the user terminal embodiment in that the processor runs a computer program corresponding to the executable program code by reading the executable program code stored in the memory for implementing the 5G message payment authentication method in the second aspect embodiment described above. In particular, the memory includes one or more tangible (non-transitory) computer-readable storage media (e.g., a memory device) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors), it is operable to perform the operations described with reference to the 5G message payment authentication method in embodiments according to the second aspect of the present application.
A tenth aspect of the present application provides a payment platform that may include a memory, a processor, and a computer program stored on the memory and executable on the processor. In some examples, the payment platform may also include a communication interface and a bus. The memory, the processor and the communication interface can be connected through a bus and can complete mutual communication.
For the connection relationship and the example description of the memory, the processor, the communication interface and the bus, reference may be made to the related description in the above embodiment of the user terminal, and details are not described herein again. The payment platform differs from the user terminal embodiment in that the processor runs a computer program corresponding to the executable program code by reading the executable program code stored in the memory for implementing the 5G message payment authentication method in the third aspect embodiment described above. In particular, the memory includes one or more tangible (non-transitory) computer-readable storage media (e.g., a memory device) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors) it is operable to perform the operations described with reference to the 5G message payment authentication method in embodiments in accordance with the third aspect of the present application.
An eleventh aspect of the present application provides a 5G message payment authentication system, where the 5G message payment authentication system may include the user terminal, the authentication service platform, and the payment platform in the foregoing embodiments. For specific contents of the user terminal, the authentication service platform, and the payment platform, reference may be made to the relevant description in the foregoing embodiments, and details are not repeated here.
A twelfth aspect of the present application provides a computer-readable storage medium, where computer program instructions are stored on the computer-readable storage medium, and when the computer program instructions are executed by a processor, the method for authenticating payment with a 5G message in the embodiment of the present application can be implemented, and the same technical effect can be achieved. The computer-readable storage medium may include a non-transitory computer-readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like, which is not limited herein.
A thirteenth aspect of the present application provides a computer program product, where instructions in the computer program product, when executed by a processor of an electronic device, cause the electronic device to execute a 5G message payment authentication method in the embodiment of the present application, and specific contents of the 5G message payment authentication method may refer to relevant descriptions in the foregoing embodiments, and are not described herein again. The electronic device may include the user terminal, the authentication service platform, and the payment platform in the above embodiments.
It is to be understood that the present application is not limited to the particular arrangements and instrumentalities described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic Circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments can be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (32)

1. A5G message payment authentication method is applied to a user terminal, and comprises the following steps:
sending an application request related to 5G message payment to a payment platform based on the 5G message;
under the condition that an identity authentication request fed back by the payment platform in response to the application request is received, acquiring a target identification code input by a user, and authenticating the target identification code;
and under the condition that the target identification code authentication is successful, sending a result of successful target identification code authentication to the payment platform so that the payment platform processes the application request in response to the result of successful target identification code authentication.
2. The method of claim 1, wherein prior to said obtaining the user-entered target identification code, the method further comprises:
sending terminal information of the user terminal to an authentication service platform, wherein the authentication service platform is used for authenticating the terminal information;
receiving an authentication result of the terminal information fed back by the authentication service platform;
under the condition that the terminal information authentication is successful, sending a result of the terminal information authentication to the payment platform so that the payment platform responds to the result of the terminal information authentication to process the application request;
and under the condition that the terminal information authentication fails, executing the steps of acquiring the target identification code input by the user and authenticating the target identification code.
3. The method of claim 2, wherein the sending the terminal information of the user terminal to an authentication service platform comprises:
encrypting the terminal information of the user terminal to generate a target user authentication tag;
and sending the target user authentication tag to the authentication service platform, wherein the authentication service platform stores a plurality of user authentication tags, and is used for comparing terminal information in the target user authentication tag with terminal information in a first user authentication tag and generating an authentication result of the terminal information in the target user authentication tag, and the first user authentication tag is the same user authentication tag as a user and/or an SIM card corresponding to the target user authentication tag.
4. The method of claim 2, wherein before the sending the terminal information of the user terminal to an authentication service platform, the method further comprises:
judging whether the user performs the target identification code authentication for the first time;
the sending the terminal information of the user terminal to the authentication service platform includes:
and sending the terminal information of the user terminal to the authentication service platform under the condition that the user does not authenticate the target identification code for the first time so that the authentication service platform authenticates the terminal information.
5. The method of claim 4, wherein the determining whether the user performs the target identity authentication for the first time comprises:
sending target identity information of a user and/or an SIM card corresponding to the user terminal to the authentication service platform, wherein the authentication service platform stores a result of successful authentication of the target identification codes corresponding to a plurality of users and/or SIM cards, and is used for inquiring whether a result of successful authentication of the target identification codes corresponding to the target identity information exists or not and generating an inquiry result;
receiving the query result sent by the authentication service platform;
determining that the user does not perform the target identification code authentication for the first time under the condition that the query result is that the authentication service platform has a result that the target identification code corresponding to the target identity information is successfully authenticated;
and determining that the user performs the target identification code authentication for the first time under the condition that the query result is that the authentication service platform does not have the result of successful target identification code authentication corresponding to the target identity information.
6. The method of any one of claims 1 to 5, wherein the target identification code comprises a personal identification number of a SIM card.
7. The method of claim 6, wherein the obtaining the target identification code input by the user and authenticating the target identification code comprises:
sending request information for acquiring a personal identification code of a SIM card used by the user terminal to an operator;
receiving the personal identification code sent by the operator;
comparing the personal identification code input by the user with the personal identification code sent by the operator;
determining that the personal identification password authentication is successful in a case where the personal identification password input by the user matches the personal identification password transmitted by the operator.
8. The method of claim 1, wherein the user terminal comprises a 5G messaging application and a Software Development Kit (SDK) integrated with the 5G messaging application;
the SDK acquires the target identification code input by the user and authenticates the target identification code under the condition of receiving the identity authentication request forwarded by the 5G message application program;
and under the condition that the target identification code is successfully authenticated, the SDK sends a result that the target identification code is successfully authenticated to the 5G message application program, so that the 5G message application program sends the result that the target identification code is successfully authenticated to the payment platform.
9. The method of claim 8, wherein prior to said obtaining the user-entered object identification code, the method further comprises:
the SDK sends the terminal information of the user terminal to an authentication service platform, and the authentication service platform is used for authenticating the terminal information;
the SDK receives an authentication result of the terminal information fed back by the authentication service platform;
under the condition that the terminal information authentication is successful, the SDK sends a result of the successful terminal information authentication to the 5G message application program so that the 5G message application program sends the result of the successful terminal information authentication to the payment platform, and the payment platform is used for responding to the result of the successful terminal information authentication to process the application request;
and under the condition that the terminal information authentication fails, the SDK executes the step of acquiring the target identification code input by the user and authenticating the target identification code.
10. The method of claim 9, wherein the SDK sends the terminal information of the user terminal to an authentication service platform, comprising:
the SDK encrypts terminal information of the user terminal to generate a target user authentication label;
the SDK sends the target user authentication tag to an authentication service platform, the authentication service platform stores a plurality of user authentication tags, the authentication service platform is used for comparing terminal information in the target user authentication tag with terminal information in a first user authentication tag, and generating an authentication result of the terminal information in the target user authentication tag, and the first user authentication tag is the same user authentication tag as a user and/or an SIM card corresponding to the target user authentication tag.
11. The method of claim 9, wherein before the SDK sends the terminal information of the user terminal to an authentication service platform, the method further comprises:
the SDK judges whether the user performs the target identification code authentication for the first time;
under the condition that the user does not authenticate the target identification code for the first time, the SDK sends terminal information of the user terminal to an authentication service platform so that the authentication service platform authenticates the terminal information;
and under the condition that the target identification code authentication is not performed for the first time by the user, the SDK acquires the target identification code input by the user, authenticates the target identification code, and when the target identification code authentication is successful, the SDK sends the result of successful target identification code authentication to the authentication service platform.
12. A5G message payment authentication method is applied to an authentication service platform, and comprises the following steps:
receiving terminal information of the user terminal sent by the user terminal;
authenticating the terminal information to generate an authentication result of the terminal information;
feeding back the authentication result of the terminal information to the user terminal;
the user terminal is used for sending a result of successful terminal information authentication to a payment platform under the condition that the terminal information authentication is successful; under the condition that the terminal information authentication fails, acquiring a target identification code input by a user, authenticating the target identification code, and sending a result of successful target identification code authentication to the payment platform when the target identification code authentication is successful;
and the payment platform is used for responding to the result of successful authentication of the terminal information or the result of successful authentication of the target identification code to process the application request related to 5G message payment.
13. The method of claim 12, wherein the receiving the terminal information of the ue comprises:
receiving a target user authentication tag sent by the user terminal, wherein the target user authentication tag carries encrypted terminal information of the user terminal;
the authentication service platform stores a plurality of user authentication tags, authenticates the terminal information, and generates an authentication result of the terminal information, including:
decrypting the target user authentication tag and a first user authentication tag, wherein the first user authentication tag is the same user authentication tag as a user and/or SIM card corresponding to the target user authentication tag;
and comparing the terminal information in the target user authentication tag with the terminal information in the first user authentication tag, and generating an authentication result of the terminal information in the target user authentication tag.
14. The method according to claim 12, wherein said receiving the terminal information of the user terminal sent by the user terminal comprises:
receiving terminal information of the user terminal sent by the user terminal under the condition that the user does not authenticate the target identification code for the first time;
the method further comprises the following steps:
and receiving and storing a result of successful target identification code authentication sent by the user terminal under the condition that the user performs the target identification code authentication for the first time.
15. The method according to claim 14, wherein the authentication service platform stores the results of successful authentication of the target identification codes corresponding to a plurality of users and/or SIM cards;
the method further comprises the following steps:
receiving first request information sent by the user terminal, wherein the first request information carries target identity information of a user and/or an SIM card corresponding to the user terminal, and the first request information is used for indicating whether a result of successful target identification code authentication corresponding to the target identity information exists in inquiry;
responding to the first request information, inquiring whether a result of successful target identification code authentication corresponding to the target identity information exists in the results of successful target identification code authentication corresponding to a plurality of users and/or SIM cards, and generating an inquiry result;
and sending the query result to the user terminal so that the user terminal judges whether the user performs the target identification code authentication for the first time according to the query result.
16. The method according to claim 12, wherein after the authenticating the terminal information and generating the authentication result of the terminal information, the method further comprises:
under the condition that the authentication of the terminal information fails, storing the terminal information which fails in authentication;
receiving a result of successful authentication of the target identification code sent by the user terminal and terminal information of the user terminal when the target identification code is successfully authenticated;
and updating the terminal information which fails in authentication based on the terminal information of the user terminal when the target identification code authentication is successful.
17. The method of claim 12, wherein the user terminal comprises a 5G messaging application and a Software Development Kit (SDK) integrated with the 5G messaging application;
the receiving terminal information of the user terminal sent by the user terminal includes:
receiving terminal information of the user terminal sent by the SDK;
the feeding back the authentication result of the terminal information to the user terminal includes:
feeding back the authentication result of the terminal information to the SDK;
the SDK is used for sending a result of successful terminal information authentication to the 5G message application program under the condition that the terminal information authentication is successful, so that the 5G message application program sends the result of successful terminal information authentication to the payment platform; the SDK is used for acquiring a target identification code input by a user under the condition that the terminal information authentication fails, authenticating the target identification code, and sending a result of successful target identification code authentication to the payment platform when the target identification code authentication is successful.
18. The method as claimed in claim 17, wherein the receiving the terminal information of the ue sent by the SDK comprises:
receiving a target user authentication tag sent by the SDK, wherein the target user authentication tag carries encrypted terminal information of the user terminal;
the feeding back the authentication result of the terminal information to the SDK includes:
and feeding back the authentication result of the terminal information in the target user authentication label to the SDK.
19. The method as claimed in claim 17, wherein the receiving the terminal information of the ue sent by the SDK comprises:
receiving terminal information of the user terminal sent by the SDK under the condition that the user does not perform the target identification code authentication for the first time;
the method further comprises the following steps:
and receiving and storing a result of successful target identification code authentication sent by the SDK under the condition that the user does not perform the target identification code authentication for the first time.
20. A5G message payment authentication method is applied to a payment platform and comprises the following steps:
receiving an application request which is sent by a user terminal and is related to 5G message payment;
responding to the application request, and sending an identity authentication request to the user terminal, wherein the identity authentication request is used for indicating authentication of a target identification code input by a user;
and processing the application request under the condition of receiving a result of successful authentication of the target identification code sent by the user terminal.
21. The method of claim 20, further comprising:
receiving a result of successful authentication of the terminal information of the user terminal sent by the user terminal;
and responding to the result of successful authentication of the terminal information, and processing the application request.
22. The method of claim 21, wherein the user terminal comprises a 5G messaging application and a Software Development Kit (SDK) integrated with the 5G messaging application; the payment platform is in communication connection with the 5G message application program, the application request and the result of successful authentication of the target identification code are sent to the payment platform through the 5G message application program, the identity authentication request is sent to the 5G message application program, and the 5G message application program is used for forwarding the identity authentication request to the SDK.
23. The method according to claim 22, wherein the receiving the result of successful authentication of the terminal information of the user terminal sent by the user terminal comprises:
and receiving a result of successful authentication of the terminal information of the user terminal sent by the 5G message application program.
24. A user terminal, comprising:
the first sending module is used for sending an application request related to 5G message payment to the payment platform based on the 5G message;
the first authentication module is used for acquiring a target identification code input by a user and authenticating the target identification code under the condition of receiving an identity authentication request fed back by the payment platform in response to the application request;
the first sending module is further configured to send a result of successful target identifier authentication to the payment platform under the condition that the target identifier authentication is successful, so that the payment platform processes the application request in response to the result of successful target identifier authentication.
25. An authentication service platform, comprising:
the first receiving module is used for receiving terminal information of the user terminal sent by the user terminal;
the second authentication module is used for authenticating the terminal information and generating an authentication result of the terminal information;
the second sending module is used for feeding back the authentication result of the terminal information to the user terminal;
the user terminal is used for sending a result of successful terminal information authentication to a payment platform under the condition that the terminal information authentication is successful; under the condition that the terminal information authentication fails, acquiring a target identification code input by a user, authenticating the target identification code, and sending a result of successful authentication of the target identification code to the payment platform when the target identification code is successfully authenticated;
and the payment platform is used for responding to the result of successful authentication of the terminal information or the result of successful authentication of the target identification code to process the application request related to 5G message payment.
26. A payment platform, comprising:
the second receiving module is used for receiving an application request which is sent by the user terminal and is related to 5G message payment;
a third sending module, configured to send, in response to the application request, an identity authentication request to the user terminal, where the identity authentication request is used to indicate that a target identification code input by a user is to be authenticated;
and the processing module is used for processing the application request under the condition of receiving the result of successful authentication of the target identification code sent by the user terminal.
27. A user terminal, comprising: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements a 5G message payment authentication method as claimed in any one of claims 1 to 11.
28. An authentication service platform, comprising: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements a 5G message payment authentication method as claimed in any one of claims 12 to 19.
29. A payment platform, comprising: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements a 5G message payment authentication method as claimed in any one of claims 20 to 23.
30. A 5G message payment authentication system comprising a user terminal as claimed in claim 27, an authentication service platform as claimed in claim 28 and a payment platform as claimed in claim 29.
31. A computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement a 5G message payment authentication method as claimed in any one of claims 1 to 23.
32. A computer program product stored in a non-volatile storage medium, the computer program product, when executed by at least one processor, implementing a 5G message payment authentication method as claimed in any one of claims 1 to 23.
CN202210945561.3A 2022-08-08 2022-08-08 5G message payment authentication method, terminal, platform, system, medium and product Pending CN115392903A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210945561.3A CN115392903A (en) 2022-08-08 2022-08-08 5G message payment authentication method, terminal, platform, system, medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210945561.3A CN115392903A (en) 2022-08-08 2022-08-08 5G message payment authentication method, terminal, platform, system, medium and product

Publications (1)

Publication Number Publication Date
CN115392903A true CN115392903A (en) 2022-11-25

Family

ID=84118866

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210945561.3A Pending CN115392903A (en) 2022-08-08 2022-08-08 5G message payment authentication method, terminal, platform, system, medium and product

Country Status (1)

Country Link
CN (1) CN115392903A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117395664A (en) * 2023-11-15 2024-01-12 中移互联网有限公司 Association relation establishing method, system, device, electronic equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117395664A (en) * 2023-11-15 2024-01-12 中移互联网有限公司 Association relation establishing method, system, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US11170091B2 (en) Method and apparatus for providing and obtaining secure identity information
KR102364874B1 (en) Method and apparatus for facilitating electronic payments using a wearable device
CN109003081B (en) Transaction method, system and storage medium based on block chain
US9864983B2 (en) Payment method, payment server performing the same and payment system performing the same
CN111861451B (en) Offline transaction method, client device and POS machine
US10796302B2 (en) Securely storing and using sensitive information for making payments using a wallet application
CN104618116B (en) A kind of cooperative digital signature system and its method
KR100937702B1 (en) System and method for providing virtual discernment information
CN110290134B (en) Identity authentication method, identity authentication device, storage medium and processor
JP2015510640A (en) Transaction processing system and method
CN106548338B (en) Method and system for transferring resource numerical value
WO2019033840A1 (en) Password authentication method for shared device, shared device, cloud server, and system
EP2690589A1 (en) Method and system for security information interaction based on internet
CN104751334A (en) Service processing method, device and system
CN102694780A (en) Digital signature authentication method, payment method containing the same and payment system
CN113015992B (en) Cloud token provisioning of multiple tokens
CN103281187A (en) Security authentication method, equipment and system
CN115392903A (en) 5G message payment authentication method, terminal, platform, system, medium and product
CN113190724A (en) User bank information query method, mobile terminal and server
US20160342809A1 (en) System and method of authentication of a first party respective of a second party aided by a third party
US10990982B2 (en) Authenticating a payment card
CN111539732B (en) Biometric payment method, device, gateway equipment and storage medium
CN114553432B (en) Identity authentication method, device, equipment and computer readable storage medium
KR20200041631A (en) Apparatus and method for providing a simple settlement service of a corporation account
CN115344848A (en) Identification obtaining method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination