CN116260908A - Virtual number verification method, system, electronic device and storage medium - Google Patents

Virtual number verification method, system, electronic device and storage medium Download PDF

Info

Publication number
CN116260908A
CN116260908A CN202310252162.3A CN202310252162A CN116260908A CN 116260908 A CN116260908 A CN 116260908A CN 202310252162 A CN202310252162 A CN 202310252162A CN 116260908 A CN116260908 A CN 116260908A
Authority
CN
China
Prior art keywords
virtual number
virtual
verification
user
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310252162.3A
Other languages
Chinese (zh)
Inventor
谭波波
裴宇鹏
金心
程利勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Information Technology Co Ltd
Original Assignee
Jingdong Technology Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Information Technology Co Ltd filed Critical Jingdong Technology Information Technology Co Ltd
Priority to CN202310252162.3A priority Critical patent/CN116260908A/en
Publication of CN116260908A publication Critical patent/CN116260908A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0832Special goods or special handling procedures, e.g. handling of hazardous or fragile goods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure provides a virtual number verification method, a virtual number verification system, electronic equipment and a computer readable storage medium, and relates to the technical field of communication, wherein the virtual number verification method comprises the following steps: the express post station receives the virtual number sent by the logistics platform gateway and the verification bit number of the user mobile phone number input by the user, and when the verification bit number of the user mobile phone number is consistent with the verification bit number of the virtual number, the corresponding logistics information is determined through the virtual number in a high-efficiency mode; according to the embodiment of the disclosure, under the condition that the verification bit number of the mobile phone number of the user is consistent with the verification bit number of the virtual number, the privacy of the user can be protected through the virtual number, the corresponding logistics information can be determined and the package position can be retrieved efficiently.

Description

Virtual number verification method, system, electronic device and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a virtual number verification method, a virtual number verification system, an electronic device, and a computer readable storage medium.
Background
In a logistics distribution scene, in order to realize the protection of personal mobile phone number privacy information of a receiver, a virtual mobile phone number is generally used for replacing a real mobile phone number of the receiver in an express bill; when the courier sends the package, dialing a virtual mobile phone number, and switching to the real mobile phone number of the user according to the binding relation between the virtual mobile phone number and the real mobile phone number of the receiver so as to establish a voice call; after the dispatch is finished, the virtual mobile phone number is unbinding and released, and can be provided for other consignees; if the receiver lets the courier store the express package in a designated express post; when a consignee inquires packages, an express post manager can ask a client to speak the mobile phone number verification position number for inquiring, because the virtual mobile phone number is randomly allocated, the consignee does not know the virtual number, and does not know that the express uses the virtual mobile phone number for dispatching, and the manager cannot efficiently retrieve the package position according to the real mobile phone number verification position number of the consignee.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the present disclosure and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure provides a virtual number verification method, a virtual number verification system, an electronic device, and a computer readable storage medium, which at least overcome the problem of low express retrieval efficiency in the related art to a certain extent.
Other features and advantages of the present disclosure will be apparent from the following detailed description, or may be learned in part by the practice of the disclosure.
According to one aspect of the present disclosure, there is provided a virtual number verification method applied to an express post, including: receiving a virtual number sent by a gateway of a logistics platform; receiving an authentication number input by a user, wherein the authentication number is an authentication bit number of a mobile phone number of the user; and when the verification digits are consistent with the verification digits of the virtual number, determining corresponding logistics information through the virtual number.
According to another aspect of the present disclosure, there is also provided a virtual number verification method applied to a virtual number platform, including: determining a target virtual number according to the verification number of the user, wherein the verification bit number of the target virtual number is consistent with the verification number; determining an extension number corresponding to the target virtual number according to the target virtual number; binding the virtual number with the mobile phone number of the user and sending the virtual number to an express post, wherein the virtual number comprises the target virtual number and the extension number.
In one embodiment of the disclosure, the determining the target virtual number according to the verification number of the user includes: according to the verification digits of the user, matching a verification bit available queue, wherein the verification bit available queue comprises one or more virtual numbers, and the verification bit digits of the virtual numbers are consistent with the verification digits; and selecting one target virtual number from the verification bit available queue based on a random algorithm.
In one embodiment of the disclosure, the determining the target virtual number according to the verification number of the user includes: acquiring the bound number corresponding to the target virtual number, wherein the bound number is the number of mobile phone numbers of the bound user of the target virtual number; and when the bound number exceeds the binding upper limit, the target virtual number is moved to a verification bit unavailable queue, and the target virtual number is reselected.
In one embodiment of the disclosure, determining, according to the target virtual number, an extension number corresponding to the target virtual number includes: judging whether an available extension number queue corresponding to the target virtual number is empty or not; if yes, the target virtual number is redetermined; otherwise, selecting the extension from the available extension queues and moving the extension to an unavailable extension queue.
In one embodiment of the present disclosure, the binding the virtual number with the user mobile phone number and sending the virtual number to the courier station includes: binding the virtual number with the mobile phone number of the user through a binding protocol interface to generate a binding relation; and storing the binding relation into a cache server.
In one embodiment of the present disclosure, further comprising: performing authority authentication on the received authentication information, wherein the authentication information comprises the following parameters: user phone number, digital signature, expiration time or access key; and when the authentication information passes the authority authentication, carrying out compliance verification on parameters in the authentication information.
According to another aspect of the present disclosure, there is also provided a virtual number verification method applied to a gateway of a logistics platform, including: receiving authentication information provided by a virtual number platform; when the authentication information is successfully authenticated by the virtual number platform, calling the virtual number platform to acquire a virtual number; calling a binding protocol interface provided by the virtual number platform to bind the mobile phone number of the user with the virtual number; and generating a logistics list number based on the virtual number and sending the logistics list number to an express post.
According to another aspect of the present disclosure, there is also provided a virtual number verification system including: express post, logistics platform gateway and virtual number platform;
the express post station verifies whether the verification bit number of the mobile phone number of the user is consistent with the verification bit number of the virtual number, if so, the corresponding logistics information is determined through the virtual number;
the logistics platform gateway calls the virtual number platform to acquire a virtual number when the virtual number platform successfully authenticates the authentication information, generates a logistics list number based on the virtual number and sends the logistics list number to the express post;
and the virtual number platform sends the virtual number consistent with the verification digit of the mobile phone number of the user to the express post.
In another aspect, there is also provided an electronic device including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform any of the virtual number verification methods described above via execution of the executable instructions.
According to another aspect of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the virtual number verification method of any one of the above.
According to the virtual number verification method, the system, the electronic equipment and the computer readable storage medium, the express post station receives the virtual number sent by the logistics platform gateway and verification bit digits of the user mobile phone number input by the user, when the verification bit digits of the user mobile phone number are consistent with the verification bit digits of the virtual number, the user privacy can be protected through the virtual number, corresponding logistics information can be determined efficiently, and the package position can be retrieved efficiently.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
Fig. 1 shows a flow chart of a virtual number verification method in an embodiment of the disclosure;
FIG. 2 illustrates a flow chart of yet another virtual number verification method in an embodiment of the present disclosure;
FIG. 3 is a flow chart illustrating a method of virtual number verification for use with a virtual number platform in accordance with an embodiment of the present disclosure;
fig. 4 shows a flowchart of a virtual number verification method applied to a gateway of a logistics platform in an embodiment of the disclosure;
FIG. 5 illustrates a virtual number platform schematic diagram in an embodiment of the present disclosure;
fig. 6 is a schematic diagram of a virtual number binding apparatus according to an embodiment of the disclosure;
fig. 7 is a schematic diagram of a virtual number verification system according to an embodiment of the present disclosure;
fig. 8 shows a schematic diagram of an exemplary system architecture of a virtual number verification method or virtual number verification apparatus that may be applied to embodiments of the present disclosure; and
fig. 9 shows a block diagram of an electronic device in an embodiment of the disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
The present exemplary embodiment will be described in detail below with reference to the accompanying drawings and examples.
First, in the embodiments of the present disclosure, a virtual number verification method is provided, which may be executed by any electronic device having computing processing capability.
Fig. 1 shows a flowchart of a virtual number verification method in an embodiment of the present disclosure, and as shown in fig. 1, the virtual number verification method provided in the embodiment of the present disclosure is applied to an express post, and includes the following steps:
s102, receiving the virtual number sent by the gateway of the logistics platform.
The virtual number is a special mobile phone number provided by an operator, and service personnel and users can only see the virtual number between themselves, so that the requirement of hiding the real number is met, and the number privacy of both parties is protected.
S104, receiving the verification number input by the user.
The verification number is a verification bit number of the mobile phone number of the user, and the verification bit can be set according to the user requirement.
In one embodiment, the verification bits may be one or more bits, for example, the last bit of the user's handset number may be set as the verification bit, or the last four bits of the user's handset number may be set as the verification bit, without limitation.
In one embodiment, the verification bits may be discontinuous, for example, the last three bits of the user's handset number may be set as verification bits, and the eighth and tenth bits of the user's handset number may be set as verification bits, without limitation.
And S106, when the verification digits are consistent with the verification digits of the virtual number, determining corresponding logistics information through the virtual number.
The verification bit of the virtual number is consistent with the verification bit of the mobile phone number of the user, for example, the verification bit is the last four digits of the mobile phone number of the user, whether the last four digits of the mobile phone number of the user are consistent with the last four digits of the virtual number is judged, if yes, the virtual number is obtained, and express logistics information of replacing the mobile phone number of the user with the virtual number is found.
In one embodiment, the logistic information includes, but is not limited to: whether the package arrives at a station, the express delivery point where the package is located, the cabinet position where the package is located at the express delivery post station, and the like.
In the above embodiment, the virtual number is input by the courier station manager, the express package is put on shelf, the receiver arrives at the courier station to report the user mobile phone verification position number, when the user mobile phone verification position number is consistent with the virtual number verification position number, the courier station manager searches with the mobile phone APP and other terminal equipment based on the virtual number, and the logistics information and the position of the express package of the receiver can be efficiently searched.
Fig. 2 shows a flowchart of another virtual number verification method in an embodiment of the disclosure, and as shown in fig. 2, the virtual number verification method provided in the embodiment of the disclosure includes the following steps:
s202, receiving a first verification number input by a user;
it should be noted that, the user may input multiple sets of verification numbers, and in the embodiment of the disclosure, two sets of verification numbers are described as examples, that is, the user may input a first verification number and a second verification number; the first verification number may be one or more digits; the second verification number may be one or more digits; the number of bits of the first verification number may be different; for example, the first authentication digits may be the eleventh digits of the user's cell phone number, and the second authentication digits may be the eighth and ninth digits of the user's cell phone number; the order and number of the plurality of groups of verification bits are set according to the needs of clients, and comparison is not limited.
S204, searching corresponding virtual numbers from the logistics gateway platform according to the first verification digits, and generating a virtual number set;
in one embodiment, the number of digits and the number of digits corresponding to the first verification number are obtained, and a virtual number consistent with the number of digits and the number of digits corresponding to the first verification number is searched from the streaming gateway platform according to the number of digits and the number of digits corresponding to the first verification number.
S206, when the virtual number set has a plurality of virtual numbers, receiving a second verification number input by a user;
in one embodiment, the set of virtual numbers is empty, i.e., no corresponding virtual number is queried, indicating that there is no logistic information corresponding to the user.
In one embodiment, when only one virtual number exists in the virtual number set, that is, the virtual number is a target virtual number, corresponding logistics information is directly obtained according to the target virtual number.
S208, obtaining a target virtual number corresponding to the second verification number from the virtual number set, and determining logistics information according to the target virtual number.
For example, the first verification number is the eleventh bit of the mobile phone number of the user, and corresponds to the number 1; obtaining a virtual number with an eleventh bit of 1 according to the first verification number and storing the virtual number into a virtual number set; if the virtual number set has a plurality of virtual numbers, acquiring second verification digits, wherein the second verification digits are the eighth digits and the ninth digits of the mobile phone number of the user, namely 22; and obtaining the virtual numbers with the digits of the eighth bit and the ninth bit being 22 from the virtual number set according to the digits of the second verification bit, if the only virtual number can be determined, the virtual number is a target virtual number, and determining the logistics information according to the target virtual number.
In the above embodiment, the administrator of the express post enters the virtual number, the express package is put on shelf, the receiver arrives at the express post to report the first verification number in sequence, whether the package of the user exists or not can be rapidly determined, the logistics information can be obtained when the package corresponds to one virtual number, the target virtual number is determined through the second verification number when the package corresponds to a plurality of virtual numbers, the post administrator searches with terminal equipment such as mobile phone APP based on the virtual numbers, and the logistics information and the position of the express package of the receiver can be efficiently searched.
Fig. 3 shows a flowchart of a virtual number verification method applied to a virtual number platform in an embodiment of the disclosure, and as shown in fig. 3, the virtual number verification method applied to the virtual number platform provided in the embodiment of the disclosure includes the following steps:
s302, determining a target virtual number according to the verification number of the user, wherein the verification bit number of the target virtual number is consistent with the verification number.
In one embodiment, the privacy number platform opens account rights, authentication information is provided for a logistics platform to be accessed, a subsequent logistics platform calls the privacy number platform to carry out rights authentication on the received authentication information, the identity of a sender sending a request is checked, and illegal calling is prevented; and when the authentication information passes the authority authentication, carrying out compliance verification on the parameters in the authentication information, and ensuring the compliance of the parameters.
In one embodiment, the authentication information includes, but is not limited to, the following parameters: a user handset number, a digital signature, an expiration time, or an access key.
The Access Key is Access Key Id/Secret Access Key, AK: access Key Id, is used for marking users; SK: secret Access Key, which is a key used by the user to encrypt the authentication string and to verify the authentication string, where SK must be kept secret; the sender identity of a request is verified by means of encryption using the Access Key Id/Secret Access Key.
The expiration time is the time when the binding relationship exists after the mobile phone number of a certain user and the privacy number are bound, and the privacy number can be dialed to enter an extension number to contact the mobile phone number of the bound user within the expiration time range.
A digital signature is a digital string that cannot be forged by others only the sender of the information, and is also a valid proof of the authenticity of the information sent by the sender of the information.
In one embodiment, according to the verification number of the user, matching a verification bit available queue, wherein the verification bit available queue comprises one or more virtual numbers, and the verification bit number of the virtual number is consistent with the verification number; and quickly selecting a target virtual number from the verification bit available queue based on a random algorithm, so that corresponding package information can be searched through verification bit digits of the mobile phone number of the user.
In one embodiment, the cache server stores one or more available queues of verification bits, matches the corresponding available queues of verification bits according to the verification number of the user, for example, the verification number of the user is 0000, matches the available queues of verification bits with the verification bit number of 0000, the available queues of verification bits comprise one or more virtual numbers with the verification bit number of 0000, selects a target virtual number from the available queues of verification bits with the verification bit number of 0000 based on a random algorithm, and ensures that the verification bit number of the target virtual number is identical to the verification bit number of the mobile phone number of the user.
In one embodiment, the bound number corresponding to the target virtual number is obtained, when the bound number exceeds the binding upper limit, the target virtual number is moved to the verification bit unavailable queue, the target virtual number is reselected, a certain number of user mobile phone numbers are bound to each virtual number, and the number resources of the virtual numbers are guaranteed to be reasonably utilized.
The number of the bound mobile phone numbers is the number of the mobile phone numbers of the user with the bound target virtual numbers; in one embodiment, the binding upper limit of each target virtual number may be set according to user needs and system resources, and the binding upper limits of different target virtual numbers may be different.
In one embodiment, a plurality of virtual numbers to be selected are obtained according to the verification number of the user, wherein the verification bit number of the virtual number to be selected is consistent with the verification number of the user, the bound number of the virtual number to be selected is obtained respectively, whether the virtual number to be selected corresponding to the minimum bound number is unique or not is judged, and if so, the virtual number to be selected corresponding to the minimum bound number is determined to be the target virtual number; otherwise, randomly selecting a virtual number to be selected corresponding to the minimum bound number as a target virtual number.
In one embodiment, the binding upper limit corresponding to the target virtual number may be the same as the number of extensions corresponding to the target virtual number, so as to ensure that each user mobile phone number can be normally used.
In one embodiment, the bound number exceeds the binding upper limit, characterizing the resource shortage of the target virtual number, reassigning other target virtual numbers, and moving the target virtual number to the validation bit unavailable queue.
S304, determining the extension number corresponding to the target virtual number according to the target virtual number.
In one embodiment, the available extension queue corresponding to the target virtual number is not empty, or the bound number of the target virtual number is less than or equal to the binding upper limit, and one extension may be selected from the available extension queue.
In one embodiment, whether an available extension number queue corresponding to the target virtual number is empty is determined; if yes, characterizing that the extension number under the target virtual number is distributed, and re-determining the target virtual number; otherwise, selecting the extension number from the available extension number queue, and moving the extension number to the unavailable extension number queue, and saving the number resource by obtaining the extension number corresponding to the target virtual number.
In one embodiment, a plurality of virtual numbers to be selected are obtained according to the verification number of the user, wherein the verification bit number of the virtual number to be selected is consistent with the verification number of the user, the available extension number queues of the virtual numbers to be selected are respectively obtained, the number of extensions in the available extension number queues of the virtual numbers to be selected is obtained, whether the virtual number to be selected corresponding to the maximum number of extensions is unique or not is judged, and if yes, the virtual number to be selected corresponding to the maximum number of extensions is determined to be a target virtual number; otherwise, selecting a virtual number to be selected corresponding to the maximum number of extension numbers as a target virtual number.
In one embodiment, the extensions may be selected randomly or sequentially, without limitation.
S306, binding the virtual number with the mobile phone number of the user and sending the virtual number to the express post, wherein the virtual number comprises a target virtual number and an extension number.
In one embodiment, binding the virtual number and the mobile phone number of the user through a binding protocol interface to generate a binding relationship; the binding relation is stored in a cache server, the binding relation is stored in the server, and a user can quickly call the user mobile phone number and the virtual number.
In the above embodiment, a virtual number binding protocol interface is provided, the binding service of the virtual number is provided by an intelligent matching algorithm depending on the capability of the virtual number provided by an operator, the virtual number consistent with the verification digit of the user mobile phone number is sent to the express post, and when the express post performs express retrieval through the verification digit of the receiver user mobile phone number, the privacy of the customer can be protected, and the position information of the receiver package can be correctly retrieved.
Fig. 4 shows a flowchart of a virtual number verification method applied to a gateway of a logistics platform in an embodiment of the present disclosure, as shown in fig. 4, the virtual number verification method provided in the embodiment of the present disclosure is applied to the gateway of the logistics platform, and includes the following steps:
s402, receiving authentication information provided by the virtual number platform.
In one embodiment, the authentication information includes, but is not limited to: authentication information includes, but is not limited to, the following parameters: user phone number, digital signature, expiration time or access key, etc.
S404, when the authentication information is successfully authenticated by the virtual number platform, calling the virtual number platform to acquire a virtual number;
s406, calling a binding protocol interface provided by the virtual number platform to bind the mobile phone number of the user with the virtual number;
s408, generating a logistics list number based on the virtual number and sending the logistics list number to the express post.
In one embodiment, based on the mobile phone number of the user, a third-party virtual number platform http protocol is called to obtain the virtual number, so that the binding of the mobile phone number of the real user of the receiver and the virtual number is realized, the virtual number is used in the express delivery face list, the privacy of the receiver is protected, and the express delivery can be accurately retrieved.
In the above embodiment, when the authentication information is successfully authenticated by the virtual number platform, the virtual number platform is called to obtain the virtual number, so that the binding of the real mobile phone number and the virtual number of the receiver is realized, the virtual mobile phone number is used in the express delivery bill, and the logistic bill number is generated based on the virtual number and sent to the express delivery post, thereby protecting the privacy of the receiver and accurately retrieving the express delivery.
Fig. 5 is a schematic diagram of a virtual number platform according to an embodiment of the present disclosure, in which four bits after the tail number are used as verification bits, the verification bits are not limited thereto, and as shown in fig. 5, the virtual number platform 5 includes: a binding relation cache server 501, a binding core algorithm module 502 and a queue cache server 503;
The queue cache server 503 stores the last four-digit tail number available queue, the last four-digit tail number unavailable queue, the privacy number available extension number queue, the privacy number unavailable extension number queue, and the like.
The queue cache server 503 divides the virtual number into at most 104 rear four-bit tail number queues according to the number of 4 bits of the tail numbers of the virtual numbers, at least four rear four different virtual numbers of the 104 tail numbers are needed, and when the virtual numbers enter a library, all rear four same virtual numbers of the tail numbers are distributed into one queue.
The binding relationship is stored in the cluster device of the binding relationship cache server 501, and the binding relationship includes, but is not limited to: binding identification, binding success identification, acquisition time, user mobile phone number, virtual number and the like;
the binding core algorithm module 502 realizes that the last four digits of the allocated virtual number are identical with the last four digits of the real user mobile phone number of the receiver through an intelligent matching algorithm in the process of binding the receiver mobile phone number and the virtual number.
In the above embodiment, through the intelligent matching algorithm, the four positions after the allocated virtual number are the same as the four positions after the real user mobile phone number of the receiver, and the post manager uses the mobile phone APP and other terminal equipment to search based on the virtual number, so that the problem that the logistics information and the position of the express package of the receiver cannot be found according to the verification number digits of the user mobile phone number of the receiver is solved.
Based on the same inventive concept, the embodiments of the present disclosure also provide a virtual number binding apparatus, as described in the following embodiments. Since the principle of solving the problem of the embodiment of the device is similar to that of the embodiment of the method, the implementation of the embodiment of the device can be referred to the implementation of the embodiment of the method, and the repetition is omitted.
Fig. 6 shows a schematic diagram of a virtual number binding apparatus according to an embodiment of the present disclosure, where four digits after the tail number are used as verification bits, and the verification bits are not limited thereto, and as shown in fig. 6, the virtual number binding apparatus includes: the system comprises a logistics platform gateway 601, a third-party privacy number platform gateway layer 602, a third-party privacy number platform service layer 603, a third-party privacy number platform service layer 604, a last four-digit tail number available queue 605, a last four-digit tail number unavailable queue 606, a privacy number available extension number queue 607, a privacy number unavailable extension number queue 608 and a binding relation cache server 609;
the logistics platform gateway 601 remotely invokes an http service of a binding interface module of the third party privacy number platform gateway layer 602, obtains four identical operator virtual numbers X after the assigned tail number and four identical operator virtual numbers X after the real mobile phone number of the receiver, and specifically includes:
The third party privacy number platform opens account rights, AK/SK authentication information is provided for the logistics platform gateway 601 to be accessed, the follow-up logistics platform gateway 601 requests to call a binding interface module of the third party privacy number platform gateway layer 602, the binding interface is access key AK/SK of the access information, digital signature sign, phone A1 of a user mobile phone and expiration time, the third party privacy number platform gateway performs AK/SK sign rights verification, verification passes release, and rights authentication is performed on the AK/SK information to prevent illegal call.
After receiving the request of the user, the cloud host generates an authentication character string by using the same SK corresponding to the AK and the same authentication mechanism, and compares the authentication character string with the authentication character string contained in the request of the user; if the authentication character strings are the same, the system considers that the user has the designated operation authority and executes the related operation; if the authentication string is different, the system will ignore the operation and return an error code.
And after release, the request enters a PNO preprocessing service interface of a third-party privacy number platform service layer 603 to perform compliance verification of parameters.
The PNC binding relationship service module in the third party privacy number platform service layer 604 intercepts the last four digits of the user phone number according to the phone A1 of the participating user phone number, and selects a virtual number xn from the last four digits tail number available queue 605 using a random algorithm.
The PNC binding relationship service module compares the number of bound virtual numbers xn with the binding upper limit, if the binding upper limit is exceeded, then the current virtual number xn is moved into the last four tail number unavailable queue 606, and the number selection steps described above are repeated.
The PNC binding service module then obtains a virtual extension en from the privacy number available extension queue 607 according to the virtual number xn.
The PNC binding relation service module checks the virtual extension number en, if the virtual extension number en is empty, the virtual extension number en indicates that the extension number under the current virtual number has been allocated, and the number selecting step is repeated; if virtual extension en is not empty, virtual extension en is moved into privacy unavailable extension queue 608.
The virtual number is successfully allocated, the binding relation is stored in binding relation cache server 609, and the binding relation is returned to the virtual number already bound by the logistics platform gateway 601, and the last four digits of the virtual number are the same as the last four digits of the real mobile phone number of the receiver.
In the above embodiment, through the intelligent matching algorithm, the four positions after the allocated virtual number are the same as the four positions after the real user mobile phone number of the receiver, and the post manager can search by using mobile phone APP and other terminal equipment based on the virtual number, so that the package position can be efficiently searched according to the real mobile phone number verification position number of the receiver.
Based on the same inventive concept, the embodiments of the present disclosure also provide a virtual number verification system, as described in the following embodiments. Since the principle of solving the problem of the system embodiment is similar to that of the method embodiment, the implementation of the system embodiment can be referred to the implementation of the method embodiment, and the repetition is omitted.
Fig. 7 is a schematic diagram of a virtual number verification system according to an embodiment of the disclosure, and as shown in fig. 7, the virtual number verification system 7 includes: express post 701, logistics platform gateway 702 and virtual number platform 703;
express post 701, express delivery personnel contact the receiver, and put the express into the express post 701, and post manager inputs virtual number to realize the putting of express package; the consignee arrives at the express post 701 and reports the verification position number of the mobile phone of the user, when the verification position number of the mobile phone number of the user is consistent with the verification position number of the virtual number, post manager searches the express package position of the consignee by using terminal equipment based on the virtual number.
Terminal devices include, but are not limited to: smart phones, tablet computers, laptop portable computers, desktop computers, etc.
And when the authentication information is successfully authenticated by the virtual number platform, the logistics platform gateway 702 acquires the virtual number by calling the http protocol of the virtual number platform 703, so that the binding of the real mobile phone number and the virtual number of the receiver is realized, the virtual number is used in the express delivery bill, and the logistics bill number is generated based on the virtual number and is sent to the express delivery post 701, thereby protecting the privacy of the receiver.
The virtual number platform 703 provides a virtual number binding http protocol interface, relies on the capability of the virtual number provided by an operator, provides a virtual number binding service through an intelligent matching algorithm, and sends the virtual number consistent with the verification digit of the user mobile phone number to the express post, for example, the four digits after the assigned virtual number are the same as the four digits after the real user mobile phone number of the receiver.
In the above embodiment, the virtual number is input by the courier station manager, the express package is put on shelf, the receiver arrives at the courier station to report the user mobile phone verification position number, when the user mobile phone verification position number is consistent with the virtual number verification position number, the courier station manager searches with the mobile phone APP and other terminal equipment based on the virtual number, and the logistics information and the position of the express package of the receiver can be efficiently searched.
Fig. 8 shows a schematic diagram of an exemplary system architecture of a virtual number verification method or virtual number verification apparatus that may be applied to embodiments of the present disclosure.
As shown in fig. 8, a system architecture 800 may include terminal devices 801, 802, 803, a network 804, and a server 805.
The network 804 may be a wired network or a wireless network, and is a medium for providing a communication link between the terminal devices 801, 802, 803 and the server 805.
Alternatively, the wireless network or wired network described above uses standard communication techniques and/or protocols. The network is typically the Internet, but may be any network including, but not limited to, a local area network (Local Area Network, LAN), metropolitan area network (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), mobile, wired or wireless network, private network, or any combination of virtual private networks. In some embodiments, data exchanged over a network is represented using techniques and/or formats including HyperText Mark-up Language (HTML), extensible markup Language (Extensible MarkupLanguage, XML), and the like. All or some of the links may also be encrypted using conventional encryption techniques such as secure sockets layer (Secure Socket Layer, SSL), transport layer security (Transport Layer Security, TLS), virtual private network (Virtual Private Network, VPN), internet protocol security (Internet ProtocolSecurity, IPsec), etc. In other embodiments, custom and/or dedicated data communication techniques may also be used in place of or in addition to the data communication techniques described above.
The terminal devices 801, 802, 803 may be a variety of electronic devices including, but not limited to, smartphones, tablet computers, laptop portable computers, desktop computers, etc. that may be used to retrieve package logistics information corresponding to the display virtual numbers.
Alternatively, the clients of the applications installed in the different terminal devices 801, 802, 803 are the same or clients of the same type of application based on different operating systems. The specific form of the application client may also be different based on the different terminal platforms, for example, the application client may be a mobile phone client, a PC client, etc.
The server 805 may be a server providing various services, such as a background management server providing support for devices operated by users using the terminal devices 801, 802, 803. The background management server may analyze and process the received data such as the request, and feed back the processing result to the terminal device, and the server 805 may include a binding relationship cache server, a queue cache server, and the like.
Optionally, the server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), basic cloud computing services such as big data and artificial intelligence platforms, and the like. The terminal may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, etc. The terminal and the server may be directly or indirectly connected through wired or wireless communication, which is not limited herein.
Those skilled in the art will appreciate that the number of terminal devices, networks, and servers in fig. 8 is merely illustrative, and that any number of terminal devices, networks, and servers may be provided as desired. The embodiments of the present disclosure are not limited in this regard.
Those skilled in the art will appreciate that the various aspects of the present disclosure may be implemented as a system, method, or program product. Accordingly, various aspects of the disclosure may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
An electronic device 900 according to such an embodiment of the present disclosure is described below with reference to fig. 9. The electronic device 900 shown in fig. 9 is merely an example and should not be construed to limit the functionality and scope of use of embodiments of the present disclosure in any way.
As shown in fig. 9, the electronic device 900 is embodied in the form of a general purpose computing device. Components of electronic device 900 may include, but are not limited to: the at least one processing unit 910, the at least one storage unit 920, and a bus 930 connecting the different system components (including the storage unit 920 and the processing unit 910).
Wherein the storage unit stores program code that is executable by the processing unit 910 such that the processing unit 910 performs steps according to various exemplary embodiments of the present disclosure described in the above-described "exemplary methods" section of the present specification.
For example, the processing unit 910 may perform the following steps of the method embodiment described above: receiving a virtual number sent by a gateway of a logistics platform; receiving an authentication number input by a user; when the verification digits are consistent with the verification digits of the virtual number, corresponding logistics information is determined through the virtual number.
For example, the processing unit 910 may perform the following steps of the method embodiment described above: receiving authentication information provided by a virtual number platform; when the authentication information is successfully authenticated by the virtual number platform, calling the virtual number platform to acquire a virtual number; calling a binding protocol interface provided by the virtual number platform to bind the mobile phone number of the user with the virtual number; and generating a logistics list number based on the virtual number and sending the logistics list number to the express post.
For example, the processing unit 910 may perform the following steps of the method embodiment described above: the PNC binding relation service module in the third party privacy number platform service layer intercepts the rear four digits of the mobile phone number of the user according to the mobile phone number of the user, and selects a virtual number from the rear four digits of the tail number available queue by using a random algorithm; comparing the bound number of the virtual numbers with the binding upper limit, if the bound upper limit is exceeded, moving the current virtual number into a rear four-bit tail number unavailable queue, and repeating the number selecting step; acquiring a virtual extension number from a random algorithm in an extension number queue of the privacy number according to the virtual number; checking the virtual extension number, if the virtual extension number is empty, indicating that the extension number under the current virtual number is already allocated, and repeating the number selection step; if the virtual extension is not empty, the virtual extension is moved into a privacy number unavailable extension queue.
The storage unit 920 may include readable media in the form of volatile storage units, such as Random Access Memory (RAM) 9201 and/or cache memory 9202, and may further include Read Only Memory (ROM) 9203.
The storage unit 920 may also include a program/utility 9204 having a set (at least one) of program modules 9205, such program modules 9205 include, but are not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
The bus 930 may be one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 900 may also communicate with one or more external devices 940 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 900, and/or any devices (e.g., routers, modems, etc.) that enable the electronic device 900 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 950.
Also, electronic device 900 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 960. As shown, the network adapter 960 communicates with other modules of the electronic device 900 over the bus 930. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 900, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a terminal device, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, a computer-readable storage medium, which may be a readable signal medium or a readable storage medium, is also provided. On which a program product is stored which enables the implementation of the method described above of the present disclosure. In some possible implementations, various aspects of the disclosure may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the disclosure as described in the "exemplary methods" section of this specification, when the program product is run on the terminal device.
For example, a program product in an embodiment of the disclosure, when executed by a processor, performs a method of: the third party privacy number platform opens account rights, AK/SK authentication information is provided for a to-be-accessed logistics platform gateway, a subsequent logistics platform gateway requests to call a binding interface module of a third party privacy number platform gateway layer, the binding interface is access keys of the access information, digital signatures, user mobile phone numbers and expiration time, and the third party privacy number platform gateway performs rights verification and passes the verification; and after passing, the request enters a PNO preprocessing service interface of a third-party privacy number platform service layer to carry out compliance verification of parameters.
For example, a program product in an embodiment of the disclosure, when executed by a processor, performs a method of: the PNC binding relation service module in the third party privacy number platform service layer intercepts the rear four digits of the mobile phone number of the user according to the mobile phone number of the user, and selects a virtual number from the rear four digits of the tail number available queue by using a random algorithm; comparing the bound number of the virtual numbers with the binding upper limit, if the bound upper limit is exceeded, moving the current virtual number into a rear four-bit tail number unavailable queue, and repeating the number selecting step; acquiring a virtual extension number from a random algorithm in an extension number queue of the privacy number according to the virtual number; checking the virtual extension number, if the virtual extension number is empty, indicating that the extension number under the current virtual number is already allocated, and repeating the number selection step; if the virtual extension is not empty, the virtual extension is moved into a privacy number unavailable extension queue.
For example, a program product in an embodiment of the disclosure, when executed by a processor, performs a method of: the virtual number is successfully allocated, the binding relation is stored in the binding relation cache server equipment, and the binding relation is returned to the virtual number already bound by the logistics platform gateway, and the last four digits of the virtual number are the same as the last four digits of the real mobile phone number of the consignee.
More specific examples of the computer readable storage medium in the present disclosure may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In this disclosure, a computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Alternatively, the program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In particular implementations, the program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server.
In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
Furthermore, although the steps of the methods in the present disclosure are depicted in a particular order in the drawings, this does not require or imply that the steps must be performed in that particular order or that all illustrated steps be performed in order to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform, etc.
From the description of the above embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, including several instructions to cause a computing device (may be a personal computer, a server, a mobile terminal, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (11)

1. The virtual number verification method is characterized by being applied to express post stations and comprising the following steps:
receiving a virtual number sent by a gateway of a logistics platform;
receiving an authentication number input by a user, wherein the authentication number is an authentication bit number of a mobile phone number of the user;
and when the verification digits are consistent with the verification digits of the virtual number, determining corresponding logistics information through the virtual number.
2. The virtual number verification method is characterized by being applied to a virtual number platform and comprising the following steps of:
determining a target virtual number according to the verification number of the user, wherein the verification bit number of the target virtual number is consistent with the verification number;
determining an extension number corresponding to the target virtual number according to the target virtual number;
binding the virtual number with the mobile phone number of the user and sending the virtual number to an express post, wherein the virtual number comprises the target virtual number and the extension number.
3. The virtual number verification method of claim 2, wherein the determining the target virtual number based on the verification number of the user comprises:
according to the verification digits of the user, matching a verification bit available queue, wherein the verification bit available queue comprises one or more virtual numbers, and the verification bit digits of the virtual numbers are consistent with the verification digits;
And selecting one target virtual number from the verification bit available queue based on a random algorithm.
4. The virtual number verification method of claim 2, wherein the determining the target virtual number based on the verification number of the user comprises:
acquiring the bound number corresponding to the target virtual number, wherein the bound number is the number of mobile phone numbers of the bound user of the target virtual number;
and when the bound number exceeds the binding upper limit, the target virtual number is moved to a verification bit unavailable queue, and the target virtual number is reselected.
5. The virtual number verification method of claim 2, wherein determining the extension number corresponding to the target virtual number according to the target virtual number comprises:
judging whether an available extension number queue corresponding to the target virtual number is empty or not;
if yes, the target virtual number is redetermined; otherwise, selecting the extension from the available extension queues and moving the extension to an unavailable extension queue.
6. The virtual number verification method of claim 2, wherein binding the virtual number with the user phone number and sending to an express post comprises:
Binding the virtual number with the mobile phone number of the user through a binding protocol interface to generate a binding relation;
and storing the binding relation into a cache server.
7. The virtual number verification method of claim 2, further comprising:
performing authority authentication on the received authentication information, wherein the authentication information comprises the following parameters: user phone number, digital signature, expiration time or access key;
and when the authentication information passes the authority authentication, carrying out compliance verification on parameters in the authentication information.
8. The virtual number verification method is characterized by being applied to a logistics platform gateway and comprising the following steps of:
receiving authentication information provided by a virtual number platform;
when the authentication information is successfully authenticated by the virtual number platform, calling the virtual number platform to acquire a virtual number;
calling a binding protocol interface provided by the virtual number platform to bind the mobile phone number of the user with the virtual number;
and generating a logistics list number based on the virtual number and sending the logistics list number to an express post.
9. A virtual number verification system, comprising:
the express post station verifies whether the verification bit number of the mobile phone number of the user is consistent with the verification bit number of the virtual number, if so, the corresponding logistics information is determined through the virtual number;
The logistics platform gateway calls the virtual number platform to acquire a virtual number when the virtual number platform successfully authenticates the authentication information, generates a logistics list number based on the virtual number and sends the logistics list number to the express post;
and the virtual number platform sends the virtual number consistent with the verification digit of the mobile phone number of the user to the express post.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the virtual number verification method of any one of claims 1 to 8 via execution of the executable instructions.
11. A computer readable storage medium having stored thereon a computer program, wherein the computer program when executed by a processor implements the virtual number verification method of any one of claims 1 to 8.
CN202310252162.3A 2023-03-10 2023-03-10 Virtual number verification method, system, electronic device and storage medium Pending CN116260908A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310252162.3A CN116260908A (en) 2023-03-10 2023-03-10 Virtual number verification method, system, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310252162.3A CN116260908A (en) 2023-03-10 2023-03-10 Virtual number verification method, system, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN116260908A true CN116260908A (en) 2023-06-13

Family

ID=86680845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310252162.3A Pending CN116260908A (en) 2023-03-10 2023-03-10 Virtual number verification method, system, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN116260908A (en)

Similar Documents

Publication Publication Date Title
US11121873B2 (en) System and method for hardening security between web services using protected forwarded access tokens
CN107249004B (en) Identity authentication method, device and client
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
CN110839087B (en) Interface calling method and device, electronic equipment and computer readable storage medium
CN1993921A (en) Enhanced security using service provider authentication
CN110795174B (en) Application program interface calling method, device, equipment and readable storage medium
CN110839004A (en) Method and device for access authentication
US10389685B2 (en) Systems and methods for securely transferring selective datasets between terminals
CN110958119A (en) Identity verification method and device
CN109769010B (en) Method, device, equipment and storage medium for accessing CloudStack server based on SDK
EP4350556A1 (en) Information verification method and apparatus
CN107645474B (en) Method and device for logging in open platform
CN110650014B (en) Signature authentication method, system, equipment and storage medium based on hessian protocol
CN117632099A (en) Multi-language calling method, device, equipment and medium based on application program interface
CN115879074B (en) Identity authentication method, device and system based on blockchain
CN116112172B (en) Android client gRPC interface security verification method and device
CN104753774A (en) Distributed enterprise integrated access gateway
CN114840739B (en) Information retrieval method, device, electronic equipment and storage medium
CN113706299B (en) Data processing method, device, electronic equipment and medium
CN116260908A (en) Virtual number verification method, system, electronic device and storage medium
CN108270741B (en) Mobile terminal authentication method and system
CN115086428B (en) Network request sending method and device and electronic equipment
CN115941217A (en) Method for secure communication and related product
CN113452771B (en) Interface calling method, device and system
US11977620B2 (en) Attestation of application identity for inter-app communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination