WO2018137622A1 - 一种基于信息标识码进行信息验证的方法及终端 - Google Patents

一种基于信息标识码进行信息验证的方法及终端 Download PDF

Info

Publication number
WO2018137622A1
WO2018137622A1 PCT/CN2018/073867 CN2018073867W WO2018137622A1 WO 2018137622 A1 WO2018137622 A1 WO 2018137622A1 CN 2018073867 W CN2018073867 W CN 2018073867W WO 2018137622 A1 WO2018137622 A1 WO 2018137622A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
identifier
request
information
identification code
Prior art date
Application number
PCT/CN2018/073867
Other languages
English (en)
French (fr)
Inventor
陈冲
代星星
吴镇权
唐茂
宋凌云
胡宏阳
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2018137622A1 publication Critical patent/WO2018137622A1/zh
Priority to US16/420,331 priority Critical patent/US11188905B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • G06Q20/145Payments according to the detected use or quantity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B11/00Apparatus for validating or cancelling issued tickets
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/02Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points taking into account a variable factor such as distance or time, e.g. for passenger transport, parking systems or car rental systems
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • G07B15/02Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points taking into account a variable factor such as distance or time, e.g. for passenger transport, parking systems or car rental systems
    • G07B15/04Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points taking into account a variable factor such as distance or time, e.g. for passenger transport, parking systems or car rental systems comprising devices to free a barrier, turnstile, or the like
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Definitions

  • the invention relates to information verification technology, in particular to a method, a terminal and a computer storage medium for information verification based on an information identification code.
  • Subway and bus travel are indispensable parts of users' lives. At present, they use physical one-way tickets or one-card as a ticket. With the intelligentization of the terminal and the convenience of networking, the virtualization of the ticket becomes a new trend. After the ticket is virtualized, the user only needs to take out the mobile terminal and brush it in the corresponding identifier, so that the payment can be realized.
  • a technical solution for ticket virtualization in the prior art is to display a two-dimensional code and ensure that the user pays by himself by paying for online verification, and only for a specific user who has opened a designated payment channel.
  • the embodiments of the present invention provide a method, a terminal, and a computer storage medium for performing information verification based on an information identification code, which at least solves the problems existing in the prior art.
  • a method for information verification based on an information identification code is applied to a first terminal, where the first terminal includes one or more processors and a memory, and one or more programs, where The one or more programs are stored in a memory, and the program may include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute instructions; the method comprising :
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a first request according to the information identification code, and requests the second terminal to perform identity verification to complete the target requirement.
  • a method for information verification based on an information identification code is applied to a second terminal, where the second terminal includes one or more processors and a memory, and one or more programs, where The one or more programs are stored in a memory, and the program may include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute instructions; the method comprising :
  • the second terminal responds to the first request, and parses the first identifier and the second identifier from the information identifier.
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. First request;
  • the second terminal encapsulates the third identifier for characterizing the identity of the second terminal, and the information identifier code composed of the first identifier and the second identifier into the second request, and sends the identifier to the server, so that the server receives the packet according to the receiving After the second request is validated, the corresponding processing related to the target requirement is performed.
  • the triggering unit is configured to receive the first operation, and trigger a request for displaying the information identification code according to the first operation;
  • the response unit is configured to respond to the first operation, generate an information identification code according to the locally stored preset policy, and carry the first identifier used to represent the user identity and the identifier information identifier in the information identification code. Generating a second identifier of the time;
  • the request initiating unit is configured to initiate a first request according to the information identification code, and request the second terminal to perform identity verification to complete the target requirement.
  • the request response unit is configured to respond to the first request, and parse the first identifier and the second identifier from the information identifier code;
  • a verification unit configured to compare the first identifier with a locally stored preset information verification library to confirm a user identity; and compare the second identifier with a current time of the second terminal, if time If the difference is within the preset time range, the comparison is verified, and the first request initiated by the first terminal is accepted;
  • a request sending unit configured to encapsulate a third identifier used to represent the identity of the second terminal, and an information identifier code composed of the first identifier and the second identifier into a second request, and send the same to the server, so that The server performs a corresponding process related to the target requirement after performing validity verification according to the received second request.
  • a method for information verification based on an information identification code is applied to a first terminal, where the first terminal includes one or more processors and a memory, and one or more programs, where The one or more programs are stored in a memory, and the program may include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute instructions; the method comprising :
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a gate request or a gate request according to the information identification code, and requests the second terminal to perform identity verification to complete the target requirement of the subway travel.
  • a method for information verification based on an information identification code is applied to a second terminal, where the second terminal includes one or more processors and a memory, and one or more programs, where The one or more programs are stored in a memory, and the program may include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute instructions; the method comprising :
  • the second terminal responds to the incoming request or the outgoing request, and parses the first identifier and the second identifier from the information identification code;
  • the second terminal compares the first identifier with a locally stored preset information verification library to confirm the identity of the user;
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. Request for entry or request for departure;
  • the second terminal encapsulates the third identifier for characterizing the identity of the second terminal, and the information identifier code composed of the first identifier and the second identifier into the second request, and sends the identifier to the server, so that the server receives the packet according to the receiving Corresponding processing related to the subway travel is performed after the second request to the validity verification is performed.
  • the triggering unit is configured to receive the first operation, and trigger a request for displaying the information identification code according to the first operation;
  • the response unit is configured to respond to the first operation, generate an information identification code according to the locally stored preset policy, and carry the first identifier used to represent the user identity and the identifier information identifier in the information identification code. Generating a second identifier of the time;
  • the request initiating unit is configured to initiate a gate request or a gate request according to the information identifier, and request the second terminal to perform identity verification to complete the target requirement of the subway travel.
  • the request response unit is configured to respond to the incoming request or the outgoing request, and parse the first identifier and the second identifier from the information identification code;
  • a verification unit configured to compare the first identifier with a locally stored preset information verification library to confirm a user identity; and compare the second identifier with a current time of the second terminal, if time If the difference is within the preset time range, the comparison is verified, and the second terminal accepts the opening request or the opening request initiated by the first terminal;
  • a request sending unit configured to encapsulate a third identifier used to represent the identity of the second terminal, and an information identifier code composed of the first identifier and the second identifier into a second request, and send the same to the server, so that The server performs a corresponding process related to the subway travel after performing validity verification according to the received second request.
  • a method for information verification based on an information identification code is applied to a first terminal, where the first terminal includes one or more processors and a memory, and one or more programs, where The one or more programs are stored in a memory, and the program may include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute instructions; the method comprising :
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a ride request according to the information identification code, and requests the second terminal to perform identity verification to complete the target requirement of the bus travel.
  • a method for information verification based on an information identification code is applied to a second terminal, where the second terminal includes one or more processors and a memory, and one or more programs, where The one or more programs are stored in a memory, and the program may include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute instructions; the method comprising :
  • the second terminal responds to the ride request, and parses the first identifier and the second identifier from the information identifier code;
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. Boarding request;
  • the second terminal encapsulates the third identifier for characterizing the identity of the second terminal, and the information identifier code composed of the first identifier and the second identifier into the second request, and sends the identifier to the server, so that the server receives the packet according to the receiving After the second request is validated, the corresponding processing related to the bus trip is performed.
  • the triggering unit is configured to receive the first operation, and trigger a request for displaying the information identification code according to the first operation;
  • the response unit is configured to respond to the first operation, generate an information identification code according to the locally stored preset policy, and carry the first identifier used to represent the user identity and the identifier information identifier in the information identification code. Generating a second identifier of the time;
  • the request initiating unit is configured to initiate a ride request according to the information identifier, and request the second terminal to perform identity verification to complete the target requirement of the bus travel.
  • a request response unit configured to respond to the ride request, and parse the first identifier and the second identifier from the information identification code
  • a verification unit configured to compare the first identifier with a locally stored preset information verification library to confirm a user identity; and compare the second identifier with a current time of the second terminal, if time If the difference is within the preset time range, the comparison is verified, and the second terminal accepts the boarding request initiated by the first terminal;
  • a request sending unit configured to encapsulate a third identifier used to represent the identity of the second terminal, and an information identifier code composed of the first identifier and the second identifier into a second request, and send the same to the server, so that After the server performs validity verification according to the received second request, the server performs corresponding processing related to the bus travel.
  • a method for information verification based on an information identification code is applied to a system for performing information verification based on an information identification code, where the first terminal, the second terminal, and the server each include one or more a processor and a memory, and one or more programs, wherein the one or more programs are stored in a memory, the program may include one or more modules each corresponding to a set of instructions, One or more processors are configured to execute instructions; the method comprising:
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a first request according to the information identification code, and requests the second terminal to perform identity verification to complete the target requirement;
  • the second terminal responds to the first request, and parses the first identifier and the second identifier from the information identifier code;
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. First request;
  • the second terminal encapsulates the third identifier used to identify the identity of the second terminal, and the information identifier code formed by the first identifier and the second identifier into the second request, and sends the identifier to the server;
  • the server performs a corresponding process related to the target requirement after performing validity verification according to the received second request.
  • a system for performing information verification based on an information identification code where the system includes: a first terminal, a second terminal, and a server;
  • the first terminal is configured as:
  • the second terminal is configured as:
  • a third identifier for characterizing the identity of the second terminal and an information identifier formed by the first identifier and the second identifier are encapsulated into the second request and sent to the server;
  • Server configured as:
  • Corresponding processing related to the target requirement is performed after validity verification is performed according to the received second request.
  • a method for information verification based on an information identification code is applied to a system for performing information verification based on an information identification code, where the first terminal, the second terminal, and the server each include one or more a processor and a memory, and one or more programs, wherein the one or more programs are stored in a memory, the program may include one or more modules each corresponding to a set of instructions, One or more processors are configured to execute instructions; the method comprising:
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a gate request or a gate request according to the information identifier, and requests the second terminal to perform identity verification to complete the target requirement of the subway travel;
  • the second terminal responds to the incoming request or the outgoing request, and parses the first identifier and the second identifier from the information identification code;
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. Request for entry or request for departure;
  • the second terminal encapsulates the third identifier used to identify the identity of the second terminal, and the information identifier code formed by the first identifier and the second identifier into the second request, and sends the identifier to the server;
  • the server performs a corresponding process related to the subway travel after performing validity verification according to the received second request.
  • a system for performing information verification based on an information identification code where the system includes a first terminal, a second terminal, and a server;
  • the first terminal is configured to:
  • the second terminal is configured to:
  • a third identifier for characterizing the identity of the second terminal and an information identifier formed by the first identifier and the second identifier are encapsulated into the second request and sent to the server;
  • the server is configured to:
  • Corresponding processing related to the subway trip is performed after validity verification is performed according to the received second request.
  • a method for information verification based on an information identification code is applied to a system for performing information verification based on an information identification code, where the first terminal, the second terminal, and the server each include one or more a processor and a memory, and one or more programs, wherein the one or more programs are stored in a memory, the program may include one or more modules each corresponding to a set of instructions, One or more processors are configured to execute instructions; the method comprising:
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a ride request according to the information identification code, and requests the second terminal to perform identity verification to complete the target requirement of the bus travel;
  • the second terminal responds to the ride request, and parses the first identifier and the second identifier from the information identifier code;
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. Boarding request;
  • the second terminal encapsulates the third identifier used to identify the identity of the second terminal, and the information identifier code formed by the first identifier and the second identifier into the second request, and sends the identifier to the server;
  • the server After the server performs validity verification according to the received second request, the server performs corresponding processing related to the bus travel.
  • a system for performing information verification based on an information identification code where the system includes: a first terminal, a second terminal, and a server;
  • the first terminal is configured to:
  • the second terminal is configured to:
  • a third identifier for characterizing the identity of the second terminal and an information identifier formed by the first identifier and the second identifier are encapsulated into the second request and sent to the server;
  • the server is configured to:
  • Corresponding processing related to the bus travel is performed after validity verification is performed according to the received second request.
  • the triggering unit is configured to receive a first operation on the first terminal side, and trigger a request for displaying the information identification code according to the first operation;
  • the response unit is configured to respond to the first operation on the first terminal side, generate an information identification code according to the locally stored preset policy, and carry the first identifier and the identifier used to represent the user identity in the information identification code. a second identifier for characterizing the information identification code generation time;
  • the request initiating unit is configured to initiate a first request according to the information identification code, requesting the second terminal to perform identity verification to complete the target requirement;
  • the request response unit is configured to respond to the first request by the second terminal, and perform identity verification after parsing the first identifier and the second identifier from the information identifier code, and then pass the second Requesting to apply for validity verification to the server;
  • the second request includes a third identifier for characterizing the identity of the second terminal, and an information identifier code composed of the first identifier and the second identifier;
  • the feedback receiving unit is configured to receive feedback from the server, and the feedback is performed by the server after performing validity verification according to the received second request, and performing corresponding processing related to the target requirement.
  • the server includes:
  • the request receiving unit is configured to receive a second request initiated by the second terminal after responding to the first request, where the first request includes a first identifier used to represent the identity of the user and a time for generating the identifier of the information identifier An information identifier formed by the second identifier; the information identifier is generated according to a preset policy stored locally when responding to the first operation; and the third identifier is used to identify the third identifier of the second terminal And an information identification code composed of the first identifier and the second identifier;
  • the verification processing unit is configured to perform corresponding processing related to the target requirement after performing validity verification according to the received second request.
  • a computer storage medium storing the computer executable instructions, wherein the computer executable instructions are used to perform information verification based on the information identification code according to any one of the embodiments of the present invention.
  • the method for performing information verification based on the information identification code in the embodiment of the present invention includes: receiving a first operation on the first terminal side, triggering a request for displaying the information identification code according to the first operation; Responding to an operation, generating an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and a second identifier for characterizing the information identification code generation time; The terminal initiates a first request according to the information identification code, and requests the second terminal to perform identity verification to complete the target requirement.
  • the first identifier is compared with the locally stored preset information verification library to confirm the identity of the user, and the second terminal compares the second identifier with the current time of the second terminal, if the time difference is Within a preset time range, the comparison is verified, the second terminal accepts the first request initiated by the first terminal, and the second terminal uses a third identifier for characterizing the second terminal, and the first
  • the information identifier code formed by the identifier and the second identifier is encapsulated into the second request and sent to the server, so that the server performs the corresponding processing related to the target requirement after performing validity verification according to the received second request. .
  • the technology for realizing the ticket virtualization benefits all the people, and the application scope is wide.
  • the universal design is originally intended to meet the user's needs, and is convenient for subsequent expansion and development; even if the network is not good, such as no network or network situation, In a good case, the verification can also be implemented. Even if the network condition is not good, the offline verification of the embodiment of the present invention does not cause a large amount of retention and queuing of the user due to network fluctuations, which is a mechanism for quickly implementing verification.
  • 1 is a schematic diagram of hardware entities of each party performing information interaction in an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of an implementation process of a method according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a service opening UI interface to which the scenario of the embodiment of the present invention is applied;
  • FIG. 4 is a schematic diagram of a UI interface for deduction of fees in a scenario in which the embodiment of the present invention is applied;
  • FIG. 5 is a schematic diagram of an asymmetric encryption scenario according to an embodiment of the present invention.
  • FIG. 6 is a schematic flow chart of applying a subway travel scenario according to an embodiment of the present invention.
  • FIG. 7 is a schematic flow chart of applying a bus travel scenario according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of hardware of a terminal to which an embodiment of the present invention is applied.
  • module A mobile terminal embodying various embodiments of the present invention will now be described with reference to the accompanying drawings.
  • suffixes such as “module,” “component,” or “unit” used to denote an element are merely illustrative of the embodiments of the present invention, and do not have a specific meaning per se. Therefore, “module” and “component” can be used in combination.
  • first, second, etc. are used herein to describe various elements (or various thresholds or various applications or various instructions or various operations), etc., these elements (or thresholds) Or application or instruction or operation) should not be limited by these terms. These terms are only used to distinguish one element (or threshold or application or instruction or operation) and another element (or threshold or application or instruction or operation).
  • first operation may be referred to as a second operation
  • second operation may also be referred to as a first operation
  • the first operation and the second operation are both operations, but the two are not the same The operation is only.
  • the steps in the embodiment of the present invention are not necessarily processed in the order of the steps described.
  • the steps may be selectively arranged to be reordered according to requirements, or the steps in the embodiment may be deleted, or the steps in the embodiment may be added.
  • the description of the steps in the embodiments of the present invention is only an optional combination of the steps, and does not represent a combination of the steps of the embodiments of the present invention.
  • the order of the steps in the embodiments is not to be construed as limiting the present invention.
  • the intelligent terminal (such as a mobile terminal) of the embodiment of the present invention can be implemented in various forms.
  • the mobile terminal described in the embodiments of the present invention may include, for example, a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a personal digital assistant (PDA, Personal Digital Assistant), a tablet (PAD), a portable multimedia player ( Mobile terminals such as PMP (Portable Media Player), navigation devices, and the like, and fixed terminals such as digital TVs, desktop computers, and the like.
  • PDA Personal Digital Assistant
  • PAD tablet
  • PMP Portable Multimedia Player
  • navigation devices and the like
  • fixed terminals such as digital TVs, desktop computers, and the like.
  • the terminal is a mobile terminal.
  • those skilled in the art will appreciate that configurations in accordance with embodiments of the present invention can be applied to fixed type terminals in addition to components that are specifically for mobile purposes.
  • FIG. 1 is a schematic diagram of hardware entities of each party performing information interaction in the embodiment of the present invention.
  • FIG. 1 includes: a terminal device 1, a terminal device 2, and a server 3.
  • the terminal device 1 is composed of the terminal device 11-14, and is mainly a mobile phone terminal held by the user, and the terminal device 2 is a gate terminal.
  • the terminal device exchanges information with the server through a wired network or a wireless network.
  • Terminal equipment includes mobile phones, desktops, PCs, all-in-ones, and the like.
  • the first terminal represents the above terminal device 1 (such as a mobile phone terminal)
  • the second terminal represents the terminal device 2 (such as a gate terminal)
  • the server 3 can be a background server.
  • the processing logic 10 on the first terminal side includes: S11, receiving a first operation on a side of the first terminal (such as a mobile terminal held by the user), according to the The first operation triggers a request for displaying an information identification code (such as a two-dimensional code); S12: responding to the first operation on the first terminal side, according to a preset policy stored locally (such as a two-dimensional code offline generation strategy or The two-dimensional code offline generation policy is generated by generating an information identification code, where the information identification code carries a first identifier (such as a UID) for characterizing the user identity and a second identifier (such as a time) for characterizing the information identification code generation time.
  • a preset policy stored locally
  • the two-dimensional code offline generation policy is generated by generating an information identification code, where the information identification code carries a first identifier (such as a UID) for characterizing the user identity and a second identifier (such as a time) for characterizing the information identification code generation time.
  • the first terminal (such as a mobile phone terminal) initiates a first request according to the information identification code (such as a two-dimensional code), and requests the second terminal (such as a gate terminal) to perform identity verification to complete the target requirement (such as a subway)
  • the mobile phone terminal scans the QR code to the identification area on the gate terminal to scan the code, requests the second terminal to release the first terminal into the station, scans the code into the station, and releases the code and scans the code.
  • the processing logic 11 on the second terminal side includes: S21: The second terminal responds to the first request, and parses the first identifier and the second identifier from the information identifier code; S22, second The terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity, and the second terminal compares the second identifier with the current time of the second terminal, if time If the difference is within a preset time range (eg, 1 minute), the comparison is verified; S23, the second terminal accepts the first request initiated by the first terminal (mobile terminal); S24, the second terminal is used for A third identifier (such as a gate ID) characterizing the identity of the second terminal, and an information identification code consisting of the first identifier (such as a UID) and the second identifier (such as a timestamp) are encapsulated into the second request and Sent to the server.
  • the processing logic 12 on the server side includes: S31: the server performs validity verification according to the received second request; S32.
  • the technology for realizing the ticket virtualization benefits all the people, and the application scope is wide.
  • the universal design is originally designed to meet the user's needs, and is convenient for subsequent expansion and development; even if the network is not good, such as no network or network situation, In a good case, the verification can also be implemented. Even if the network is in a bad situation, the offline verification of the embodiment of the present invention does not cause a large number of users to stay and queue due to network fluctuations, which is a mechanism for quickly implementing verification; The invention does not rely on the two-dimensional code to implement the security mechanism.
  • the embodiment of the present invention adopts an asymmetric encryption mechanism, and can further be supplemented by multiple encryption methods, which is difficult to be cracked, and can more effectively ensure user information security.
  • FIG. 1 is only a system architecture example for implementing the embodiment of the present invention.
  • the embodiment of the present invention is not limited to the system structure described in FIG. 1 above, and various embodiments of the method of the present invention are proposed based on the system architecture described above in FIG. .
  • a method for performing information verification based on an information identification code includes: receiving a first operation on a first terminal side, and triggering a request for displaying an information identification code according to the first operation (101) ).
  • the physical code is slowly replaced by the information identification code.
  • the graphic code is used as a type in the information identification code.
  • the graphic code may include a two-dimensional code, a barcode, a magnetic bar code, and the like.
  • the two-dimensional code is exemplified by a two-dimensional code in the embodiment of the present invention because of the convenience and the extensive use of the scene.
  • the two-dimensional code is in a plane (two-dimensional direction) by a certain geometric pattern according to a certain rule.
  • Distributed black and white graphics record data symbol information; skillfully use the concept of "0" and "1" bitstreams that form the basis of the computer's internal logic, and use several geometric shapes corresponding to binary to represent text.
  • the numerical information is automatically read by the image input device or the photoelectric scanning device to realize automatic information processing.
  • the barcode is mostly used for the identification of the product packaging of the supermarket to determine the product category, name, and the like. Magnetic stripe codes are mostly used for bank card issuance.
  • the QR code can also be understood as a special barcode, which has some commonalities of barcodes.
  • each code has its own specific character set; each character occupies a certain width; it has a certain check function. At the same time, it also has automatic recognition function for different rows of information, and handles the rotation change point of the graphic.
  • the first terminal side responds to the first operation, and generates an information identification code according to the locally stored preset policy (102). It should be noted that the method for generating the information identification code is offline offline, and the terminal side does not need to interact with the background server, and does not need to use the network.
  • the preset policy and the strategy for generating the information identification code through the background server are the same.
  • the information identification code is a two-dimensional code
  • the preset policy includes content required for converting to a two-dimensional code.
  • the two-dimensional code may be a download URL of the application.
  • the content required for the conversion to the two-dimensional code included in the preset policy is: a first identifier (such as a UID) for characterizing the user and the current real-time
  • the time information collected by the station, that is, the second identifier (such as a timestamp), in the preset policy after determining the content required for the two-dimensional code, it is also necessary to use a plurality of geometric shapes corresponding to the binary to represent
  • the content converts the content into a geometric shape of the concept of “0” and “1”, so that the geometrical body records the data symbol information in a black and white pattern distributed in a plane (two-dimensional direction) according to a certain rule, according to which the preset strategy is
  • the final result generated is a two-dimensional code that can be automatically recognized by an image input device or an electro-optical scanning device.
  • the information identification code carries a first identifier (such as a UID) for characterizing the user identity and a second identifier (such as a time stamp) for characterizing the information identification code generation time.
  • the first terminal initiates a first request (103) according to the information identifier that carries the first identifier (such as a UID) and the second identifier (such as a timestamp), and requests the second terminal to perform identity verification by using the first request. To complete the target needs.
  • the first terminal aligns the two-dimensional code with the identification area on the second terminal to scan the code, requests the second terminal to release the first terminal and scans the code into the station, and then needs the second The terminal releases the first terminal outbound, and through the matching of the blacklist of the entry gate and the whitelist of the gate, the identity verification of the inbound and outbound of the same user can be performed, and the subway travel demand of the user is satisfied after the verification is passed;
  • the first terminal aligns the two-dimensional code with the identification area on the second terminal to scan the code, requests the second terminal to scan the first terminal, and uses the matching of the malicious list to perform identity verification.
  • the gate After meeting the user's bus travel demand, whether it is the subway scene or the bus scene, the gate is offline and the local information verification library is compared and verified. For the bus scenario, it is a verification. For the subway scenario, the secondary verification of the inbound and outbound, the method of combining the information identification code is also an offline offline mode.
  • the embodiment of the present invention is a dual offline offline mechanism, and does not need to consider the network state. , no need to connect to the network, online payment delay confirmation payment after subsequent payment.
  • the second terminal parses the first identifier (such as a UID) and the second identifier (such as a timestamp) from the information identifier, where the second terminal
  • the identification eg, UID
  • the second terminal compares the second identifier (such as a timestamp) with the current time of the second terminal (105). If the time difference is within a preset time range (eg, 1 minute), the comparison is verified, and the second terminal accepts the first request initiated by the first terminal (mobile terminal) (106).
  • a second identifier such as a gate ID used by the second terminal to characterize the identity of the second terminal
  • an information identification code such as two
  • the dimension code is encapsulated into the second request and sent to the server.
  • a server (such as a payment server of TenPay for payment verification) performs payment processing (107) related to the target demand based on the validity verification of the received second request.
  • the payment processing includes direct debit or initiation of a dunning process, wherein if there is a balance in the user account, the deduction is directly made. If there is no balance in the user account, the dunning is initiated, and if the user does not pay, the application cannot be used.
  • Generate a QR code which means that you can't travel by car (metro or bus).
  • the first operation is received on the mobile terminal side, and the request to display the two-dimensional code is triggered according to the first operation.
  • the request to display the two-dimensional code is triggered according to the first operation.
  • Responding to the first operation on the mobile terminal side generating a two-dimensional code according to a local two-dimensional code offline generation strategy or a two-dimensional code offline generation strategy, and carrying a UID for characterizing the user identity in the two-dimensional code And a timestamp used to characterize the time at which the information identification code is generated.
  • the mobile terminal initiates a first request according to the two-dimensional code, and requests the second terminal to perform identity verification to complete the target requirement.
  • the mobile terminal will scan the QR code to the identification area on the gate terminal to scan the code, request the second terminal to release the first terminal and scan the code into the station, and then need to The second terminal releases the first terminal outbound, and through the matching of the blacklist of the entry gate and the whitelist of the gate, the same user can be authenticated for inbound and outbound release, and the user's ride demand is satisfied after the verification is passed.
  • the mobile phone terminal scans the two-dimensional code to the identification area on the gate terminal, and requests the second terminal to scan the first terminal, and uses the matching of the malicious list to perform identity verification. Meet the user's ride needs.
  • the gate terminal responds to the first request, and parses the UID and the timestamp from the two-dimensional code; the gate terminal compares the UID with the locally stored preset information verification library to verify After confirming the identity of the user, the gate terminal compares the time stamp with the current time of the gate terminal. If the time difference is within a preset time range, such as 1 minute, the comparison is verified and the gate terminal accepts The first request initiated by the mobile terminal.
  • the gate terminal encapsulates the gate ID used to characterize the identity of the gate terminal, and the two-dimensional code consisting of the UID and the time stamp into a second request and sends it to the server.
  • the subway scene is in the verification of UID and timestamp, and the UID is compared with the blacklist of the gatekeeper.
  • the timestamp is compared, the timestamp is compared with the current time of the gate, and the time difference is Within 1 minute;
  • the bus scene is in the verification of UID and timestamp, the UID is compared with the malicious list, and the timestamp is compared with the current time of the gate when the timestamp is compared.
  • the gate terminal accepts the first request initiated by the mobile terminal, for example, in the subway scene, the inbound and the outbound are taken, and the bus is directly in the bus scene. Take the bus.
  • the gate terminal encapsulates the gate ID used to characterize the identity of the gate terminal, and the two-dimensional code composed of the UID and the time stamp into the second request and transmits it to the server.
  • the server performs payment processing (deduction or dunning processing) related to the target demand (such as subway travel or bus travel) after performing validity verification according to the received second request.
  • a dual offline offline mechanism is adopted, that is, 1) the two-dimensional code is generated offline, and does not need to interact with the background server online; 2) the gate terminal local comparison verification does not need to interact with the background server online.
  • Asymmetric encryption is used, which is different from related technologies (currently an online solution that interacts with the background).
  • the mobile terminal, the gate terminal and the background server are involved, and in practical applications, the system is not limited to these interactive execution entities.
  • a method for performing information verification based on an information identification code includes: receiving a first operation on a side of a first terminal (such as a mobile terminal), and triggering display of an information identification code (such as a two-dimensional code according to the first operation) a request to the first operation, such as a mobile terminal, to generate an encryption according to a locally stored preset policy (such as a two-dimensional code offline generation policy or a two-dimensional code offline generation policy) a form of information identification code (such as a two-dimensional code) carrying a first identifier (such as a UID) for characterizing a user identity and an identifier identification code for characterizing the user in the encrypted information identification code (such as a two-dimensional code) a second identifier (time stamp) of time; the first terminal (such as a mobile phone terminal) initiates a first request according to the information identification code (such as a two-dimensional code) in the encrypted form, and requests the second terminal to authenticate the target to complete the target.
  • the mobile phone terminal scans the two-dimensional code to the identification area on the gate terminal, and requests the second terminal to release the first terminal into the station and scan the code to enter the station, and the second need to be followed.
  • the terminal releases the first terminal outbound, and through the matching of the blacklist of the entry gate and the whitelist of the gate, the identity verification of the inbound and outbound of the same user can be performed, and the user's ride demand is satisfied after the verification is passed;
  • the mobile phone terminal scans the QR code to the identification area on the gate terminal, and requests the second terminal to scan the first terminal, and uses the matching of the malicious list to satisfy the identity verification.
  • the user's ride demand the bus scene is a verification, different from the secondary verification of inbound and outbound in the subway scene.
  • the second terminal (such as the gate terminal) responds to the first request, and the information identification code in the encrypted form is in accordance with an asymmetric encryption policy (the two-dimensional code is a private key encryption, and the private key Can be stored in the background server, the gate is decrypted by the public key) to decrypt and parse out the first identifier (UID) and the second identifier (time stamp); the second terminal (such as a gate terminal) will The first identifier (UID) and the second identifier (time stamp) are compared with the locally stored preset information verification library.
  • the verification here includes: validation of validity, verification of UID and timestamp, and other security verification.
  • the subway scene is in the verification of UID and timestamp, and the UID is compared with the blacklist of the gatekeeper.
  • the timestamp is compared, the timestamp is compared with the current time of the gate, and the time difference is Within 1 minute;
  • the bus scene is in the verification of UID and timestamp, the UID is compared with the malicious list, and the timestamp is compared with the current time of the gate when the timestamp is compared.
  • the second terminal such as the gate terminal
  • the subway scene it is released and inbound and out of the station, and the bus is directly in the bus scene.
  • the second terminal eg, the gate terminal
  • the second terminal identity eg, the gate ID
  • the first identity UID
  • the second information identification code (such as a two-dimensional code) formed by the identifier (time stamp) is encapsulated into the second request and sent to the server, and the server performs validity verification according to the received second request, and then performs related to the target requirement.
  • Payment processing deduction or dunning processing
  • a dual offline offline mechanism is adopted, that is, 1) the two-dimensional code is generated offline, and does not need to interact with the background server online; 2) the gate terminal performs local comparison, and does not need to interact with the background server online.
  • Asymmetric encryption is also used to provide security for user information security.
  • the subway travel scenario is taken as an example to describe as follows:
  • the first request initiated by the mobile phone terminal according to the two-dimensional code is a request for entry, and the gate terminal is requested to release the mobile terminal to the station and scan the code into the station, and the gate terminal ( Specifically, in the process of comparing the UID with the locally stored preset information verification library to confirm the identity of the user, if the UID is in the malicious number library, the gate terminal rejects the mobile phone.
  • the terminal initiates the incoming request, that is, refuses to open the gate to release the user. If the UID is in the blacklist of the gate, the gate terminal rejects the request for the gate initiated by the mobile terminal, that is, the gate is refused to be released by the user.
  • the gate terminal accepts the gate request initiated by the mobile terminal, that is, the gate is opened for the user to release, and the UID is added. Entering the blacklist of the entry gate, so that the subsequent gate terminal reports the gate ID, the two-dimensional code consisting of the UID and the timestamp to the server, and the server resolves the UID to all the gates and gates.
  • the update blacklist and the whitelist of the gates can be updated. The contents of the blacklist and the whitelist of the gates can be consistent, because the detection at the gate terminal is offline and offline, therefore, it is necessary to pass through the gate.
  • the same UID in the blacklist and the blacklist of the gates ensures that the user who entered the gate can only exit.
  • the server parses the gate ID from the second request, and the two-dimensional code composed of the UID and the timestamp, and performs validity verification on the two-dimensional code to confirm
  • the UID is parsed from the two-dimensional code, and the UID is updated to the blacklist of the gate terminal and the whitelist of the gate, that is, the UID is broadcasted to All the blacklists of the gates are entered, and the UID is broadcasted to the white list of all the gates.
  • the server pushes the gate information to the mobile terminal. At this time, the relevant school that completed the gate is completed. Test.
  • the mobile terminal after the server pushes the information to the mobile terminal, the mobile terminal initiates a gate request according to the two-dimensional code, and requests the gate terminal to release the mobile terminal to the station and scan and exit the station.
  • the mobile phone terminal scans the two-dimensional code to the identification area on the gate terminal to scan the code, and requests the gate terminal to release the mobile terminal to the station and scan the code out.
  • a gate terminal (specifically a gate) responds to the gate request, and the UID and the timestamp are parsed from the gate request.
  • the gate terminal compares the UID with the locally stored preset information verification library to confirm the identity of the user, if the UID is in the malicious number library, the gate terminal rejects the initiated by the mobile terminal When the request is made, the gate is refused to be released for the user to release. If the UID is not in the white list of the gate, the gate terminal rejects the request for the gate initiated by the mobile terminal, that is, the gate is refused to be released by the user.
  • the gate terminal compares the time stamp with the current time of the gate terminal, if the time difference is within a preset time range (eg, 1 minute) Then, the verification is passed, and the gate terminal accepts the opening request initiated by the mobile terminal, that is, the gate is opened for the user to release, and then the UID is deleted from the white list of the gate.
  • a preset time range eg, 1 minute
  • the gate terminal uses a gate ID for characterizing the identity of the gate terminal, a two-dimensional code composed of the UID and the time stamp, and is obtained according to the entry request and the opening request.
  • the billing information is encapsulated into a third request and sent to the server.
  • the server parses, from the third request, a gate ID, a two-dimensional code composed of the UID and the time stamp, and the billing information, and the server performs validity verification on the two-dimensional code to confirm After the authenticity of the two-dimensional code, a payment request (deduction or dunning) is initiated according to the billing information to complete the payment processing.
  • the UID is parsed from the two-dimensional code, and the UID is deleted from the blacklist and the whitelist.
  • the gate terminal reports the gate ID, the two-dimensional code composed of the UID and the time stamp, and the billing information to the server for validity verification of the two-dimensional code, and then performs payment processing for deduction or dunning, and payment processing.
  • the UID in the QR code is parsed by the server, and the UID is deleted from the blacklist and the whitelist of the gate.
  • the gate judges that the user is offline when passing, but after the release, it is necessary to upload the user data and the gate ID to the subway/transit background and upload it. Go to the background server for data validation and parsing. Since it was required to be offline at the time of requesting the judgment of the gate, the blacklist of entry and the whitelisting mechanism for the gate were introduced. Among them, for the blacklist of the gate, the blacklist is set when the gate is opened. When the user passes the gate, the UID of the user is added to the blacklist, and the blacklist is sent to the router through the local area network or the background server of the subway company. All the gates. When the server-side command is not received, the blacklist also needs to be updated periodically.
  • the blacklist data except for a certain period of time is completely cleared.
  • a certain period of time such as 2 hours.
  • the user UID is sent to the white list of all the gates, only in the whitelist. The user can pass the gate. After the user exits the gate, the back-end server initiates the deduction. After the transaction is completed, the background server sends an instruction to clear the user in the blacklist and whitelist.
  • the whitelist also needs to be updated regularly, which is based on the maximum stay time allowed by the MTRC.
  • the malicious list when the background server detects that a user is a malicious user or has a risk of maliciously spreading the traffic code, the UID is added to the malicious list and sent to all the gates, and the traffic code is no longer generated for the user.
  • the verification that needs to be done includes: user identification information (UID), which is used to confirm the identity of the user, and whether there is a blacklist or a malicious list. If it is, then it is not released; the hand Q QR code traffic payment verification information is used to distinguish it from other similar products; the user timestamp information is used to inform the time of the gate QR code generation, 2D within 1 minute The code will be released; the security check information contains complex algorithms, and the initial security check is passed.
  • UID user identification information
  • the verification required includes: user identification information (UID), which is used to confirm the identity of the user, and is not released if it is not in the white list; Hand Q two-dimensional code traffic payment verification information, used to distinguish between other similar products; user timestamp information, used to inform the gate QR code generation time, the QR code will be released within 1 minute; security check Information, including complex algorithms, is passed after the initial security check is passed.
  • UID user identification information
  • Hand Q two-dimensional code traffic payment verification information used to distinguish between other similar products
  • user timestamp information used to inform the gate QR code generation time, the QR code will be released within 1 minute
  • security check Information including complex algorithms, is passed after the initial security check is passed.
  • the verification of the background server includes: after receiving the QR code data and the gate ID sent by the subway/bus, the server will judge the validity of the payment request, specifically, the payment request Integrity judgment, judging whether all required information is included; whether the merchant has authority; whether the merchant information and the buyer information are correct; whether the order status has been closed or paid; whether it is the traffic code of the subway bus payment; whether it has expired; Whether the user's account balance is sufficient; the gate ID information is judged; the risk control information judgment mainly includes the single-day consumption number and quota and the anti-fraud strategy, whether the confidentiality is required; the server maintains the black-and-white list mechanism of the gate, and judges the user two-dimensional The validity of the code data, initiate a chargeback request and push the relevant account message.
  • bus travel scenario is taken as an example for the following description:
  • the mobile phone terminal when the target demand is the bus travel, requests the mobile phone terminal to scan and release the mobile terminal according to the first request initiated by the two-dimensional code.
  • the mobile phone terminal scans the two-dimensional code to the identification area on the gate terminal, and requests the second terminal to scan the first terminal, and uses the matching of the malicious list to perform identity verification.
  • the bus scene is a gate verification, which is different from the secondary gate verification of the inbound and exit gates of the gate in the subway scene.
  • the gate terminal compares the UID with the locally stored preset information verification library to verify the identity of the user, if the UID is in the malicious number library, the gate terminal rejects the initiated by the mobile terminal The ride request refuses to be released to the user. If the UID does not exist in the malicious number database, the gate terminal accepts the boarding request initiated by the mobile terminal, that is, the user is released, and the UID is added to the malicious number blacklist.
  • the user's used QR code must be added to the malicious number blacklist to avoid being reused and copied, and the synchronization is sent to all the gates through the bus background or background server, because the detection at the gate terminal is Offline offline, therefore, a malicious number blacklist is required to ensure that users who have already entered the gate cannot enter the station again.
  • the server performs validity verification according to the received second request, and performs the target request.
  • the gate ID, the two-dimensional code composed of the UID and the time stamp, and the billing information are parsed from the second request.
  • the server performs validity check on the two-dimensional code to confirm the authenticity of the two-dimensional code, and then initiates a payment request (deduction or dunning) according to the billing information to complete the payment processing.
  • the server parses the UID from the two-dimensional code. If the user identified by the UID is a malicious user, the UID is updated to the malicious number blacklist, and the malicious number blacklist is sent to the gate terminal.
  • the embodiment of the invention is a dual offline offline verification mechanism.
  • the mobile phone was offline and offline, and the gate was also offline and offline.
  • the gate is off-line, it will ensure the speed and stability of the user at the time of the gate, which is up to 300ms as prescribed by the Ministry of Communications.
  • the prior art is online verification, which is impossible to reach 300ms.
  • the user's QR code is sent to the server to verify its validity. If it is an illegal user, the user is added to the malicious list, thereby achieving the unification of quick security and capital security.
  • the first terminal in the embodiment of the present invention includes: a triggering unit, configured to receive a first operation on the first terminal side, trigger a request for displaying the information identification code according to the first operation, and the response unit is configured to be in the first terminal The side responds to the first operation, and generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and a second identifier for generating the information identifier code generation time.
  • the request initiating unit configured to initiate a first request according to the information identification code, requesting the second terminal to perform identity verification to complete the target requirement, and requesting the response unit, configured to: the second request to the first request Responding to the application, and after performing the authentication verification by parsing the first identifier and the second identifier from the information identification code, applying for validity verification to the server by using the second request; a third identifier for characterizing the identity of the second terminal, and an information identifier code composed of the first identifier and the second identifier; a feedback receiving unit For the corresponding process related to the target after demand server is configured to receive feedback, the feedback is a validity verification server according to the received second request.
  • the information identification code is generated according to the preset policy stored locally by the first terminal, and the information identification code carries the identity used to represent the user. a first identifier and a second identifier for characterizing the information identification code generation time.
  • the first terminal sends the first request to the second terminal to request the second terminal to perform identity verification to complete the target requirement.
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity, and the second The identifier is compared with the current time of the second terminal.
  • the second terminal accepts the first request initiated by the first terminal.
  • the second terminal encapsulates the third identifier used to identify the identity of the second terminal, and the information identifier code formed by the first identifier and the second identifier into the second request and sends the server to the server for validity verification.
  • Corresponding processing related to the target requirement is then performed, and the processing is fed back to the first terminal.
  • the target demand is a subway trip
  • the first request is an entry request and a trip request
  • the second terminal and the server respectively process the same.
  • the target demand is a bus trip
  • the first request is only a ride request, which is processed by the second terminal and the server.
  • a server includes: a request receiving unit, configured to receive a second request initiated by the second terminal after responding to the first request; the first request includes the first identifier used to represent the user identity And an information identifier code formed by the identifier that is used to identify the information identifier generation time; the information identifier code is generated according to the locally stored preset policy when responding to the first operation; and the second request includes a third identifier for characterizing the identity of the second terminal, and an information identifier code composed of the first identifier and the second identifier; an authentication processing unit, configured to perform validity verification according to the received second request The corresponding processing related to the target demand is then performed.
  • the verification processing unit is further configured to: when the target demand is a subway trip, parse the third identifier from the second request, and An information identification code formed by the first identifier and the second identifier; performing validity check on the information identification code to confirm the authenticity of the information identification code, and parsing out from the information identification code
  • the first identifier is used to update the first identifier to the blacklist and the whitelist of the second terminal; and push the information to the first terminal.
  • the request receiving unit is further configured to: receive a third request; the third request includes a third identifier used to represent the identity of the second terminal, And an information identification code formed by the first identifier and the second identifier, and billing information obtained according to the opening request and the opening request.
  • the verification processing unit is further configured to: parse, from the third request, a third identifier, an information identifier code composed of the first identifier and the second identifier, and the billing information; After the identification code is validated to confirm the authenticity of the information identification code, a payment request is initiated according to the billing information to complete payment processing related to the subway travel; and the first identifier is parsed from the information identification code. And an identifier, the first identifier is deleted from the blacklist of the gate and the whitelist of the gate.
  • the request receiving unit is further configured to: receive billing information obtained according to the boarding request, and the billing information is encapsulated as new information into the In the second request.
  • the verification processing unit is further configured to: when the target demand is a bus travel, parse the third identifier, the information identifier formed by the first identifier and the second identifier from the second request And the billing information;
  • a system for performing information verification based on an information identification code includes: a first terminal 41, a second terminal 42, and a server 43; wherein the first terminal 41 is configured to: receive the first operation, And triggering the request for displaying the information identification code according to the first operation; responding to the first operation, generating an information identification code according to the locally stored preset policy, and carrying, in the information identification code, a identifier for characterizing the user An identifier and a second identifier used to represent the information identification code generation time; and the first request is initiated according to the information identification code, and the second terminal is requested to perform identity verification to complete the target requirement.
  • the second terminal 42 is configured to: respond to the first request, parse the first identifier and the second identifier from the information identification code; and preset the first identifier and the local storage
  • the information verification library performs comparison verification to confirm the identity of the user; compares the second identifier with the current time of the second terminal, and if the time difference is within the preset time range, the comparison is verified and accepted.
  • a first request initiated by the first terminal; a third identifier for characterizing the identity of the second terminal, and an information identifier code composed of the first identifier and the second identifier are encapsulated into the second request and sent Give the server.
  • the server 43 is configured to perform corresponding processing related to the target requirement after performing validity verification according to the received second request.
  • the first operation is received on the first terminal side, and the request for displaying the information identification code is triggered according to the first operation.
  • the first terminal side responds to the first operation, and generates an information identification code according to the locally stored preset policy. It should be noted that the way to generate the information identification code is offline offline, and the terminal side does not need to interact with the background server, and does not need to use the network.
  • the information identification code carries a first identifier (such as a UID) for characterizing the user identity and a second identifier (such as a time stamp) for characterizing the information identification code generation time.
  • the first terminal initiates a first request according to the information identifier that carries the first identifier (such as a UID) and the second identifier (such as a timestamp), and requests the second terminal to perform identity verification to complete the target by using the first request. demand.
  • the information identifier such as a UID
  • the second identifier such as a timestamp
  • the first terminal aligns the two-dimensional code with the identification area on the second terminal to scan the code, requests the second terminal to release the first terminal and scans the code into the station, and then needs the second The terminal releases the first terminal outbound, and through the matching of the blacklist of the entry gate and the whitelist of the gate, the identity verification of the inbound and outbound of the same user can be performed, and the subway travel demand of the user is satisfied after the verification is passed;
  • the first terminal aligns the two-dimensional code with the identification area on the second terminal to scan the code, requests the second terminal to scan the first terminal, and uses the matching of the malicious list to perform identity verification.
  • the gate After meeting the user's bus travel demand, whether it is the subway scene or the bus scene, the gate is offline and the local information verification library is compared and verified. For the bus scenario, it is a verification. For the subway scenario, the secondary verification of the inbound and outbound, the method of combining the information identification code is also an offline offline mode.
  • the embodiment of the present invention is a dual offline offline mechanism, and does not need to consider the network state. , no need to connect to the network, online payment delay confirmation payment after subsequent payment.
  • the second terminal parses the first identifier (such as a UID) and the second identifier (such as a timestamp) from the information identifier, where the second terminal
  • the identifier (such as UID) is compared with the locally stored preset information verification library to confirm the identity of the user.
  • the second terminal compares the second identifier (such as a timestamp) with the current time of the second terminal. If the time difference is within a preset time range (eg, 1 minute), the second terminal accepts the first request initiated by the first terminal (mobile terminal).
  • the dimension code is encapsulated into the second request and sent to the server.
  • the server performs payment processing related to the target requirement after performing validity verification according to the received second request.
  • the payment processing includes direct debit or initiation of a dunning process, wherein if there is a balance in the user account, the deduction is directly made. If there is no balance in the user account, the dunning is initiated, and if the user does not pay, the application cannot be used.
  • Generate a QR code which means that you can't travel by car (metro or bus).
  • a dual offline offline mechanism is adopted, that is, 1) the two-dimensional code is generated offline, and does not need to interact with the background server online; 2) the gate terminal local comparison verification does not need to interact with the background server online.
  • Asymmetric encryption is used, which is different from Alipay and related technologies (currently an online solution that interacts with the background).
  • the mobile terminal, the gate terminal and the background server are involved, and in practical applications, the system is not limited to these interactive execution entities.
  • the second terminal is further configured to: after encrypting the information identification code by a private key to obtain an information identification code in an encrypted form, the encryption
  • the formal information identification code is decrypted according to an asymmetric encryption and decryption policy and using a public key and the first identifier and the second identifier are parsed therefrom.
  • the first terminal is further configured to: when the target demand is a subway travel, the first request initiated according to the information identification code is a request for entry, request The second terminal releases the first terminal into the station and scans the code into the station.
  • the second terminal is further configured to: if the first identifier is in the malicious number pool, reject the gate request initiated by the first terminal; if the first identifier is in the blacklist, reject Receiving a request for entry by the first terminal; if the first identifier does not exist in the malicious number database and the blacklist of the entry, accepting a request for entry initiated by the first terminal, The first identifier is added to the entry blacklist.
  • the server is further configured to: parse the third identifier from the second request, and form the first identifier and the second identifier.
  • An information identification code after verifying the validity of the information identification code, to confirm the authenticity of the information identification code, parsing the first identifier from the information identification code, and updating the first identifier to The blacklist of the second terminal and the whitelist of the gate are entered; the information of the gate has been pushed to the first terminal.
  • the first terminal is further configured to: after the server pushes the information to the first terminal, the server initiates a gate request according to the information identifier, and requests the second The terminal releases the first terminal and scans the code outbound; the second terminal is further configured to: respond to the opening request, and parse the first identifier and the location from the opening request Determining the second identifier; when comparing the first identifier with the locally stored preset information verification library to confirm the identity of the user, if the first identifier is in the malicious number database, rejecting the first terminal The initiated request for the exit; if the first identifier is not in the white list of the gate, the request for the gate initiated by the first terminal is rejected; if the first identifier is in the whitelist of the gate, The second identifier is compared with the current time of the second terminal. If the time difference is within the preset time range, the comparison verification is passed, and the first terminal initiates the gate request, and the first
  • the second terminal is further configured to: form, by the first identifier and the second identifier, a third identifier that is used to identify the identity of the second terminal.
  • the information identification code, the billing information obtained according to the entry request and the opening request is encapsulated into a third request and sent to a server;
  • the server is further configured to: parse out the third request a third identifier, an information identifier code composed of the first identifier and the second identifier, and the billing information; after validating the information identifier code to confirm the authenticity of the information identifier code, Initiating a payment request according to the billing information to complete payment processing related to subway travel; parsing the first identifier from the information identification code, and using the first identifier from the blacklist and the exit The gate white list is deleted.
  • the first terminal is further configured to: when the target demand is a bus travel, the first request initiated according to the information identification code is a ride request, and the request is The second terminal scans and releases the first terminal; the second terminal is further configured to: if the first identifier is in the malicious number database, reject the ride request initiated by the first terminal; If the first identifier does not exist in the malicious number database, accept the ride request initiated by the first terminal, and add the first identifier to the malicious number blacklist.
  • the server is further configured to: after the billing information obtained according to the boarding request is encapsulated into a second request and sent to a server, Determining, in the second request, a third identifier, an information identifier code composed of the first identifier and the second identifier, and the billing information; performing validity verification on the information identifier code to confirm the information identifier After the authenticity of the code, the payment request is initiated according to the billing information to complete the payment processing related to the bus travel; the first identifier is parsed from the information identification code, if the user identified by the first identifier is The malicious user updates the first identifier to the malicious number blacklist and sends the malicious number blacklist to the second terminal.
  • the system for performing information verification based on the two-dimensional code in the embodiment of the present invention includes: a first terminal, a second terminal, and a server; wherein the first terminal is configured to receive And the first operation, the request for displaying the information identification code is triggered according to the first operation; and responding to the first operation, generating an information identification code according to the locally stored preset policy, where the information identification code carries the identifier for carrying a first identifier of the user identity and a second identifier for characterizing the information identification code generation time; initiating a gate request or a gate request according to the information identifier code, requesting the second terminal to perform identity verification to complete the target of the subway travel demand.
  • the second terminal is configured to: respond to the incoming request or the outgoing request, and parse the first identifier and the second identifier from the information identification code;
  • the locally stored preset information verification library performs comparison verification to confirm the user identity; the second identifier is compared with the current time of the second terminal, and if the time difference is within the preset time range, the ratio is Passing the verification, the second terminal accepts the incoming request or the outgoing request initiated by the first terminal; the third identifier used to characterize the identity of the second terminal, and the first identifier and the second identifier
  • the information identification code is encapsulated into the second request and sent to the server.
  • the server is configured to perform corresponding processing related to the subway travel after performing validity verification according to the received second request.
  • the system for performing information verification based on the two-dimensional code in the embodiment of the present invention includes: a first terminal, a second terminal, and a server; wherein the first terminal is configured to receive And the first operation, the request for displaying the information identification code is triggered according to the first operation; and responding to the first operation, generating an information identification code according to the locally stored preset policy, where the information identification code carries the identifier for carrying a first identifier of the user identity and a second identifier for characterizing the information identification code generation time; initiating a ride request according to the information identifier code, requesting the second terminal to perform identity verification to complete the target requirement of the bus travel.
  • the second terminal is configured to: respond to the ride request, parse the first identifier and the second identifier from the information identifier code; and store the first identifier with a locally stored pre
  • the information verification library is configured to perform the comparison verification to confirm the identity of the user; the second identifier is compared with the current time of the second terminal, and if the time difference is within the preset time range, the comparison is verified.
  • the server is configured to perform corresponding processing related to the bus travel after performing validity verification according to the received second request.
  • a microprocessor for the processor for data processing, a microprocessor, a central processing unit (CPU), a digital signal processor (DSP, Digital Singnal Processor) or programmable logic may be used when performing processing.
  • An FPGA Field-Programmable Gate Array
  • An operation instruction for a storage medium, includes an operation instruction, where the operation instruction may be computer executable code, and the operation instruction is used to implement the information processing method in the foregoing embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a terminal hardware according to an embodiment of the present invention.
  • the terminal described in this embodiment includes a first terminal (such as a mobile phone terminal) and a second terminal (a gate terminal). All may include: a processor 601, a network interface 602, and a memory 603.
  • the processor 601, the network interface 602, and the memory 603 can be connected by using a bus or other manners.
  • the processor 601, or a central processing unit (CPU), is a computing core and a control core of the terminal.
  • the network interface 602 can optionally include a standard wired interface, a wireless interface (such as WI-FI, a mobile communication interface, etc.), and is controlled by the processor 601 for transmitting and receiving data.
  • a wireless interface such as WI-FI, a mobile communication interface, etc.
  • the memory 603 is a memory device of the terminal for storing programs and data. It can be understood that the memory 603 herein may be a high-speed RAM memory, or may be a non-volatile memory, such as at least one disk memory; optionally, at least one of the processors 601 located away from the foregoing processor 601. Storage device.
  • the memory 603 provides storage space.
  • a system for information verification based on an information identification code each include one or more processors and a memory, and one or more programs, Wherein the one or more programs are stored in a memory, the program can include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute the instructions.
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, including the following operations:
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a first request according to the information identification code, and requests the second terminal to perform identity verification to complete the target requirement;
  • the second terminal responds to the first request, and parses the first identifier and the second identifier from the information identifier code;
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. First request;
  • the second terminal encapsulates the third identifier used to identify the identity of the second terminal, and the information identifier code formed by the first identifier and the second identifier into the second request, and sends the identifier to the server;
  • the server performs a corresponding process related to the target requirement after performing validity verification according to the received second request.
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, and further includes the following operations:
  • the second terminal responds to the first request, and decrypts the information identification code in the encrypted form according to an asymmetric encryption and decryption policy and uses a public key to parse the first identifier and the second identifier from the second identifier. .
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, and further includes the following operations:
  • the target requirement is that when the subway travels, the first request initiated by the first terminal according to the information identification code is a request for entry, and the second terminal is requested to release the first terminal into the station and scan the code into the station;
  • the second terminal rejects the first identifier and the locally stored preset information check library to verify the identity of the user. If the first identifier is in the malicious number database, the second terminal rejects If the first identifier is in the blacklist of the gate, the second terminal rejects the request for the gate initiated by the first terminal; if the first identifier does not exist in the In the malicious number database and the blacklist, the second terminal accepts the incoming request initiated by the first terminal, and adds the first identifier to the blacklist.
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, and further includes the following operations:
  • the server parses the third identifier from the second request, and the information identifier code composed of the first identifier and the second identifier;
  • the server After the server performs validity check on the information identification code to confirm the authenticity of the information identification code, the first identifier is parsed from the information identification code, and the first identifier is updated to the second terminal.
  • the server pushes the gated information to the first terminal.
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, and further includes the following operations:
  • the first terminal After the server pushes the information to the first terminal, the first terminal initiates a gate request according to the information identification code, and requests the second terminal to release the first terminal and scan and exit the station;
  • the second terminal responds to the opening request, and parses out the first identifier and the second identifier from the opening request;
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the identity of the user, if the first identifier is in the malicious number database, the second terminal rejects the If the first identifier is not in the whitelist of the gate, the second terminal rejects the gate request initiated by the first terminal; if the first identifier is at the gate white In the list, the second terminal compares the second identifier with the current time of the second terminal, and if the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the A terminal initiated initiation request deletes the first identifier from the white list of the gate.
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, and further includes the following operations:
  • the second terminal is configured to identify a third identifier of the second terminal identity, an information identification code composed of the first identifier and the second identifier, and bill information obtained according to the entry request and the opening request Encapsulated into a third request and sent to the server;
  • the server parses the third identifier, the information identifier code composed by the first identifier and the second identifier, and the billing information from the third request;
  • the server performs validity check on the information identification code to confirm the authenticity of the information identification code, and initiates a payment request according to the billing information to complete payment processing related to subway travel;
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, and further includes the following operations:
  • the first request initiated by the first terminal according to the information identification code is a ride request, and the second terminal is requested to scan and release the first terminal;
  • the second terminal rejects the first identifier and the locally stored preset information check library to verify the identity of the user. If the first identifier is in the malicious number database, the second terminal rejects The first terminal initiates a ride request; if the first identifier does not exist in the malicious number store, the second terminal accepts the ride request initiated by the first terminal, adding the first identifier Into the malicious number blacklist.
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, and further includes the following operations:
  • Billing information obtained according to the boarding request is encapsulated into a second request and sent to the server;
  • the server parses the third identifier, the information identifier code composed by the first identifier and the second identifier, and the billing information from the second request;
  • the server performs validity check on the information identification code to confirm the authenticity of the information identification code, and initiates a payment request according to the billing information to complete payment processing related to bus travel;
  • the server parses the first identifier from the information identifier, and if the user identified by the first identifier is a malicious user, the first identifier is updated to the malicious number blacklist, and the second terminal is malicious. Blacklist of numbers.
  • a system for information verification based on an information identification code each include one or more processors and a memory, and one or more programs, Wherein the one or more programs are stored in a memory, the program can include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute the instructions.
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, including the following operations:
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a gate request or a gate request according to the information identifier, and requests the second terminal to perform identity verification to complete the target requirement of the subway travel;
  • the second terminal responds to the incoming request or the outgoing request, and parses the first identifier and the second identifier from the information identification code;
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. Request for entry or request for departure;
  • the second terminal encapsulates the third identifier used to identify the identity of the second terminal, and the information identifier code formed by the first identifier and the second identifier into the second request, and sends the identifier to the server;
  • the server performs a corresponding process related to the subway travel after performing validity verification according to the received second request.
  • a system for information verification based on an information identification code each include one or more processors and a memory, and one or more programs, Wherein the one or more programs are stored in a memory, the program can include one or more modules each corresponding to a set of instructions, the one or more processors being configured to execute the instructions.
  • the processor performs a method for information verification based on the information identification code based on one or more programs in the memory, including the following operations:
  • the first terminal side responding to the first operation, the first terminal side generates an information identification code according to the locally stored preset policy, where the information identification code carries a first identifier for characterizing the user identity and is used for characterizing the information identification code. Generating a second identifier of the time;
  • the first terminal initiates a ride request according to the information identification code, and requests the second terminal to perform identity verification to complete the target requirement of the bus travel;
  • the second terminal responds to the ride request, and parses the first identifier and the second identifier from the information identifier code;
  • the second terminal compares the first identifier with the locally stored preset information verification library to confirm the user identity
  • the second terminal compares the second identifier with the current time of the second terminal. If the time difference is within the preset time range, the comparison is verified, and the second terminal accepts the first terminal. Boarding request;
  • the second terminal encapsulates the third identifier used to identify the identity of the second terminal, and the information identifier code formed by the first identifier and the second identifier into the second request, and sends the identifier to the server;
  • the server After the server performs validity verification according to the received second request, the server performs corresponding processing related to the bus travel.
  • a computer storage medium is stored in the computer storage medium, and the computer executable medium is used to execute the method for performing information verification based on the information identification code according to the embodiment of the present invention.
  • the embodiments of the present invention are used to distinguish between subway travel and bus travel, respectively.
  • the "traffic code” appearing in the following description refers to a string of characters used to replace the user's payment request to the hand Q in the background, including the buyer identity information UID, the payment method, the time stamp, and the security check information.
  • the form of the QR code is displayed.
  • “UID” refers to the user's identity, and each user has a unique UID.
  • the specific expression form of the traffic code is a two-dimensional code, and details are not described herein.
  • Scene 1 In the subway travel scene, use the two-dimensional code to take the subway to quickly pass the double offline solution of the gate (2 times verification).
  • the traffic code (the specific form is a two-dimensional code) is taken as a subway ticket.
  • Now taking the subway is a physical one-way ticket or a card.
  • it is equivalent to virtualizing the physical ticket and putting it into the mobile phone that you carry. This is not only easy to use, but also saves users from waiting in line to buy tickets.
  • Adopt dual offline verification mechanism At the time of crossing the screen, the mobile phone was offline and offline, and the gate was also offline and offline. When the gate is offline, it will ensure the rapid and stable user's crossing at the time (the Ministry of Communications requires 300Ms), and if online verification is used, it will not be able to reach 300ms; After passing through the gate, the user's traffic code information is sent to the server for background verification. If it is an illegal user, it will not be released when the user opens the gate, achieving the unification of quick security and capital security.
  • the intelligentization of the gates has been realized, and the joint gate hardware equipment manufacturers have formed a complete set of safety verification mechanisms to ensure the safety of the two-dimensional code offline verification and the reliability of the verification method.
  • the above mechanism is carried in the application (APP) of the mobile phone QQ, the traffic code is generated by the QQ client of the mobile phone, and the traffic code is scanned by the gate to realize fast switching and charging.
  • the specific operation interactions include: 1) The opening process requires the user to apply for a local card, which is equivalent to electronically digitizing the card, as shown in Figure 3. 2) After the application is successful, the traffic code will be displayed, and the user can scan the code to enter the gate, exit, and deduct after the gate, as shown in Figure 4.
  • the entire interactive process is simple and clear, and the user has a low threshold, which is consistent with the existing user experience of brushing the QR code.
  • the dual offline scheme of using the QR code to take the subway through the gate quickly includes the following:
  • Coded character set alphanumeric data (numbers 0 to 9; uppercase letters A to Z; 9 other characters: space, $, %, *, +, -, ., /, :);
  • the two-dimensional code consists of a string of length 148 obtained by converting 111 bytes through base64.
  • the base64 plaintext data is shown in Table 1:
  • Certificate data The certificate consists of the certificate plain text and the signature data, as shown in Table 2:
  • Timestamp verification data as shown in Table 4:
  • TAC Transaction Verification Code
  • the gate needs to scan the code to identify the traffic code, and verify the traffic code, including time stamp information, certificate signature information and user identity.
  • the account issuer refers to the background server, and the terminal operator can be a local card company or a subway bus company or a third-party service company.
  • the terminal refers to the gate machine, and the mobile phone refers to the mobile phone QQ App.
  • the specific verification mechanism is as shown in the figure. As shown in FIG. 5, the account issuer dynamically generates a user public-private key pair and generates a TAC key; the user APP (such as WeChat, Hand Q) applies for a user certificate to the account issuer and downloads the user private key and TAC required to generate the two-dimensional code.
  • terminal scan code machine
  • download account issuer's public key and user public key are used to verify user certificate and timestamp MAC
  • terminal operator is responsible for transaction collection and upload, and public key transparent transmission
  • clock synchronization server It is necessary to calibrate the always-synchronization between the terminal and the user; the certificate signed by the account issuer private key can be solved only by the corresponding account issuer public key in the terminal, and the timestamp data encrypted by the user APP private key is only the user in the terminal device.
  • the public key can be solved, and the uniqueness of the TAC code is combined to ensure the security of the transaction.
  • the terminal confirms the user's real identity and credit information through the mechanism of verifying the certificate; the account issuer determines the authenticity of the user to display the two-dimensional code by verifying the TAC; the terminal improves the two-dimensional code to be copied and stolen by verifying the timestamp MAC. Difficulty and cost; in order to ensure the consistency of the time stamp verification data, the mobile APP and the terminal need to synchronize the clock on the same server; the account issuer is responsible for maintaining the security of the certificate private key, MAC subkey and TAC key; terminal operation The party is responsible for the security of the MAC root key and the authenticity of the payment verification process.
  • Step 301 The user opens the application and requests to display the two-dimensional code.
  • Step 302 When the card balance is insufficient, the QR code is not generated, and the user is reminded that the balance is insufficient. Please recharge.
  • Step 303 Generate a two-dimensional code.
  • Step 304 The user brushes the two-dimensional code into the gate.
  • the verification of the brush QR code entry includes: preliminary judgment of the validity of the two-dimensional code, blacklist verification of the UID, time stamp verification, and other security check.
  • Step 305 After the gate is opened, the UID is updated to the blacklist of the gate.
  • Steps 306-307 uploading the gate ID and the two-dimensional code information.
  • Step 308 the QR code is verified in the background.
  • the verification here includes: QR code validity check, card balance check, wind control check, and other security check.
  • Step 309 black and white list update. Specifically, the UID is updated to the blacklist of the gate, and the UID is updated to the whitelist of the gate.
  • Step 310 Push the user to enter the gate and the site QQ information.
  • Step 311 Send a blacklist and a whitelist to the gate.
  • step 312 the entry gate updates the blacklist gate to update the whitelist.
  • Step 313 The user brushes the two-dimensional code to start the gate.
  • the verification of the brush QR code exit includes: preliminary judgment of the validity of the two-dimensional code, verification of the white list of the UID, time stamp verification, and other security check.
  • Steps 314-316 opening the gate, and then uploading the gate ID and the two-dimensional code information to generate a bill.
  • Step 317 Upload the gate ID, the QR code, and the bill.
  • Step 318 the QR code is verified in the background.
  • the verification includes: two-dimensional code validity check, card balance check, wind control check, other security check, and the like.
  • Steps 319-320 initiate deduction, synchronize bills, initiate deductions.
  • Steps 321-324 the return deduction is successful, the UID entry gate black and white list is deleted, and the return user is successfully debited.
  • the gate judges that the user is offline when passing, but after the release, it is necessary to upload the user data and the gate ID to the subway/transit background and upload to the background server. , check and parse the data.
  • For the entry blacklist set the blacklist when entering the gate. When the user passes the gate, the user's UID is added to the blacklist, and the blacklist is sent to all the entries through the subway company's local area network or background server. Gate machine. When the server-side command is not received, the blacklist also needs to be updated periodically. The blacklist data except for a certain period of time (such as 2 hours) is completely cleared.
  • the white list of the gate For the subway scene, after the user passes the gate, after the background server determines that the QR code is available, the user UID is sent to the white list of all the gates, only in the whitelist. The user can pass the gate. After the user starts the gate and the deduction is successful by the background, the transaction is completed, and the command is sent in the background to clear the user in the blacklist and whitelist.
  • the whitelist also needs to be updated regularly, which is based on the maximum stay time allowed by the MTRC.
  • the background server detects that a user is a malicious user or is at risk of maliciously spreading the traffic code, the UID is added to the malicious list and sent to all the gates, and the traffic code is no longer generated for this user.
  • the blacklist effectively prevents the risk of the QR code being repeatedly copied into the gate.
  • the whitelist is modeled on the current bus card mechanism. Only the user enters through the QQ wallet scan code channel to start the gate in the same way. Those who have already entered the gate with illegal or insufficient balances can pass the background judgment to flexibly control the user's exit or not.
  • the malicious list can effectively prevent the risk of malicious users stealing or distributing traffic codes, and protect the security of users' funds.
  • UID User identification information
  • the user timestamp information is used to inform the time when the gate QR code is generated, and the QR code within 1 minute will be released;
  • UID User identification information
  • the user timestamp information is used to inform the time when the gate QR code is generated, and the QR code within 1 minute will be released;
  • the background server side verification is that after receiving the user QR code data and the gate ID sent by the subway, the server will judge the validity of the payment request, including the following points:
  • the server will maintain the black and white list mechanism of the gate, determine the validity of the user's QR code data, initiate a chargeback request and push the relevant QQ message.
  • Time stamp verification The traffic code contains timestamp information, and the gate first judges the initial test. If it is the traffic code generated before 1 minute, it will refuse to release.
  • the blacklist mechanism for entry In the subway scene, after a user enters the gate through the traffic code, the gate resolves the user UID information and uploads it to the backstage of the subway, and then uploads it to the background server. After determining that the legitimate traffic code of the user is valid, the user UID is passed through the subway. The background is sent to all the blacklists of the gates. All subsequent applications for this user will be rejected until the blacklist expires (2 hours) or the user's trip record is detected.
  • the traffic code of the user who has entered the gate is added to the blacklist of the bus gate terminal, and the traffic code is rejected to be used again. If a malicious user is detected, the UID of the user is added to the gate. Blacklist, all traffic codes generated by this user will be blocked and no new QR code will be generated for them. The blacklist is also valid for 2 hours.
  • the whitelist mechanism of the gate after the user UID parsed by the gate is sent to the backend server, after the validity judgment is valid, the user UID is updated to all the whitelists of the gates, only in this whitelist. The UID will be released at the gate. And after the user opens, the UID will be deleted from the black and white list.
  • the effectiveness of the whitelist depends on the specific subway environment in each city and is tentatively set at 2 hours. This ensures that the user will release the gate when it has a record of entry, consistent with the experience of using a one-way ticket and a card.
  • the white list of the gate is not updated in time due to network delay.
  • the strategy at this time is to remind the user to try again later, and to update the whitelist in the background. If it is a network failure of the gate, only the detection mechanism can be added at this time.
  • it will be processed in time. After the user traffic code enters the gate, there is no order processing for the gate record within a certain period of time.
  • the user After the user enters the gate, or because the destination subway station does not support the scanning code, or because it is inconvenient, or because the mobile phone has no power, the user chooses the subway station to manually exit, but within 2 hours, the user wants to enter the gate through the traffic code. Because the user is still blacklisted at this time, it is necessary to take measures:
  • the bus and subway do not share a blacklist.
  • the blacklist of the subway entry and the blacklist of the bus entry are not open and maintained separately.
  • Such a sub-user subway station can also quickly use the traffic code to take a bus transfer after the outbound station.
  • the application scenario adopts the embodiment of the present invention, and truly realizes that the user can take the bus and the subway by using any mobile phone, and is applicable to all models and all types of mobile phones; the user can quickly and conveniently pass the subway bus gate by using the traffic code.
  • NFC physical card
  • the user can apply for a traffic card to the phone anytime, anywhere, without having to queue to buy, no need Pay the deposit; the funds are safe, use the QQ wallet account as the payment channel, the funds are safe, and the settlement process is clear; the data construction, through the big data collection user's travel data, can help the relevant departments to rationally allocate resources, make the traffic resource allocation more reasonable, travel Faster and more convenient.
  • a semi-offline solution can also be adopted, that is, in the case where the network connection allows, the real-time online verification of the gate can be adopted, and the quick and safe gate verification can be achieved. It is also possible to adopt the scheme of credit payment, that is, there is no need for the gate to do too much security verification, only the UID information of the user is extracted after the gate is scanned, and the mode of deduction is summarized afterwards, where the user's credit endorsement is required.
  • a traffic code (specifically expressed in a two-dimensional code) is used as a bus ticket. Now it takes cash or a card to take the bus. In this scenario, it is equivalent to virtualizing the physical ticket and putting it into the mobile phone that you carry with you. This is not only easy to use, but also saves users from waiting in line to buy tickets.
  • Adopt dual offline verification mechanism At the time of crossing the screen, the mobile phone was offline and offline, and the gate was also offline and offline. When the gate is offline, it will ensure the speed and stability of the user at the time of the gate (the Ministry of Communications requires 300Ms), and if online verification is adopted, it is impossible to reach 300ms. After the gate is turned on, the user's traffic code information is sent to the server for background verification, and if it is an illegal user, the user is added to the malicious list. The program has achieved the unification of fast security and financial security. The intelligentization of the gate is realized.
  • the joint gate hardware device manufacturer of the invention invents a complete set of security verification mechanism to ensure the security of the two-dimensional code offline verification and the reliability of the verification mode.
  • the above mechanism is carried in the mobile phone QQ APP, the traffic code is generated by the mobile QQ client, and the traffic code is scanned by the gate to realize fast switching and charging.
  • the specific operation interactions include: 1) The opening process requires the user to apply for a local card, which is equivalent to electronically digitizing the card, as shown in Figure 3. 2) After the application is successful, the traffic code will be displayed, and the user can scan the code to enter the gate, exit, and deduct after the gate, as shown in Figure 4.
  • the entire interactive process is simple and clear, and the user has a low threshold, which is consistent with the existing user experience of brushing the QR code.
  • the dual offline solution for fast transit through the gate using the QR code includes the following:
  • Coded character set alphanumeric data (numbers 0 to 9; uppercase letters A to Z; 9 other characters: space, $, %, *, +, -, ., /, :);
  • the two-dimensional code consists of a string of length 148 obtained by converting 111 bytes through base64.
  • the base64 plaintext data is shown in Table 6:
  • Certificate data The certificate consists of the certificate plain text and the signature data, as shown in Table 7:
  • TAC Transaction Verification Code
  • the gate needs to scan the code to identify the traffic code, and verify the traffic code, including time stamp information, certificate signature information and user identity.
  • the account issuer refers to the background server, and the terminal operator can be a local card company or a subway bus company or a third-party service company.
  • the terminal refers to the gate machine, and the mobile phone refers to the mobile phone QQ App.
  • the specific verification mechanism is as shown in the figure. 5 is shown.
  • Step 401 The user opens the application and requests to display the two-dimensional code.
  • Step 402 When the card balance is insufficient, the QR code is not generated, and the user is reminded that the balance is insufficient, please recharge.
  • Step 403 Generate a two-dimensional code.
  • Step 404 The user brushes the QR code to board the vehicle.
  • the verification of the two-dimensional code boarding includes: preliminary judgment of the validity of the two-dimensional code, malicious list verification, time stamp verification, other security check, and the like.
  • Step 405 release, and then update the UID to the malicious list.
  • Steps 406-407 uploading the gate ID and the two-dimensional code information, and generating a bill.
  • Step 408 Upload a gate ID, a two-dimensional code, and a bill.
  • Step 409 the QR code is verified in the background.
  • the verification includes: two-dimensional code validity check, card balance check, wind control strategy check, other security check, and the like. If it is a malicious user, the UID is also added to the malicious list.
  • Step 410 Initiating a deduction.
  • Step 411 Synchronize the bill and initiate the deduction.
  • Steps 412-415 returning the debit information, sending a malicious list to the gate, and returning the user to debit the payment successfully.
  • the gate judges that the user is offline when passing, but after the release, it is necessary to upload the user data and the gate ID to the subway/transit background and upload to the background server. , check and parse the data.
  • a malicious blacklist mechanism is introduced because the gate is required to be offline at the time.
  • the malicious blacklist effectively prevents the risk of the QR code being repeatedly copied into the gate, effectively preventing the risk of malicious users stealing or distributing the traffic code, and ensuring the security of the user's funds.
  • the bus does not have the concept of exiting, and the blacklist stores two codes: 1) the traffic code itself, the traffic code used by the user must be blacklisted to avoid being reused and copied.
  • the bus background or the back-end server is sent to all the gates, and the data outside the certain time (such as 2 hours) is cleared. 2) UID, when the background server detects that the user transaction is not normal, such as a large number of transactions in a short period of time, the UID of the user will be blacklisted, and all generated QR codes of the user will not be released, and No new QR codes are generated.
  • the user only enters the gate, and when the background server determines that the two-dimensional code is legal, the deduction operation can be initiated.
  • the background server side verification is that after receiving the user QR code data and the gate ID sent by the bus, the server will judge the validity of the payment request, including the following points:
  • the server will maintain the malicious blacklist mechanism of the gate, determine the validity of the user's QR code data, initiate a chargeback request and push the relevant QQ message.
  • the traffic code is essentially a two-dimensional code, which is easier to copy and propagate than NFC, and in the case of offline verification, if large-scale replication occurs, the consequences are more serious.
  • the program has taken the following measures to deal with:
  • Time stamp verification The traffic code contains timestamp information, and the gate first judges the initial test. If it is the traffic code generated before 1 minute, it will refuse to release.
  • the strategy is: 1) Introducing asymmetric encryption.
  • the traffic code is encrypted by an asymmetric encryption mechanism, the private key is in the background server, the public key is at the gate, and can be updated periodically (24 hours) as needed, thus avoiding the risk of the QR code being cracked.
  • Malicious list mechanism If the background server detects that the QR code is forged, it will not put the UID into the malicious list.
  • the application scenario adopts the embodiment of the present invention, and truly realizes that the user can take the bus and the subway by using any mobile phone, and is applicable to all models and all types of mobile phones; the user can quickly and conveniently pass the subway bus gate by using the traffic code.
  • NFC physical card
  • the user can apply for a traffic card to the phone anytime, anywhere, without having to queue to buy, no need Pay the deposit; the funds are safe, use the QQ wallet account as the payment channel, the funds are safe, and the settlement process is clear; the data construction, through the big data collection user's travel data, can help the relevant departments to rationally allocate resources, make the traffic resource allocation more reasonable, travel Faster and more convenient.
  • a semi-offline solution can also be adopted, that is, in the case where the network connection allows, the real-time online verification of the gate can be adopted, and the quick and safe gate verification can be achieved. It is also possible to adopt the scheme of credit payment, that is, there is no need for the gate to do too much security verification, only the UID information of the user is extracted after the gate is scanned, and the mode of deduction is summarized afterwards, where the user's credit endorsement is required.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored or not executed.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the unit may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated into one unit;
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed.
  • the foregoing storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.
  • ROM read-only memory
  • RAM random access memory
  • magnetic disk or an optical disk.
  • optical disk A medium that can store program code.
  • the above-described integrated unit of the present invention may be stored in a computer readable storage medium if it is implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a mobile storage device, a ROM, a RAM, a magnetic disk, or an optical disk.
  • the technology for realizing the ticket virtualization benefits all the people, and the application scope is wide.
  • the universal design is originally intended to meet the user's needs, and is convenient for subsequent expansion and development; even if the network is not good, such as no network or network situation, In a good case, the verification can also be implemented. Even if the network condition is not good, the offline verification of the embodiment of the present invention does not cause a large amount of retention and queuing of the user due to network fluctuations, which is a mechanism for quickly implementing verification.

Abstract

本发明实施例公开了一种基于信息标识码进行信息验证的方法、终端及计算机存储介质,其中,所述方法包括:生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;第一终端根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求。

Description

一种基于信息标识码进行信息验证的方法及终端
相关申请的交叉引用
本申请基于申请号为201710061391.1、申请日为2017年01月25日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本发明涉及信息验证技术,尤其涉及一种基于信息标识码进行信息验证的方法、终端及计算机存储介质。
背景技术
地铁、公交出行是用户生活中不可或缺的部分,目前都是采用实体的单程票或者一卡通作为车票进行乘车。随着终端的智能化和联网的便捷性,将车票虚拟化成为一种新趋势,将车票虚拟化之后,用户只需要拿出手机终端在对应的识别器一刷,即可实现乘车付费。现有技术的一种车票虚拟化的技术方案是:展示二维码并通过在线验证的付费来确保用户是本人乘车付费,且只针对开通了指定付费渠道的特定用户使用。
采用现有技术存在的问题是:1)只针对特定用户,会使得用户范围受限,虚拟化的技术实现无法惠及大多数人群,适用范围狭窄,且这种对特定用户适用的设计初衷过于依赖特定的体系架构,后期不好继续进行扩展开发,只有适用大多数人群的通用性设计初衷才符合用户需求,也方便后续的扩展开发;2)联网是很方便,但是在设计时需要全面考虑各种情况,比如无网络或者网络情况不好的情况,而现有技术作为一种在线验证方案是无法满足无网络或者网络情况不好时的验证需求的,也就是说,对于无 网络情况实际上无法实现验证,即便对于网络情况不好的情况可以实现在线验证,也会因为网络状况波动导致的在线延迟使得用户大量滞留和排队,无法快速实现验证。
相关技术中,对于上述问题,尚无有效解决方案。
发明内容
有鉴于此,本发明实施例提供了一种基于信息标识码进行信息验证的方法、终端及计算机存储介质,至少解决了现有技术存在的问题。
本发明实施例的技术方案是这样实现的:
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于第一终端,所述第一终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求。
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于第二终端,所述第二终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
第二终端对第一请求进行响应,从信息标识码中解析出第一标识和第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的第一请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
本发明实施例的一种第一终端,所述第一终端包括:
触发单元,配置为接收第一操作,根据所述第一操作触发展示信息标识码的请求;
响应单元,配置为对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
请求发起单元,配置为根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求。
本发明实施例的一种第二终端,所述第二终端包括:
请求响应单元,配置为对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
验证单元,配置为将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,接受所述第 一终端发起的第一请求;
请求发送单元,配置为将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于第一终端,所述第一终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起入闸请求或出闸请求,请求第二终端对其进行身份验证以完成地铁出行的目标需求。
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于第二终端,所述第二终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
第二终端对所述入闸请求或出闸请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证 以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的入闸请求或出闸请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述地铁出行相关的对应处理。
本发明实施例的一种第一终端,所述第一终端包括:
触发单元,配置为接收第一操作,根据所述第一操作触发展示信息标识码的请求;
响应单元,配置为对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
请求发起单元,配置为根据所述信息标识码发起入闸请求或出闸请求,请求第二终端对其进行身份验证以完成地铁出行的目标需求。
本发明实施例的一种第二终端,所述第二终端包括:
请求响应单元,配置为对所述入闸请求或出闸请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
验证单元,配置为将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的入闸请求或出闸请求;
请求发送单元,配置为将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给 服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述地铁出行相关的对应处理。
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于第一终端,所述第一终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起乘车请求,请求第二终端对其进行身份验证以完成公交出行的目标需求。
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于第二终端,所述第二终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
第二终端对所述乘车请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终 端发起的乘车请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述公交出行相关的对应处理。
本发明实施例的一种第一终端,所述第一终端包括:
触发单元,配置为接收第一操作,根据所述第一操作触发展示信息标识码的请求;
响应单元,配置为对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
请求发起单元,配置为根据所述信息标识码发起乘车请求,请求第二终端对其进行身份验证以完成公交出行的目标需求。
本发明实施例的一种第二终端,所述第二终端包括:
请求响应单元,配置为对所述乘车请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
验证单元,配置为将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的乘车请求;
请求发送单元,配置为将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述公交出行相关的对应处理。
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于基 于信息标识码进行信息验证的系统,所述系统中的第一终端、第二终端和服务器各自包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求;
第二终端对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的第一请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
本发明实施例的一种基于信息标识码进行信息验证的系统,所述系统包括:第一终端、第二终端及服务器;其中,
第一终端,配置为:
接收第一操作,根据所述第一操作触发展示信息标识码的请求;
对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求;
第二终端,配置为:
对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,接受所述第一终端发起的第一请求;
将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
服务器,配置为:
根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于基于信息标识码进行信息验证的系统,所述系统中的第一终端、第二终端和服务器各自包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起入闸请求或出闸请求,请求第二终端对其进行身份验证以完成地铁出行的目标需求;
第二终端对所述入闸请求或出闸请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的入闸请求或出闸请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
服务器根据接收到的所述第二请求进行有效性验证后进行与所述地铁出行相关的对应处理。
本发明实施例的一种基于信息标识码进行信息验证的系统,所述系统包括第一终端、第二终端、服务器;其中,
所述第一终端,配置为:
接收第一操作,根据所述第一操作触发展示信息标识码的请求;
对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
根据所述信息标识码发起入闸请求或出闸请求,请求第二终端对其进行身份验证以完成地铁出行的目标需求;
所述第二终端,配置为:
对所述入闸请求或出闸请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的入闸请求或出闸请求;
将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
所述服务器,配置为:
根据接收到的所述第二请求进行有效性验证后进行与所述地铁出行相关的对应处理。
本发明实施例的一种基于信息标识码进行信息验证的方法,应用于基于信息标识码进行信息验证的系统,所述系统中的第一终端、第二终端和服务器各自包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和 用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起乘车请求,请求第二终端对其进行身份验证以完成公交出行的目标需求;
第二终端对所述乘车请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的乘车请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
服务器根据接收到的所述第二请求进行有效性验证后进行与所述公交出行相关的对应处理。
本发明实施例的一种基于信息标识码进行信息验证的系统,所述系统包括:第一终端、第二终端、服务器;其中,
所述第一终端,配置为:
接收第一操作,根据所述第一操作触发展示信息标识码的请求;
对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
根据所述信息标识码发起乘车请求,请求第二终端对其进行身份验证以完成公交出行的目标需求;
所述第二终端,配置为:
对所述乘车请求进行响应,从所述信息标识码中解析出所述第一标识 和所述第二标识;
将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的乘车请求;
将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
所述服务器,配置为:
根据接收到的所述第二请求进行有效性验证后进行与所述公交出行相关的对应处理。
本发明实施例的一种第一终端,所述第一终端包括:
触发单元,配置为在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
响应单元,配置为在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
请求发起单元,配置为根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求;
请求响应单元,配置为在第二终端对所述第一请求进行响应,并基于从所述信息标识码中解析出所述第一标识和所述第二标识进行身份验证通过后再通过第二请求向服务器申请有效性验证;所述第二请求中包含用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码;
反馈接收单元,配置为接收服务器的反馈,所述反馈为服务器根据接 收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
本发明实施例的一种服务器,所述服务器包括:
请求接收单元,配置为接收第二终端对第一请求进行响应后发起的第二请求;所述第一请求中包含由用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识所构成的信息标识码;所述信息标识码通过对第一操作进行响应时根据本地存储的预设策略生成;所述第二请求中包含用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码;
验证处理单元,配置为根据接收到的所述第二请求进行有效性验证后进行与目标需求相关的对应处理。
本发明实施例的一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行本发明实施例任一项所述的基于信息标识码进行信息验证的方法。
本发明实施例的基于信息标识码进行信息验证的方法,包括:在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;第一终端根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求。通过第一终端生成的信息标识码及其发送,以便第二终端在对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识后,将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份,第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的第 一请求,第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
采用本发明实施例,使车票虚拟化的技术实现惠及所有人群,适用范围广泛,通用性的设计初衷符合用户需求,也方便后续的扩展开发;即便在联网不好,如无网络或者网络情况不好的情况下,也能实现验证,即便对于网络情况不好的情况通过本发明实施例的离线验证,也不会因为网络状况波动导致用户大量滞留和排队,是一种快速实现验证的机制。
附图说明
图1为本发明实施例中进行信息交互的各方硬件实体的示意图;
图2为本发明实施例一方法的实现流程示意图;
图3为应用本发明实施例一场景的业务开通UI界面示意图;
图4为应用本发明实施例一场景的扣费UI界面示意图;
图5为应用本发明实施例一非对称加密场景的示意图;
图6为应用本发明实施例一地铁出行场景的流程示意图;
图7为应用本发明实施例一公交出行场景的流程示意图;
图8为应用本发明实施例终端的硬件结构示意图。
具体实施方式
下面结合附图对技术方案的实施作进一步的详细描述。
现在将参考附图描述实现本发明各个实施例的移动终端。在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本发明实施例的说明,其本身并没有特定的意义。因此,"模块"与"部件"可以混合地使用。
在下面的详细说明中,陈述了众多的具体细节,以便彻底理解本发明。不过,对于本领域的普通技术人员来说,显然可在没有这些具体细节的情况下实践本发明。在其他情况下,没有详细说明公开的公知方法、过程、组件、电路和网络,以避免不必要地使实施例的各个方面模糊不清。
另外,本文中尽管多次采用术语“第一”、“第二”等来描述各种元件(或各种阈值或各种应用或各种指令或各种操作)等,不过这些元件(或阈值或应用或指令或操作)不应受这些术语的限制。这些术语只是用于区分一个元件(或阈值或应用或指令或操作)和另一个元件(或阈值或应用或指令或操作)。例如,第一操作可以被称为第二操作,第二操作也可以被称为第一操作,而不脱离本发明的范围,第一操作和第二操作都是操作,只是二者并不是相同的操作而已。
本发明实施例中的步骤并不一定是按照所描述的步骤顺序进行处理,可以按照需求有选择的将步骤打乱重排,或者删除实施例中的步骤,或者增加实施例中的步骤,本发明实施例中的步骤描述只是可选的顺序组合,并不代表本发明实施例的所有步骤顺序组合,实施例中的步骤顺序不能认为是对本发明的限制。
本发明实施例中的术语“和/或”指的是包括相关联的列举项目中的一个或多个的任何和全部的可能组合。还要说明的是:当用在本说明书中时,“包括/包含”指定所陈述的特征、整数、步骤、操作、元件和/或组件的存在,但是不排除一个或多个其他特征、整数、步骤、操作、元件和/或组件和/或它们的组群的存在或添加。
本发明实施例的智能终端(如移动终端)可以以各种形式来实施。例如,本发明实施例中描述的移动终端可以包括诸如移动电话、智能电话、笔记本电脑、数字广播接收器、个人数字助理(PDA,Personal Digital Assistant)、平板电脑(PAD)、便携式多媒体播放器(PMP,Portable Media  Player)、导航装置等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。下面,假设终端是移动终端。然而,本领域技术人员将理解的是,除了特别用于移动目的的元件之外,根据本发明的实施方式的构造也能够应用于固定类型的终端。
图1为本发明实施例中进行信息交互的各方硬件实体的示意图,图1中包括:终端设备1、终端设备2和服务器3。其中,终端设备1由终端设备11-14构成,主要是用户手持的手机终端,终端设备2为闸机终端。终端设备通过有线网络或者无线网络与服务器进行信息交互。终端设备包括手机、台式机、PC机、一体机等类型。由于现有技术中,只针对特定用户,会使得用户范围受限,适用范围狭窄,且这种对特定用户适用的设计初衷过于依赖特定的体系架构,后期不好继续进行扩展开发;在设计时需要全面考虑各种情况,比如无网络或者网络情况不好的情况,而现有技术作为一种在线验证方案是无法满足无网络或者网络情况不好时的验证需求的,也就是说,对于无网络情况实际上无法实现验证,即便对于网络情况不好的情况可以实现在线验证,也会因为网络状况波动导致的在线延迟使得用户大量滞留和排队,无法快速实现验证;依赖二维码来实现安全机制容易被破解,用户的信息安全得不到保障。
本文中以第一终端来代表上述终端设备1(如手机终端),以第二终端来代表上述终端设备2(如闸机终端),服务器3可以为后台服务器。
针对这些问题,采用本发明实施例,如图1所示,在第一终端侧的处理逻辑10包括:S11、在第一终端(如用户手持的手机终端)侧接收第一操作,根据所述第一操作触发展示信息标识码(如二维码)的请求;S12、在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略(如二维码脱机生成策略或称二维码离线生成策略)生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识(如UID)和用于表征信息 标识码生成时间的第二标识(如时间戳),第一终端(如手机终端)根据所述信息标识码(如二维码)发起第一请求,请求第二终端(如闸机终端)对其进行身份验证以完成目标需求(如地铁场景中,手机终端将该二维码对准闸机终端上的识别区域进行扫码,请求第二终端对第一终端入站放行并予以扫码进站、及出站放行并予以扫码出站,以满足地铁出行的需求;如公交场景中,手机终端将该二维码对准闸机终端上的识别区域进行扫码,请求第二终端对第一终端予以扫码放行,以满足公交出行的需求)。在第二终端侧的处理逻辑11包括:S21、第二终端对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;S22、第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份,及第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围(如1分钟)之内,则比对验证通过;S23、第二终端接受所述第一终端(手机终端)发起的第一请求;S24、第二终端将用于表征第二终端身份的第三标识(如闸机ID)、和由所述第一标识(如UID)和所述第二标识(如时间戳)构成的信息标识码封装到第二请求中并发送给服务器。在服务器侧的处理逻辑12包括:S31、服务器根据接收到的所述第二请求进行有效性验证;S32、服务器进行与所述目标需求相关的支付处理(如扣款或催款处理)。
本发明实施例中,使车票虚拟化的技术实现惠及所有人群,适用范围广泛,通用性的设计初衷符合用户需求,也方便后续的扩展开发;即便在联网不好,如无网络或者网络情况不好的情况下,也能实现验证,即便对于网络情况不好的情况通过本发明实施例的离线验证,也不会因为网络状况波动导致用户大量滞留和排队,是一种快速实现验证的机制;不依赖二维码来实现安全机制,本发明实施例采用非对称加密机制,还可以进一步辅以多种加密手段,很难被破解,能更有效的确保用户的信息安全。
上述图1的例子只是实现本发明实施例的一个系统架构实例,本发明实施例并不限于上述图1所述的系统结构,基于上述图1所述的系统架构,提出本发明方法各个实施例。
本发明实施例的一种基于信息标识码进行信息验证的方法,如图2所示,包括:在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求(101)。目前,随着电子支付等电子服务的普及,实体码慢慢被信息识别码替代。图形码作为信息识别码中的一种类型,具体的,图形码可以包括二维码、条形码、磁条码等等。二维码由于更具便利性和使用场景的广泛性,在本发明实施例中以二维码进行举例,二维码是用某种特定的几何图形按一定规律在平面(二维方向上)分布的黑白相间的图形记录数据符号信息的;在代码编制上巧妙地利用构成计算机内部逻辑基础的“0”、“1”比特流的概念,使用若干个与二进制相对应的几何形体来表示文字数值信息,通过图象输入设备或光电扫描设备自动识读以实现信息自动处理。而条形码多用于超市的商品包装的识别,以确定商品类别、名称等。磁条码多用于银行发卡使用。二维码也可以理解为一种特殊的条形码,它具有条形码的一些共性,比如,每种码制有其特定的字符集;每个字符占有一定的宽度;具有一定的校验功能等。同时还具有对不同行的信息自动识别功能、及处理图形旋转变化点。将实体车票虚拟化成二维码后,用户只需要拿出手机终端在对应的识别器刷一刷二维码,即可实现乘车付费。在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码(102)。需要指出的是,生成信息标识码的方式是脱机离线的方式,不需要终端侧与后台服务器进行交互,不需要借助网络,其预设策略与通过后台服务器用于生成信息标识码的策略是一样的。以信息识别码为二维码为例,该预设策略中包含用于转为二维码所需的内容,比如在下载应用的场景中,二维码可以是该应用的下载网址。在本发明实施例的 地铁/公交场景中,该预设策略中所包含的用于转为二维码所需的内容为:用于表征用户身份的第一标识(如UID)和当前实时进站采集的时间信息,即第二标识(如时间戳),在预设策略中,当确定了转为二维码所需的内容后,还需要使用若干个与二进制相对应的几何形体来表示该内容,将内容转化为“0”、“1”概念的几何形体,使得几何形体按一定规律在平面(二维方向上)分布的黑白相间的图形记录数据符号信息,据此预设策略所生成的最终结果即为可以通过图象输入设备或光电扫描设备自动识别的二维码。也可以在终端安装二维码生成器,利用该二维码生成器来自动生成二维码等等。在信息标识码中携带用于表征用户身份的第一标识(如UID)和用于表征信息标识码生成时间的第二标识(如时间戳)。第一终端根据携带第一标识(如UID)和第二标识(如时间戳)的所述信息标识码发起第一请求(103),通过该第一请求来请求第二终端对其进行身份验证以完成目标需求。比如,地铁场景中,第一终端将该二维码对准第二终端上的识别区域进行扫码,请求第二终端对第一终端入站放行并予以扫码进站,后续还需要第二终端对第一终端出站放行,通过入闸黑名单和出闸白名单的匹配使用,可以对同一个用户入站和出站的放行进行身份验证,验证通过后满足该用户的地铁出行需求;比如,公交场景中,第一终端将该二维码对准第二终端上的识别区域进行扫码,请求第二终端对第一终端予以扫码,通过恶意名单的匹配使用,进行身份验证通过后满足该用户的公交出行需求,无论是地铁场景还是公交场景,都是闸机脱机与本地的信息校验库进行比对验证。对于公交场景是一次验证,对于地铁场景是入站和出站的二次验证,结合信息标识码的方式也是脱机离线的方式,本发明实施例是双离线的脱机机制,无需考虑网络状态,无需联网,后续支付时在线延时确认支付即可。第二终端对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识(如UID)和所述第二标识(如时间戳),第二终端将所 述第一标识(如UID)与本地存储的预设信息校验库进行比对验证以确认用户身份(104)。第二终端将所述第二标识(如时间戳)与第二终端当前的时间进行比对验证(105)。若时间差值在预设时间范围(如1分钟)之内,则比对验证通过,第二终端接受所述第一终端(手机终端)发起的第一请求(106)。第二终端将用于表征第二终端身份的第三标识(如闸机ID)、和由所述第一标识(UID)和所述第二标识(时间戳)构成的信息标识码(如二维码)封装到第二请求中并发送给服务器。服务器(如财付通的后台服务器,用于支付验证)根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的支付处理(107)。支付处理包括直接扣款或发起催款的处理,其中,如果用户账户中有余额,则直接扣款,如果用户账户中没有余额,则发起催款,如果用户不予支付,则无法使用该应用生成二维码,也就是说,无法实现乘车出行(地铁或公交出行)。
一个实际应用中,在手机终端侧接收第一操作,根据所述第一操作触发展示二维码的请求。在手机终端侧对所述第一操作进行响应,根据本地的二维码脱机生成策略、或二维码离线生成策略来生成二维码,在二维码中携带用于表征用户身份的UID和用于表征信息标识码生成时间的时间戳。手机终端根据所述二维码发起第一请求,请求第二终端对其进行身份验证以完成目标需求。其中,在地铁场景中,手机终端会将该二维码对准闸机终端上的识别区域进行扫码,请求第二终端对第一终端入站放行并予以扫码进站,后续还需要第二终端对第一终端出站放行,通过入闸黑名单和出闸白名单的匹配使用,可以对同一个用户入站和出站的放行进行身份验证,验证通过后满足该用户的乘车需求;在公交场景中,手机终端将该二维码对准闸机终端上的识别区域进行扫码,请求第二终端对第一终端予以扫码,通过恶意名单的匹配使用,进行身份验证通过后满足该用户的乘车需求。闸机终端对第一请求进行响应,从所述二维码中解析出所述UID 和所述时间戳;闸机终端将所述UID与本地存储的预设信息校验库进行比对验证以确认用户身份,之后,闸机终端将时间戳与闸机终端当前的时间进行比对验证,若时间差值在预设时间范围,比如1分钟之内,则比对验证通过,闸机终端接受手机终端发起的第一请求。
一个实际应用中,闸机终端将用于表征闸机终端身份的闸机ID、和由所述UID和所述时间戳构成的二维码封装到第二请求中并发送给服务器。
一个实际应用中,在上述的验证中,不仅包括UID和时间戳的比对验证,还包括有效性验证和其它安全验证。其中,地铁场景是在UID和时间戳的验证中,将UID与入闸黑名单比对验证,将时间戳比对验证时看该时间戳与闸机当前的时间相比,时间差值是否在1分钟之内;而公交场景是在UID和时间戳的验证中,将UID与恶意名单比对验证,将时间戳比对验证时看该时间戳与闸机当前的时间相比,时间差值是否在1分钟之内,如果比对验证通过,则闸机终端接受手机终端发起的第一请求,比如,在地铁场景中予以放行入站和放行出站后乘车;而公交场景中是直接乘车。闸机终端将用于表征闸机终端身份的闸机ID、和由UID和时间戳构成的二维码封装到第二请求中并发送给服务器。服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求(如地铁出行或公交出行)相关的支付处理(扣款或催款处理)。
采用本发明实施例,采用双脱机离线机制,即:1)二维码脱机生成,无需与后台服务器在线交互;2)闸机终端本地比对验证,无需与后台服务器在线交互。采用非对称加密,与相关的技术相区别(目前都是与后台交互的在线方案)。在系统中涉及手机终端,闸机终端及后台服务器,在实际应用中系统不限于这些交互执行实体。
本发明实施例的一种基于信息标识码进行信息验证的方法,包括:在第一终端(如手机终端)侧接收第一操作,根据所述第一操作触发展示信 息标识码(如二维码)的请求;在第一终端(如手机终端)侧对所述第一操作进行响应,根据本地存储的预设策略(如二维码脱机生成策略或称二维码离线生成策略)生成加密形式的信息标识码(如二维码),在所述加密形式的信息标识码(如二维码)中携带用于表征用户身份的第一标识(如UID)和用于表征信息标识码生成时间的第二标识(时间戳);第一终端(如手机终端)根据所述加密形式的信息标识码(如二维码)发起第一请求,请求第二终端对其进行身份验证以完成目标需求。其中,对于地铁场景中,手机终端将该二维码对准闸机终端上的识别区域进行扫码,请求第二终端对第一终端入站放行并予以扫码进站,后续还需要第二终端对第一终端出站放行,通过入闸黑名单和出闸白名单的匹配使用,可以对同一个用户入站和出站的放行进行身份验证,验证通过后满足该用户的乘车需求;对于公交场景中,手机终端将该二维码对准闸机终端上的识别区域进行扫码,请求第二终端对第一终端予以扫码,通过恶意名单的匹配使用,进行身份验证通过后满足该用户的乘车需求,公交场景是一次验证,不同于地铁场景中入站和出站的二次验证。
在本发明实施例中,第二终端(如闸机终端)对所述第一请求进行响应,对所述加密形式的信息标识码按照非对称加密策略(二维码是私钥加密,私钥可以存于后台服务器中,闸机是公钥解密)进行解密并从中解析出所述第一标识(UID)和所述第二标识(时间戳);第二终端(如如闸机终端)将所述第一标识(UID)和所述第二标识(时间戳)与本地存储的预设信息校验库进行比对验证。这里的验证包括:有效性验证、UID和时间戳的验证、和其它安全验证。其中,地铁场景是在UID和时间戳的验证中,将UID与入闸黑名单比对验证,将时间戳比对验证时看该时间戳与闸机当前的时间相比,时间差值是否在1分钟之内;而公交场景是在UID和时间戳的验证中,将UID与恶意名单比对验证,将时间戳比对验证时看该时间 戳与闸机当前的时间相比,时间差值是否在1分钟之内),如果比对验证通过,则第二终端(如闸机终端)接受所述第一终端(手机终端)发起的第一请求。其中,在地铁场景中是予以放行入站和放行出站后乘车;而公交场景中是直接乘车。
在本发明实施例中,第二终端(如闸机终端)将用于表征第二终端身份的第三标识(如闸机ID)、和由所述第一标识(UID)和所述第二标识(时间戳)构成的信息标识码(如二维码)封装到第二请求中并发送给服务器,服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的支付处理(扣款或催款处理)。
采用本发明实施例,采用双脱机离线机制,即:1)二维码脱机生成,无需与后台服务器在线交互;2)闸机终端进行本地比对,无需与后台服务器在线交互。还采用非对称加密,对用户信息安全提供安全保障。
基于上述实施例,以地铁出行场景为例进行描述如下:
本发明实施例中,目标需求为地铁出行时,手机终端根据二维码发起的第一请求为入闸请求,请求闸机终端对手机终端入站放行并予以扫码进站,闸机终端(具体为入闸机)将所述UID与本地存储的预设信息校验库进行比对验证以确认用户身份的过程中,若所述UID在恶意号码库中,则闸机终端拒绝所述手机终端发起的入闸请求,即拒绝开闸机予以用户放行。若所述UID在入闸黑名单中,则闸机终端拒绝所述手机终端发起的入闸请求,即拒绝开闸机予以用户放行。若所述UID不存在于所述恶意号码库和所述入闸黑名单中,则闸机终端接受所述手机终端发起的入闸请求,即打开闸机予以用户放行,将所述UID添加入所述入闸黑名单中,以便后续闸机终端将其闸机ID、由UID和时间戳构成的二维码上报服务器后,由服务器解析出UID同步到所有的入闸机和出闸机,同时,更新入闸黑名单和出闸白名单,入闸黑名单和出闸白名单中内容可以是一致的,因为,在闸机 终端的检测是脱机离线的,因此,需要通过入闸黑名单和出闸黑名单中的同一个UID来确保入闸的用户才可以出闸。
本发明实施例中,服务器从所述第二请求中解析出闸机ID、和由所述UID和所述时间戳构成的二维码,对所述二维码进行有效性校验,以确认所述二维码的真实性后,从所述二维码码中解析出所述UID,更新所述UID到闸机终端的入闸黑名单和出闸白名单中,即广播所述UID到所有的入闸机的入闸黑名单中,以及广播所述UID到所有的出闸机的出闸白名单中,之后服务器向手机终端推送已入闸信息,此时,完成入闸的相关校验。
本发明实施例中,服务器向手机终端推送已入闸信息之后,手机终端根据所述二维码发起出闸请求,请求闸机终端对手机终端出站放行并予以扫码出站。手机终端将该二维码对准闸机终端上的识别区域进行扫码,请求闸机终端对手机终端出站放行并予以扫码出站。闸机终端(具体为出闸机)对所述出闸请求进行响应,从所述出闸请求中解析出所述UID和所述时间戳。所述闸机终端将所述UID与本地存储的预设信息校验库进行比对验证以确认用户身份时,若所述UID在恶意号码库中,则闸机终端拒绝所述手机终端发起的出闸请求,即拒绝开闸机予以用户放行。若所述UID不在出闸白名单中,则闸机终端拒绝所述手机终端发起的出闸请求,即拒绝开闸机予以用户放行。若所述UID在所述出闸白名单中,则闸机终端将所述时间戳与闸机终端当前的时间进行比对验证,若时间差值在预设时间范围(如1分钟)之内,则比对验证通过,闸机终端接受所述手机终端发起的出闸请求,即打开闸机予以用户放行,之后将所述UID从所述出闸白名单中删除。
本发明实施例中,闸机终端将用于表征闸机终端身份的闸机ID、由所述UID和所述时间戳构成的二维码、根据所述入闸请求和所述出闸请求得到的账单信息封装到第三请求中并发送给服务器。服务器从所述第三请求 中解析出如闸机ID、由所述UID和所述时间戳构成的二维码和所述账单信息,服务器对所述二维码进行有效性校验,以确认所述二维码的真实性后,根据所述账单信息发起支付请求(扣款或催款)以完成支付处理。从所述二维码中解析出所述UID,将所述UID从所述入闸黑名单和所述出闸白名单中删除。
采用本发明实施例,闸机终端将其闸机ID、由UID和时间戳构成的二维码、账单信息上报服务器进行二维码有效性验证后进行扣款或催款的支付处理,支付处理成功后,由服务器解析出二维码中的UID,将UID从入闸黑名单和出闸白名单中删除。之前的操作中是需要通过入闸黑名单和出闸黑名单中的同一个UID来确保入闸的用户才可以出闸,在出闸结束则需要清空UID的记录。
在一个实际应用中,针对闸机的校验机制而言,闸机判断用户通过的时候是脱机的,但放行后需要延时联机上传用户数据和闸机ID到地铁/公交后台并进而上传到后台服务器,进行数据的校验和解析。由于要求闸机判断的当时需要脱机,所以引入了入闸黑名单和出闸白名单机制。其中,对于入闸黑名单,在入闸的时候设置黑名单,当用户通过闸机后即将这个用户的UID加入黑名单,并通过地铁公司的局域网或者后台的服务器下发将此黑名单同步到所有的入闸机。当没收到服务器端的指令时,黑名单也需要定时更新,一定时间(如2小时)以外的黑名单数据全部清空。对于出闸白名单,针对地铁场景,当用户通过入闸机后,通过后台服务器判定此二维码可用后,即将此用户UID下发到所有出闸机的白名单里,只有在白名单里的用户才能通过出闸。用户出闸后,由后台服务器发起扣款成功后,本次交易完成,则后台服务器发送指令,将本用户在黑名单和白名单里都清除。白名单也需要定时更新,具体以地铁公司允许的最长停留时间为准。对于恶意名单,当后台服务器检测到某用户是恶意用户或有恶意传播交通 码风险的时候,则将其UID加入恶意名单下发到所有闸机里,同时不再为此用户生成交通码。
在一个实际应用中,入闸机通过公钥对二维码进行解密后,需要做的校验包括:用户身份识别信息(UID),用于确认用户身份,比较有没有在黑名单或恶意名单,如果在,则不放行;手Q二维码交通支付校验信息,用来区分于其他同类产品;用户时间戳信息,用来告知闸机二维码生成的时间,1分钟内的二维码才会放行;安全校验信息,包含复杂的算法,初步安全校验通过才放行。
在一个实际应用中,出闸机通过公钥对二维码进行解密后,需要做的校验包括:用户身份识别信息(UID),用于确认用户身份,如果不在白名单,则不放行;手Q二维码交通支付校验信息,用来区分于其他同类产品;用户时间戳信息,用来告知闸机二维码生成的时间,1分钟内的二维码才会放行;安全校验信息,包含复杂的算法,初步安全校验通过才放行。
在一个实际应用中,后台服务器的校验包括:服务端收到地铁/公交发来的用户二维码数据和闸机ID后,会对支付请求的有效性作出判断,具体的,支付请求的完整性判断,判断是否包含所有必填信息;商户是否有权限;商户信息和买家信息是否正确;订单状态是否已被关闭或已被支付;是否是地铁公交付款的交通码;是否已过期;用户的账户余额是否足够;闸机ID信息判断;风控信息判断,主要包括单日消费次数和额度以及防欺诈策略,是否需要验密;服务端会维护闸机黑白名单机制,判断用户二维码数据的有效性,发起扣款请求并推送相关的账号消息。
基于上述实施例,以公交出行场景为例进行描述如下:
本发明实施例中,目标需求为公交出行时,手机终端根据二维码发起的第一请求为乘车请求,请求闸机终端对手机终端予以扫码并放行。在本公交场景中,手机终端将该二维码对准闸机终端上的识别区域进行扫码, 请求第二终端对第一终端予以扫码,通过恶意名单的匹配使用,进行身份验证通过后满足该用户的乘车需求,公交场景是一次闸机验证,不同于地铁场景中入闸机的入站和出闸机的出站的二次闸机验证。闸机终端将所述UID与本地存储的预设信息校验库进行比对验证以确认用户身份的过程中,若所述UID在恶意号码库中,则闸机终端拒绝所述手机终端发起的乘车请求,即拒绝予以对用户放行。若所述UID不存在于所述恶意号码库中,则闸机终端接受所述手机终端发起的乘车请求,即予以对用户放行,将所述UID添加入恶意号码黑名单中。这里,用户用过的二维码都要加入恶意号码黑名单中,以避免被重复使用和复制,通过公交后台或者后台服务器下发同步到所有的闸机,因为,在闸机终端的检测是脱机离线的,因此,需要恶意号码黑名单来确保已经入闸乘车的用户不可以再次进站入闸。
本发明实施例中,将根据所述乘车请求得到的账单信息封装到第二请求中并发送给服务器后,服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的支付处理的过程中,从所述第二请求中解析出闸机ID、由所述UID和所述时间戳构成的二维码和所述账单信息。服务器对所二维码进行有效性校验,以确认所述二维码的真实性后,根据所述账单信息发起支付请求(扣款或催款)以完成支付处理。服务器从所述二维码中解析出所述UID,如果所述UID标识的用户为恶意用户,则将UID更新到恶意号码黑名单中,向闸机终端下发恶意号码黑名单。
采用本发明实施例,是双离线的脱机验证机制。过闸机当时手机脱机离线,闸机也是脱机离线的。过闸机当时采用脱机的方式,会最大可能地保证了用户过闸机当时的迅速和稳定,符合交通部规定的300ms。而现有技术是采取在线验证,不可能达到300ms的时间。而在过闸机后,再将用户的二维码发送到服务器验证其有效性,如果是非法用户,则将用户加入恶意名单,从而达到了快捷安全和资金安全的统一。
本发明实施例中的第一终端,包括:触发单元,配置为在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;响应单元,配置为在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;请求发起单元,配置为根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求;请求响应单元,配置为在第二终端对所述第一请求进行响应,并基于从所述信息标识码中解析出所述第一标识和所述第二标识进行身份验证通过后再通过第二请求向服务器申请有效性验证;所述第二请求中包含用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码;反馈接收单元,配置为接收服务器的反馈,所述反馈为服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
采用本发明实施例,在第一终端侧触发展示信息标识码的请求后,根据第一终端本地存储的上述预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识。根据所述信息标识码发起第一请求后,第一终端发送该第一请求给第二终端,以请求第二终端对其进行身份验证以完成目标需求。第二终端从第一请求中解析出第一标识和第二标识后,将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份,以及将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的第一请求。之后,第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器进行有效性验证后进行与所述目标需求相关的对应处理,并将处理反馈给到第一终端。 在目标需求为地铁出行时,第一请求分别为入闸请求和出闸请求,第二终端和服务器分别对其进行处理。在目标需求为公交出行时,第一请求仅为乘车请求,由第二终端和服务器对其进行处理。
本发明实施例的一种服务器,包括:请求接收单元,配置为接收第二终端对第一请求进行响应后发起的第二请求;所述第一请求中包含由用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识所构成的信息标识码;所述信息标识码通过对第一操作进行响应时根据本地存储的预设策略生成;所述第二请求中包含用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码;验证处理单元,用于根据接收到的所述第二请求进行有效性验证后进行与目标需求相关的对应处理。
地铁出行场景中,在本发明实施例一实施方式中,所述验证处理单元,还配置为:在所述目标需求为地铁出行时,从所述第二请求中解析出第三标识、和由所述第一标识和所述第二标识构成的信息标识码;对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,从所述信息标识码中解析出所述第一标识,更新所述第一标识到第二终端的入闸黑名单和出闸白名单中;向第一终端推送已入闸信息。
地铁出行场景中,在本发明实施例一实施方式中,所述请求接收单元,还配置为:接收第三请求;所述第三请求包含用于表征第二终端身份的第三标识、由所述第一标识和所述第二标识构成的信息标识码、根据所述入闸请求和所述出闸请求得到的账单信息。所述验证处理单元,还配置为:从所述第三请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息;对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,根据所述账单信息发起支付请求以完成与地铁出行相关的支付处理;从所述信息标识码中解析出所述第一标识,将 所述第一标识从所述入闸黑名单和所述出闸白名单中删除。
公交出行场景中,在本发明实施例一实施方式中,所述请求接收单元,还配置为:接收根据所述乘车请求得到的账单信息,所述账单信息作为新增信息被封装到所述第二请求中。所述验证处理单元,还配置为:在所述目标需求为公交出行时,从所述第二请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息;
对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,根据所述账单信息发起支付请求以完成与公交出行相关的支付处理;从所述信息标识码中解析出所述第一标识,如果所述第一标识所标识的用户为恶意用户,则将第一标识更新到恶意号码黑名单中,向第二终端下发恶意号码黑名单。
本发明实施例的一种基于信息标识码进行信息验证的系统,所述系统包括:第一终端41、第二终端42及服务器43;其中,第一终端41,配置为:接收第一操作,根据所述第一操作触发展示信息标识码的请求;对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求。第二终端42,配置为:对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,接受所述第一终端发起的第一请求;将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器。服务器43,配置为:根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的 对应处理。
采用本发明实施例,在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求。在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码。需要指出的是,生成信息标识码的方式是脱机离线的方式,不需要终端侧与后台服务器进行交互,不需要借助网络。在信息标识码中携带用于表征用户身份的第一标识(如UID)和用于表征信息标识码生成时间的第二标识(如时间戳)。第一终端根据携带第一标识(如UID)和第二标识(如时间戳)的所述信息标识码发起第一请求,通过该第一请求来请求第二终端对其进行身份验证以完成目标需求。比如,地铁场景中,第一终端将该二维码对准第二终端上的识别区域进行扫码,请求第二终端对第一终端入站放行并予以扫码进站,后续还需要第二终端对第一终端出站放行,通过入闸黑名单和出闸白名单的匹配使用,可以对同一个用户入站和出站的放行进行身份验证,验证通过后满足该用户的地铁出行需求;比如,公交场景中,第一终端将该二维码对准第二终端上的识别区域进行扫码,请求第二终端对第一终端予以扫码,通过恶意名单的匹配使用,进行身份验证通过后满足该用户的公交出行需求,无论是地铁场景还是公交场景,都是闸机脱机与本地的信息校验库进行比对验证。对于公交场景是一次验证,对于地铁场景是入站和出站的二次验证,结合信息标识码的方式也是脱机离线的方式,本发明实施例是双离线的脱机机制,无需考虑网络状态,无需联网,后续支付时在线延时确认支付即可。第二终端对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识(如UID)和所述第二标识(如时间戳),第二终端将所述第一标识(如UID)与本地存储的预设信息校验库进行比对验证以确认用户身份。第二终端将所述第二标识(如时间戳)与第二终端当前的时间进行比对验证。若时间差值在预设时间范围(如1分钟)之内,则比对验证通 过,第二终端接受所述第一终端(手机终端)发起的第一请求。第二终端将用于表征第二终端身份的第三标识(如闸机ID)、和由所述第一标识(UID)和所述第二标识(时间戳)构成的信息标识码(如二维码)封装到第二请求中并发送给服务器。服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的支付处理。支付处理包括直接扣款或发起催款的处理,其中,如果用户账户中有余额,则直接扣款,如果用户账户中没有余额,则发起催款,如果用户不予支付,则无法使用该应用生成二维码,也就是说,无法实现乘车出行(地铁或公交出行)。
采用本发明实施例,采用双脱机离线机制,即:1)二维码脱机生成,无需与后台服务器在线交互;2)闸机终端本地比对验证,无需与后台服务器在线交互。采用非对称加密,与支付宝及相关的技术相区别(目前都是与后台交互的在线方案)。在系统中涉及手机终端,闸机终端及后台服务器,在实际应用中系统不限于这些交互执行实体。
基于上述实施例,本发明实施例一实施方式中,所述第二终端,还配置为:在将所述信息标识码由私钥进行加密,得到加密形式的信息标识码后,对所述加密形式的信息标识码按照非对称加解密策略并采用公钥进行解密并从中解析出所述第一标识和所述第二标识。
基于上述实施例,本发明实施例一实施方式中,所述第一终端,还配置为:所述目标需求为地铁出行时,根据所述信息标识码发起的第一请求为入闸请求,请求第二终端对第一终端入站放行并予以扫码进站。所述第二终端,还配置为:若所述第一标识在恶意号码库中,则拒绝所述第一终端发起的入闸请求;若所述第一标识在入闸黑名单中,则拒绝所述第一终端发起的入闸请求;若所述第一标识不存在于所述恶意号码库和所述入闸黑名单中,则接受所述第一终端发起的入闸请求,将所述第一标识添加入所述入闸黑名单中。
基于上述实施例,本发明实施例一实施方式中,所述服务器,还配置为:从所述第二请求中解析出第三标识、和由所述第一标识和所述第二标识构成的信息标识码;对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,从所述信息标识码中解析出所述第一标识,更新所述第一标识到第二终端的入闸黑名单和出闸白名单中;向第一终端推送已入闸信息。
基于上述实施例,本发明实施例一实施方式中,所述第一终端,还配置为:服务器向第一终端推送已入闸信息之后,根据所述信息标识码发起出闸请求,请求第二终端对第一终端出站放行并予以扫码出站;所述第二终端,还配置为:对所述出闸请求进行响应,从所述出闸请求中解析出所述第一标识和所述第二标识;将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份时,若所述第一标识在恶意号码库中,则拒绝所述第一终端发起的出闸请求;若所述第一标识不在出闸白名单中,则拒绝所述第一终端发起的出闸请求;若所述第一标识在所述出闸白名单中,则将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,接受所述第一终端发起的出闸请求,将所述第一标识从所述出闸白名单中删除。
基于上述实施例,本发明实施例一实施方式中,所述第二终端,还配置为:将用于表征第二终端身份的第三标识、由所述第一标识和所述第二标识构成的信息标识码、根据所述入闸请求和所述出闸请求得到的账单信息封装到第三请求中并发送给服务器;所述服务器,还配置为:从所述第三请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息;对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,根据所述账单信息发起支付请求以完成与地铁出行相关的支付处理;从所述信息标识码中解析出所述第一标识,将所述第一 标识从所述入闸黑名单和所述出闸白名单中删除。
基于上述实施例,本发明实施例一实施方式中,所述第一终端,还配置为:所述目标需求为公交出行时,根据所述信息标识码发起的第一请求为乘车请求,请求第二终端对第一终端予以扫码并放行;所述第二终端,还配置为:若所述第一标识在恶意号码库中,则拒绝所述第一终端发起的乘车请求;若所述第一标识不存在于所述恶意号码库中,则接受所述第一终端发起的乘车请求,将所述第一标识添加入恶意号码黑名单中。
基于上述实施例,本发明实施例一实施方式中,所述服务器,还配置为:在将根据所述乘车请求得到的账单信息封装到第二请求中并发送给服务器后,从所述第二请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息;对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,根据所述账单信息发起支付请求以完成与公交出行相关的支付处理;从所述信息标识码中解析出所述第一标识,如果所述第一标识所标识的用户为恶意用户,则将第一标识更新到恶意号码黑名单中,向第二终端下发恶意号码黑名单。
基于上述实施例,以地铁场景为例,本发明实施例的基于二维码进行信息验证的系统,包括:第一终端、第二终端、服务器;其中,所述第一终端,配置为:接收第一操作,根据所述第一操作触发展示信息标识码的请求;对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;根据所述信息标识码发起入闸请求或出闸请求,请求第二终端对其进行身份验证以完成地铁出行的目标需求。所述第二终端,配置为:对所述入闸请求或出闸请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二 终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的入闸请求或出闸请求;将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器。所述服务器,配置为:根据接收到的所述第二请求进行有效性验证后进行与所述地铁出行相关的对应处理。
基于上述实施例,以公交场景为例,本发明实施例的基于二维码进行信息验证的系统,包括:第一终端、第二终端、服务器;其中,所述第一终端,配置为:接收第一操作,根据所述第一操作触发展示信息标识码的请求;对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;根据所述信息标识码发起乘车请求,请求第二终端对其进行身份验证以完成公交出行的目标需求。所述第二终端,配置为:对所述乘车请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的乘车请求;将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器。所述服务器,配置为:根据接收到的所述第二请求进行有效性验证后进行与所述公交出行相关的对应处理。
其中,对于用于数据处理的处理器而言,在执行处理时,可以采用微处理器、中央处理器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Singnal Processor)或可编程逻辑阵列(FPGA,Field-Programmable Gate Array)实现;对于存储介质来说,包含操作指令,该操作指令可以为 计算机可执行代码,通过所述操作指令来实现上述本发明实施例信息处理方法流程中的各个步骤。
图8为本发明实施例提供的终端硬件结构示意图。本实施例中所描述的终端,包括第一终端(如手机终端)和第二终端(闸机终端)。都可以包括:处理器601、网络接口602及存储器603。其中,处理器601、网络接口602及存储器603可通过总线或其他方式连接,本发明实施例以通过总线连接为例。其中,处理器601,或称中央处理器(Central Processing Unit,CPU)是终端的计算核心以及控制核心。网络接口602可选的可以包括标准的有线接口、无线接口(如WI-FI、移动通信接口等),受处理器601的控制用于收发数据。存储器603(Memory)是终端的记忆设备,用于存放程序和数据。可以理解的是,此处的存储器603可以是高速RAM存储器,也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器;可选的还可以是至少一个位于远离前述处理器601的存储装置。存储器603提供存储空间。
一实施例中,应用于基于信息标识码进行信息验证的系统,该系统中的第一终端、第二终端和服务器各自包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,包括如下操作:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和 用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求;
第二终端对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的第一请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,还包括如下操作:
将所述信息标识码由私钥进行加密,得到加密形式的信息标识码;
所述第二终端对所述第一请求进行响应,对所述加密形式的信息标识码按照非对称加解密策略并采用公钥进行解密并从中解析出所述第一标识和所述第二标识。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,还包括如下操作:
所述目标需求为地铁出行时,第一终端根据所述信息标识码发起的第一请求为入闸请求,请求第二终端对第一终端入站放行并予以扫码进站;
所述第二终端将所述第一标识与本地存储的预设信息校验库进行比对 验证以确认用户身份的过程中,若所述第一标识在恶意号码库中,则第二终端拒绝所述第一终端发起的入闸请求;若所述第一标识在入闸黑名单中,则第二终端拒绝所述第一终端发起的入闸请求;若所述第一标识不存在于所述恶意号码库和所述入闸黑名单中,则第二终端接受所述第一终端发起的入闸请求,将所述第一标识添加入所述入闸黑名单中。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,还包括如下操作:
服务器从所述第二请求中解析出第三标识、和由所述第一标识和所述第二标识构成的信息标识码;
服务器对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,从所述信息标识码中解析出所述第一标识,更新所述第一标识到第二终端的入闸黑名单和出闸白名单中;
服务器向第一终端推送已入闸信息。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,还包括如下操作:
服务器向第一终端推送已入闸信息之后,第一终端根据所述信息标识码发起出闸请求,请求第二终端对第一终端出站放行并予以扫码出站;
所述第二终端对所述出闸请求进行响应,从所述出闸请求中解析出所述第一标识和所述第二标识;
所述第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份时,若所述第一标识在恶意号码库中,则第二终端拒绝所述第一终端发起的出闸请求;若所述第一标识不在出闸白名单中,则第二终端拒绝所述第一终端发起的出闸请求;若所述第一标识在所述出闸白名单中,则第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所 述第一终端发起的出闸请求,将所述第一标识从所述出闸白名单中删除。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,还包括如下操作:
第二终端将用于表征第二终端身份的第三标识、由所述第一标识和所述第二标识构成的信息标识码、根据所述入闸请求和所述出闸请求得到的账单信息封装到第三请求中并发送给服务器;
服务器从所述第三请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息;
服务器对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,根据所述账单信息发起支付请求以完成与地铁出行相关的支付处理;
从所述信息标识码中解析出所述第一标识,将所述第一标识从所述入闸黑名单和所述出闸白名单中删除。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,还包括如下操作:
所述目标需求为公交出行时,第一终端根据所述信息标识码发起的第一请求为乘车请求,请求第二终端对第一终端予以扫码并放行;
所述第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份的过程中,若所述第一标识在恶意号码库中,则第二终端拒绝所述第一终端发起的乘车请求;若所述第一标识不存在于所述恶意号码库中,则第二终端接受所述第一终端发起的乘车请求,将所述第一标识添加入恶意号码黑名单中。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,还包括如下操作:
将根据所述乘车请求得到的账单信息封装到第二请求中并发送给服务 器;
服务器从所述第二请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息;
服务器对所述信息标识码进行有效性校验,以确认所述信息标识码的真实性后,根据所述账单信息发起支付请求以完成与公交出行相关的支付处理;
服务器从所述信息标识码中解析出所述第一标识,如果所述第一标识所标识的用户为恶意用户,则将第一标识更新到恶意号码黑名单中,向第二终端下发恶意号码黑名单。
一实施例中,应用于基于信息标识码进行信息验证的系统,该系统中的第一终端、第二终端和服务器各自包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,包括如下操作:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起入闸请求或出闸请求,请求第二终端对其进行身份验证以完成地铁出行的目标需求;
第二终端对所述入闸请求或出闸请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的入闸请求或出闸请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
服务器根据接收到的所述第二请求进行有效性验证后进行与所述地铁出行相关的对应处理。
一实施例中,应用于基于信息标识码进行信息验证的系统,该系统中的第一终端、第二终端和服务器各自包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令。
处理器基于存储器中的一个或一个以上的程序执行基于信息标识码进行信息验证的方法,包括如下操作:
在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
第一终端根据所述信息标识码发起乘车请求,请求第二终端对其进行身份验证以完成公交出行的目标需求;
第二终端对所述乘车请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的乘车请求;
第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器;
服务器根据接收到的所述第二请求进行有效性验证后进行与所述公交出行相关的对应处理。
本发明实施例的一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行本发明实施例上述的基于信息标识码进行信息验证的方法。
这里需要指出的是:以上涉及终端和服务器项的描述,与上述方法描述是类似的,同方法的有益效果描述,不做赘述。对于本发明终端和服务器实施例中未披露的技术细节,请参照本发明方法流程描述的实施例所描述内容。
以一个现实应用场景为例对本发明实施例阐述如下:
针对现有技术中对交通出行,如地铁出行和公交出行在线校验导致的各种问题,采用本发明实施例,区分地铁出行和公交出行的场景分别描述如下:
下文描述中出现的“交通码”指:用于代替用户向手Q支付后台发起支付请求的一串字符串,包含了买家身份信息UID、支付方式,时间戳、以及安全校验信息,以二维码的形式展现。“UID”指用户的身份标识,每个用户有一个独一无二的UID。本发明实施例中,交通码的具体表现形式为二维码,不做赘述。
场景一:地铁出行场景中,利用二维码乘坐地铁快速通过闸机的双离线方案(2次验证)。
应用本发明实施例的本场景中,将交通码(具体表现形式为二维码)作为乘地铁凭证。现在乘地铁都是需要实体单程票或一卡通,本场景中相当于将实体乘车凭证虚拟化,并且放入随身携带的手机里。这样不光使用方便,而且省去了用户排队买票等待之苦。
采用双离线验证机制。过闸机当时手机脱机离线,闸机也是脱机离线的。过闸机当时采用脱机的方式,会最大可能地保证了用户过闸机当时的迅速和稳定(交通部要求是300Ms),而如果采取在线验证的话,不可能能达到300ms的时间;而在过闸机后,再将用户的交通码信息发送到服务器后台验证有效性,如果是非法用户,则在用户出闸的时候不予放行,达到了快捷安全和资金安全的统一。实现了闸机的智能化,联合闸机硬件设备制造商,形成了一整套安全验证机制,保证二维码脱机验证的安全以及验证方式的可靠性。
在用户乘坐地铁的场景中,将上述机制承载在手机QQ的应用(APP)里,通过手机QQ客户端生成交通码,并通过闸机扫描交通码,实现快速的过闸和计费。具体操作交互包括:1)开通流程,需要用户申请一张当地的一卡通,相当于将一卡通电子化,如图3所示。2)申请成功后展示交通码,用户就可扫码入闸,出闸,出闸后扣款,如图4所示。整个交互流程操作简单,清晰明了,用户使用门槛低,和现有的刷二维码的用户体验一致。
利用二维码乘坐地铁快速通过闸机的双离线方案包括以下内容:
一、二维码的构成
1)编码字符集:字母数字型数据(数字0~9;大写字母A~Z;9个其他字符:space,$,%,*,+,-,.,/,:);
2)数据组成:二维码由为111字节经过base64转换获得的长度148的字符串,其base64明文数据如表1所示:
Figure PCTCN2018073867-appb-000001
表1
3)证书数据:证书由证书明文和签名数据组成,如表2所示:
Figure PCTCN2018073867-appb-000002
表2
证书明文数据如表3所示:
Figure PCTCN2018073867-appb-000003
Figure PCTCN2018073867-appb-000004
表3
4)时间戳验证数据,如表4所示:
Figure PCTCN2018073867-appb-000005
表4
5)交易验证码(TAC),如表5所示:
Figure PCTCN2018073867-appb-000006
表5
二、交通码识别和验证机制
闸机需要扫码识别出交通码,并且对交通码进行验证,包括时间戳信息、证书签名信息和用户的身份等信息验证。其中账户发行方指的是后台服务器,终端运营方可以是各地通卡公司或地铁公交公司或第三方服务公司,终端指的是闸机机器,手机指的是手机QQ App,具体验证机制如图5所示,账户发行方动态生成用户公私钥对,并生成TAC密钥;用户APP(如微信、手Q)向账户发行方申请用户证书并下载生成二维码所需的用户私钥及TAC密钥;终端(扫码机具)下载账户发行方的公钥及用户公钥用于验证用户证书及时间戳MAC;终端运营方负责交易的收集和上传,及公钥的透传;时钟同步服务器需要校准终端和用户之间的始终同步;经过账户发行方私钥签名的证书只有终端里对应的账户发行方公钥可解,同时经过用户APP私钥加密的时间戳数据只有终端机具里的用户公钥可解,同时辅以TAC码的唯一性,共同保证了交易的安全性。需要指出的是,终端通过验证证书的的机制确认用户的真实身份及信用信息;账户发行方通过验证TAC确定用户展示二维码的真实性;终端通过验证时间戳MAC提高二维码被复制盗用的难度和成本;为确保时间戳验证数据的一致性,手机APP及终端需要在同一服务器进行时钟同步;账户发行方负责维护证书私密钥、MAC子密钥及TAC密钥的安全;终端运营方负责MAC根密钥的安全及支付验证流程的真实准确。
三、脱机验证的逻辑
交通码闸机验证和判读的逻辑,以及后台服务器延时验证的流程如图6所示,包括:
步骤301、用户打开应用,请求展示二维码。
步骤302、卡片余额不足时,不生成二维码,提醒用户余额不足,请充值。
步骤303、生成二维码。
步骤304、用户刷二维码入闸。
这里,刷二维码入闸的验证包括:二维码有效性初步判断、UID入闸黑名单验证、时间戳验证、其他安全校验等。
步骤305、开闸,之后,更新此UID到入闸黑名单。
步骤306-307、上传闸机ID和二维码信息。
步骤308、二维码后台验证。
这里的验证包括:二维码有效性校验、卡片余额校验、风控校验、其他安全校验等。
步骤309、黑、白名单更新。具体是,更新UID到入闸黑名单,更新UID到出闸白名单。
步骤310、向用户推送已入闸和站点QQ信息。
步骤311、向闸机下发黑名单和白名单。
步骤312、入闸机更新黑名单出闸机更新白名单。
步骤313、用户刷二维码出闸。
这里,刷二维码出闸的验证包括:二维码有效性初步判断、UID出闸白名单验证、时间戳验证、其他安全校验等。
步骤314-316、开闸,之后,上传闸机ID和二维码信息,生成账单。
步骤317、上传闸机ID、二维码和账单。
步骤318、二维码后台验证。
这里,验证包括:二维码有效性校验、卡片余额校验、风控校验、其他安全校验等。
步骤319-320、发起扣款,同步账单、发起扣款。
步骤321-324、返回扣款成功,UID入闸机黑、白名单划除,返回用户扣款成功。
本应用场景中,对于闸机的校验机制,闸机判断用户通过的时候是脱机的,但放行后需要延时联机上传用户数据和闸机ID到地铁/公交后台并进而上传到后台服务器,进行数据的校验和解析。
本应用场景中,由于要求闸机判断的当时需要脱机,所以引入了入闸黑名单和出闸白名单机制。
对于入闸黑名单:在入闸的时候设置黑名单,当用户通过闸机后即将这个用户的UID加入黑名单,并通过地铁公司的局域网或者后台服务器下发将此黑名单同步到所有的入闸机。当没收到服务器端的指令时,黑名单也需要定时更新,一定时间(如2小时)以外的黑名单数据全部清空。
对于出闸白名单:针对地铁场景,当用户通过入闸机后,通过后台服务器判定此二维码可用后,即将此用户UID下发到所有出闸机的白名单里,只有在白名单里的用户才能通过出闸。用户出闸后,由后台发起扣款成功后,本次交易完成,则后台发送指令,将本用户在黑名单和白名单里都清除。白名单也需要定时更新,具体以地铁公司允许的最长停留时间为准。
对于恶意名单:当后台服务器检测到某用户是恶意用户或有恶意传播交通码风险的时候,则将其UID加入恶意名单下发到所有闸机里,同时不再为此用户生成交通码。黑名单有效地防止了二维码被大规模复制重复入闸的风险,白名单则仿照目前公交卡的机制,只有用户通过QQ钱包扫码渠道进入的才能通过相同的方式出闸,同时,针对那些已经入闸的非法或余额不足用户,通过的后台判断后,可以通过白名单来灵活控制用户的出 闸与否。恶意名单则可以有效防止恶意用户盗用或分发交通码的风险,保障用户的资金安全。
本应用场景中,入闸机通过公钥对二维码进行解密后,需要做以下校验:
1)用户身份识别信息(UID),用于确认用户身份,比较有没有在黑名单或恶意名单,如果在,则不放行;
2)手Q二维码交通支付校验信息,用来区分于其他同类产品;
用户时间戳信息,用来告知闸机二维码生成的时间,1分钟内的二维码才会放行;
3)安全校验信息,包含复杂的算法,初步安全校验通过才放行。
本应用场景中,出闸机通过公钥对二维码进行解密后,需要做以下校验:
1)用户身份识别信息(UID),用于确认用户身份,如果不在白名单,则不放行;
2)手Q二维码交通支付校验信息,用来区分于其他同类产品;
3)用户时间戳信息,用来告知闸机二维码生成的时间,1分钟内的二维码才会放行;
4)安全校验信息,包含复杂的算法,初步安全校验通过才放行;
本应用场景中,后台服务器端的校验是服务端收到地铁发来的用户二维码数据和闸机ID后,会对支付请求的有效性作出判断,包含以下几点:
1)支付请求的完整性判断,判断是否包含所有必填信息;
2)商户是否有权限;
3)商户信息和买家信息是否正确;
4)订单状态是否已被关闭或已被支付;
5)是否是地铁公交付款的交通码;
6)是否已过期;
7)用户的账户余额是否足够;
8)闸机ID信息判断;
9)风控信息判断,主要包括单日消费次数和额度以及防欺诈策略,是否需要验密;
10)服务端会维护闸机黑白名单机制,判断用户二维码数据的有效性,发起扣款请求并推送相关的QQ消息。
本应用场景中,异常情况的应对中,需要避免交通码被大规模复制的风险。由于交通码本质上是二维码,相比较NFC来说更容易被复制和传播,而且在脱机验证的情况下,如果出现大规模复制的情况,后果是比较严重的,针对这种情况,因此,本场景采取了以下措施来应对:
1)时间戳验证。交通码里包含时间戳信息,闸机会首先进行初试判断,如果是在1分钟以前生成的交通码,则拒绝放行。
2)入闸黑名单机制。在地铁场景里,一个用户通过交通码入闸后,闸机会将用户UID信息解析出并上传到地铁后台,进而上传到后台服务器,判断此用户合法交通码有效后,就将此用户UID经由地铁后台下发到所有的入闸机黑名单内,此用户此后所有的入闸申请将被拒绝,直到黑名单超时失效(2小时)或检测到用户出闸记录。
3)在公交场景中,则是将已入闸用户的交通码加入公交车闸机终端黑名单,拒绝此交通码再次被使用;同时若检测到恶意用户,则将此用户的UID加入闸机黑名单,这个用户所有已产生的交通码将被禁止入闸,同时不再为其生成新的二维码。黑名单有效期同样为2小时。
4)后台服务器服务检验。如果后台服务器检验到某用户短时间内,如10分钟内(可能黑名单还未生效)有大量入闸记录(≥3次),则将此用户UID加入恶意名单,并停止再为此用户生成新的交通码。
本应用场景中,异常情况的应对中,需要避免用户使用不同UID进出闸的风险。在地铁环境下,存在使用A用户的交通码入闸,然后使用B用户的交通码出闸的风险,这样后台就无法判断用户的行程,也无法形成账单,发起扣款。为此,引入出闸白名单机制:
出闸白名单机制:入闸机解析出的用户UID上送到后台服务器后,在经过合法性判断有效后,则将此用户UID更新到所有的出闸机白名单,只有在此白名单里的UID才会在出闸机放行。并且用户出闸后,即将其UID从黑、白名单里删除。白名单的有效性视各城市的具体地铁环境而定,暂时定为2小时。这样就保证了用户有入闸记录的时候才会放其出闸,和使用单程票和一卡通的体验保持一致。
本应用场景中,异常情况的应对中,需要避免用户使用常规方式入闸却用交通码出闸的风险。存在用户使用单程票或一卡通入闸,但是尝试交通码出闸的情况,针对这种情况,采用出闸白名单机制同样可以应对。
本应用场景中,异常情况的应对中,需要避免用户交通码入闸后不使用交通码出闸的风险。存在用户使用交通码入闸后,使用单程票或一卡通出闸的情况。这时候用户是无法出闸的,此时用户只能选择交通码出闸或者地铁站人工客服处理。这种情况和用户使用单程票或一卡通入闸后,单程票和一卡通丢失了的情况类似,只能转地铁站人工客服处理。但本方案更有优势,因为会在用户入闸后向其推送一条入闸信息,包含用户的入闸地铁站,可以作为其人工出闸时的凭证,规避信用风险,节省客户的损失。
本应用场景中,异常情况的应对中,需要避免用户交通码入闸后手机没电的风险。存在用户交通码入闸后手机没电的情况,此时也和常规情况下丢失单程票或一卡通的情况类似,只能转地铁站人工出闸。但本方案可以在用户进入交通码展示界面后,增加对用户手机电量的识别,当时别到用户电量低于某一特定值时(如10%),提示用户在刷闸机时必须保持手机 有电。
本应用场景中,异常情况的应对中,需要避免用户交通码入闸后无法出闸的风险。存在用户交通码入闸后,由于网络延迟导致出闸白名单未及时更新的情况。此时的策略是提醒用户稍后重试,并在后台及时更新白名单下发。如果是闸机网络故障的情况,此时只能增加检测机制,当有识别到某闸机有问题后,及时处理。用户交通码入闸后一定时间内无出闸记录的订单处理。用户入闸后,或者因为目的地铁站暂不支持扫码出闸,或者因为不方便,或者因为手机没电,用户选择了地铁站人工出闸,但是2小时内用户又想通过交通码入闸,因为此时用户还在入闸黑名单,所以需要一下应对措施:
1)公交和地铁不共用一套黑名单。地铁的入闸黑名单和公交的入闸黑名单不打通,分别维护。这样子用户地铁站人工客服出站后也可以快速使用交通码坐公交转车。
2)增加用户自助完成行程的操作。在已入站乘车记录里增加人工出站标记,用户标记完成后即将此用户从黑名单里划去;同时为了减少用户误操作带来的影响,此时白名单不做删除。
本应用场景中,异常情况的应对中,需要避免用户在未扣款前暂停使用交通码的风险。用户在行程中或者出站后未扣款前选择暂停使用交通码,这个时候需要弹出提示,要等待其扣款成功结算清楚后才能选择暂停使用。
本应用场景中,异常情况的应对中,需要避免用户账户余额不足以支付交通出行费用风险。存在用户在行程完成后发现余额不足以支付的情况,针对本情况,用以下的方法来应对:
1)提前确认,如果发现用户余额不足以完成最长的行程,则不予展示交通码,并提醒用户充值。
2)催缴,通过推送催缴QQ消息、关联腾讯信用或银行信用、扣款用 户已绑定的银行卡等方式对用户所欠款项进行催缴。
3)催款模式,若用户为欠费即给其展示交通码,如果行程欠费,则用户必须在下次使用前充值,否则不予展示交通码;由此可能会带来资金垫付或坏账风险,需要引入银行或保险公司兜底。
本应用场景中,异常情况的应对中,需要避免交通码生成机制被破解的风险。存在交通码生成机制被别有用心的人破解并使用的风险,针对这种情况我们的策略是:1)引入非对称加密。交通码通过非对称加密机制来进行加密,私钥在后台服务器,公钥在闸机,并且可以视需要定时更新(24小时),这样就最大可能的规避了二维码被破解的风险。2)黑、白名单机制。后台服务器如果检测出二维码是伪造的,是不会把此UID放入白名单的。
本应用场景采用本发明实施例,真正实现了用户使用任何手机即可乘坐公交、地铁,针对所有型号、所有制式的手机都适用;用户使用交通码可以实现快速便捷地通过地铁公交闸机,有比拟实体一卡通(NFC)过闸机的体验;减少了通卡、地铁和公交公司的运营成本;极大的方便了用户,随时随地可以申请一张交通卡到手机,而不用去排队购买,不用付押金;资金安全,使用QQ钱包账户作为付款渠道,资金安全,结算流程清晰;数据化建设,通过大数据采集用户的出行数据,能帮助有关部门合理配置资源,使交通资源配置更加合理,出行更加快捷方便。除了上述双脱机方案,还可以采用半脱机方案,即在网络连接允许的情况下,可以采用闸机实时在线验证的方式,也能达到快捷安全地闸机验证。还可以采用信用支付兜底的方案,即不需要闸机做太多安全验证,只需要闸机扫描后提取用户的UID信息,事后汇总扣款的模式,这里需要用户的信用背书。
场景二:公交出行场景中,利用二维码乘坐公交快速通过闸机的双离线方案(1次验证)。
应用本发明实施例的本场景中,将交通码(具体表现形式为二维码) 作为乘公交凭证。现在乘公交都是需要现金或一卡通,本场景中相当于将实体乘车凭证虚拟化,并且放入随身携带的手机里。这样不光使用方便,而且省去了用户排队买票等待之苦。
采用双离线验证机制。过闸机当时手机脱机离线,闸机也是脱机离线的。过闸机当时采用脱机的方式,会最大可能地保证了用户过闸机当时的迅速和稳定(交通部要求是300Ms),而如果采取在线验证的话,不可能达到300ms的时间;而在过闸机后,再将用户的交通码信息发送到服务器后台验证有效性,如果是非法用户,则将用户加入恶意名单。本方案达到了快捷安全和资金安全的统一。实现了闸机的智能化。本发明联合闸机硬件设备制造商,发明了一整套安全验证机制,保证二维码脱机验证的安全以及验证方式的可靠性。
在用户乘坐公交的场景中,将上述机制承载在手机QQ APP里,通过手机QQ客户端生成交通码,并通过闸机扫描交通码,实现快速的过闸和计费。具体操作交互包括:1)开通流程,需要用户申请一张当地的一卡通,相当于将一卡通电子化,如图3所示。2)申请成功后展示交通码,用户就可扫码入闸,出闸,出闸后扣款,如图4所示。整个交互流程操作简单,清晰明了,用户使用门槛低,和现有的刷二维码的用户体验一致。
利用二维码乘坐公交快速通过闸机的双离线方案包括以下内容:
一、二维码的构成
1)编码字符集:字母数字型数据(数字0~9;大写字母A~Z;9个其他字符:space,$,%,*,+,-,.,/,:);
2)数据组成:二维码由为111字节经过base64转换获得的长度148的字符串,其base64明文数据如表6所示:
Figure PCTCN2018073867-appb-000007
Figure PCTCN2018073867-appb-000008
表6
3)证书数据:证书由证书明文和签名数据组成,如表7所示:
Figure PCTCN2018073867-appb-000009
表7
证书明文如表8所示:
Figure PCTCN2018073867-appb-000010
Figure PCTCN2018073867-appb-000011
表8
4)时间戳验证数据,如表9所示:
Figure PCTCN2018073867-appb-000012
表9
5)交易验证码(TAC),如表10所示:
Figure PCTCN2018073867-appb-000013
Figure PCTCN2018073867-appb-000014
表10
二、交通码识别和验证机制
闸机需要扫码识别出交通码,并且对交通码进行验证,包括时间戳信息、证书签名信息和用户的身份等信息验证。其中账户发行方指的是后台服务器,终端运营方可以是各地通卡公司或地铁公交公司或第三方服务公司,终端指的是闸机机器,手机指的是手机QQ App,具体验证机制如图5所示。
三,脱机验证的逻辑
交通码闸机验证和判读的逻辑,以及后台延时验证的流程如图7所示,包括:
步骤401、用户打开应用,请求展示二维码。
步骤402、卡余额不够时,不生成二维码,提醒用户余额不足,请充值。
步骤403、生成二维码。
步骤404、用户刷二维码登车。
这里,刷二维码登车的验证包括:二维码有效性初步判断、恶意名单验证、时间戳验证、其他安全校验等。
步骤405、放行,之后,更新此UID到恶意名单。
步骤406-407、上传闸机ID和二维码信息,生成账单。
步骤408、上传闸机ID、二维码、账单。
步骤409、二维码后台验证。
这里,验证包括:二维码有效性校验、卡片余额校验、风控策略校验、其他安全校验等。如果是恶意用户,则将UID也加入恶意名单。
步骤410、发起扣款。
步骤411、同步账单、发起扣款。
步骤412-415、返回扣款信息,向闸机下发恶意名单,返回用户扣款成功。
本应用场景中,对于闸机的校验机制,闸机判断用户通过的时候是脱机的,但放行后需要延时联机上传用户数据和闸机ID到地铁/公交后台并进而上传到后台服务器,进行数据的校验和解析。
本应用场景中,由于要求闸机判断的当时需要脱机,所以引入了恶意黑名单机制。对于恶意黑名单:当后台服务器检测到某用户是恶意用户或有恶意传播交通码风险的时候,则将其UID加入恶意名单下发到所有闸机里,同时不再为此用户生成交通码。恶意黑名单有效地防止了二维码被大规模复制重复入闸的风险,有效防止恶意用户盗用或分发交通码的风险,保障用户的资金安全。
本应用场景中,公交车没有出闸的概念,而且黑名单存储的有两种码:1)交通码本身,用户用过的交通码都要加入黑名单,以避免被重复使用和复制,通过公交后台或者后台服务器的下发同步到所有的闸机,一定时间(如2小时)以外的数据清空。2)UID,当后台服务器检测到此用户交易不正常时,譬如短时间内大量交易,则会将此用户的UID下发黑名单,此用户所有已生成的二维码都不会放行,并且不再生成新的二维码。
本应用场景中,用户只有入闸,当后台服务器判断二维码合法后,即可发起扣款操作。
本应用场景中,后台服务器端的校验是服务端收到公交发来的用户二维码数据和闸机ID后,会对支付请求的有效性作出判断,包含以下几点:
1)支付请求的完整性判断,判断是否包含所有必填信息;
2)商户是否有权限;
3)商户信息和买家信息是否正确;
4)订单状态是否已被关闭或已被支付;
5)是否是地铁公交付款的交通码;
6)是否已过期;
7)用户的账户余额是否足够;
8)闸机ID信息判断;
9)风控信息判断,主要包括单日消费次数和额度以及防欺诈策略,是否需要验密;
10)服务端会维护闸机恶意黑名单机制,判断用户二维码数据的有效性,发起扣款请求并推送相关的QQ消息。
本应用场景中,异常情况的应对中,需要避免交通码被大规模复制的风险。交通码本质上是二维码,相比较NFC来说更容易被复制和传播,而且在脱机验证的情况下,如果出现大规模复制的情况,后果是比较严重的,针对这种情况,本方案采取了以下措施来应对:
1)时间戳验证。交通码里包含时间戳信息,闸机会首先进行初试判断,如果是在1分钟以前生成的交通码,则拒绝放行。
2)后台服务器检验。如果后台服务器检验到某用户短时间内,如10分钟内有大量入闸记录(≥3次),则将此用户UID加入恶意黑名单并下发到所有闸机,并停止再为此用户生成新的交通码。
本应用场景中,异常情况的应对中,需要避免公交环境下用户短时间多次使用交通码的风险。在公交环境下存在一种情况,用户在短时间内频繁乘车,当次数多于一定值时,其实就可以认为用户是在非法交易,此时需要有应对策略:
1)闸机恶意名单机制。用户已经刷过的码都会加入黑名单,2小时后定期清除黑名单,而1分钟以外的码也过不了闸机的时间戳检验。
2)非法用户判定。如果用户10分钟内乘车刷码≥4次,1小时内≥6次(暂定),则认定此用户的账户有风险,并将其UID加入黑名单,停止生 成新的交通码。等待风控进一步评估和处理。
本应用场景中,异常情况的应对中,需要避免用户在未扣款前暂停使用交通码的风险。用户在行程中或者出站后未扣款前选择暂停使用交通码,这个时候需要弹出提示,要等待其扣款成功结算清楚后才能选择暂停使用。
本应用场景中,异常情况的应对中,需要避免用户账户余额不足以支付交通出行费用风险。存在用户在行程完成后发现余额不足以支付的情况,针对本情况,用以下的方法来应对:
1)提前确认,如果发现用户余额不足以完成最长的行程,则不予展示交通码,并提醒用户充值。
2)催缴,通过推送催缴QQ消息、关联腾讯信用或银行信用、扣款用户已绑定的银行卡等方式对用户所欠款项进行催缴。
3)催款模式,若用户为欠费即给其展示交通码,如果行程欠费,则用户必须在下次使用前充值,否则不予展示交通码;由此可能会带来资金垫付或坏账风险,需要引入银行或保险公司兜底。
本应用场景中,异常情况的应对中,需要避免交通码生成机制被破解的风险。存在交通码生成机制被别有用心的人破解并使用的风险,针对这种情况,策略是:1)引入非对称加密。交通码通过非对称加密机制来进行加密,私钥在后台服务器,公钥在闸机,并且可以视需要定时更新(24小时),这样就最大可能的规避了二维码被破解的风险。2)恶意名单机制。后台服务器如果检测出二维码是伪造的,是不会把此UID放入恶意名单的。
本应用场景采用本发明实施例,真正实现了用户使用任何手机即可乘坐公交、地铁,针对所有型号、所有制式的手机都适用;用户使用交通码可以实现快速便捷地通过地铁公交闸机,有比拟实体一卡通(NFC)过闸机的体验;减少了通卡、地铁和公交公司的运营成本;极大的方便了用户,随时随地可以申请一张交通卡到手机,而不用去排队购买,不用付押金;资 金安全,使用QQ钱包账户作为付款渠道,资金安全,结算流程清晰;数据化建设,通过大数据采集用户的出行数据,能帮助有关部门合理配置资源,使交通资源配置更加合理,出行更加快捷方便。除了上述双脱机方案,还可以采用半脱机方案,即在网络连接允许的情况下,可以采用闸机实时在线验证的方式,也能达到快捷安全地闸机验证。还可以采用信用支付兜底的方案,即不需要闸机做太多安全验证,只需要闸机扫描后提取用户的UID信息,事后汇总扣款的模式,这里需要用户的信用背书。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备和方法,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个单元或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的,作为单元显示的部件可以是、或也可以不是物理单元,即可以位于一个地方,也可以分布到多个网络单元上;可以根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。
另外,在本发明各实施例中的各功能单元可以全部集成在一个处理单元中,也可以是各单元分别单独作为一个单元,也可以两个或两个以上单元集成在一个单元中;上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述的程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤; 而前述的存储介质包括:移动存储设备、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
或者,本发明上述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储设备、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。
工业实用性
采用本发明实施例,使车票虚拟化的技术实现惠及所有人群,适用范围广泛,通用性的设计初衷符合用户需求,也方便后续的扩展开发;即便在联网不好,如无网络或者网络情况不好的情况下,也能实现验证,即便对于网络情况不好的情况通过本发明实施例的离线验证,也不会因为网络状况波动导致用户大量滞留和排队,是一种快速实现验证的机制。

Claims (26)

  1. 一种基于信息标识码进行信息验证的方法,应用于第一终端,所述第一终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
    在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
    在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
    第一终端根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求。
  2. 一种基于信息标识码进行信息验证的方法,应用于第二终端,所述第二终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
    第二终端对第一请求进行响应,从信息标识码中解析出第一标识和第二标识;
    第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
    第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的第一请求;
    第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
  3. 根据权利要求2所述的方法,其中,所述方法还包括:将所述信息标识码由私钥进行加密,得到加密形式的信息标识码;
    所述第二终端对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识,包括:
    所述第二终端对所述第一请求进行响应,对所述加密形式的信息标识码按照非对称加解密策略并采用公钥进行解密并从中解析出所述第一标识和所述第二标识。
  4. 根据权利要求2所述的方法,其中,当第一终端请求第二终端对其进行身份验证以完成目标需求,且所述目标需求为地铁出行时,所述第二终端收到第一终端根据所述信息标识码发起的入闸请求;
    所述第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份,包括:
    若所述第一标识在恶意号码库中,则第二终端拒绝所述第一终端发起的入闸请求;
    若所述第一标识在入闸黑名单中,则第二终端拒绝所述第一终端发起的入闸请求;
    若所述第一标识不存在于所述恶意号码库和所述入闸黑名单中,则第二终端接受所述第一终端发起的入闸请求,将所述第一标识添加入所述入闸黑名单中。
  5. 根据权利要求4所述的方法,其中,所述方法还包括:当服务器向第一终端推送已入闸信息之后,所述第二终端收到第一终端根据所述信息 标识码发起的出闸请求;
    所述第二终端对所述出闸请求进行响应,从所述出闸请求中解析出所述第一标识和所述第二标识;
    所述第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份时,若所述第一标识在恶意号码库中,则第二终端拒绝所述第一终端发起的出闸请求;若所述第一标识不在出闸白名单中,则第二终端拒绝所述第一终端发起的出闸请求;若所述第一标识在所述出闸白名单中,则第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的出闸请求,将所述第一标识从所述出闸白名单中删除。
  6. 根据权利要求5所述的方法,其中,所述已入闸信息的推送,是在服务器从所述第二请求中解析出第三标识、和由所述第一标识和所述第二标识构成的信息标识码,对所述信息标识码进行有效性校验之后触发。
  7. 根据权利要求6所述的方法,其中,所述方法还包括:
    第二终端将用于表征第二终端身份的第三标识、由所述第一标识和所述第二标识构成的信息标识码、根据所述入闸请求和所述出闸请求得到的账单信息封装到第三请求中并发送给服务器,以使服务器从所述第三请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息,对所述信息标识码进行有效性校验后根据所述账单信息发起支付请求以完成与地铁出行相关的支付处理。
  8. 根据权利要求2所述的方法,其中,当第一终端请求第二终端对其进行身份验证以完成目标需求,且所述目标需求为公交出行时,所述第二终端收到第一终端根据所述信息标识码发起的乘车请求;
    所述第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份,包括:
    若所述第一标识在恶意号码库中,则第二终端拒绝所述第一终端发起的乘车请求;
    若所述第一标识不存在于所述恶意号码库中,则第二终端接受所述第一终端发起的乘车请求,将所述第一标识添加入恶意号码黑名单中。
  9. 根据权利要求8所述的方法,其中,所述方法还包括:
    第二终端将用于表征第二终端身份的第三标识、由所述第一标识和所述第二标识构成的信息标识码、根据所述乘车请求得到的账单信息封装到第二请求中并发送给服务器,以使服务器从所述第二请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息,对所述信息标识码进行有效性验证后根据所述账单信息发起支付请求以完成与公交出行相关的支付处理。
  10. 一种第一终端,所述第一终端包括:
    触发单元,配置为接收第一操作,根据所述第一操作触发展示信息标识码的请求;
    响应单元,配置为对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
    请求发起单元,配置为根据所述信息标识码发起第一请求,请求第二终端对其进行身份验证以完成目标需求。
  11. 一种第二终端,所述第二终端包括:
    请求响应单元,配置为对所述第一请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
    验证单元,配置为将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,接受所述第 一终端发起的第一请求;
    请求发送单元,配置为将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述目标需求相关的对应处理。
  12. 根据权利要求11所述的第二终端,其中,所述请求响应单元,还配置为:
    在将所述信息标识码由私钥进行加密,得到加密形式的信息标识码后,对所述加密形式的信息标识码按照非对称加解密策略并采用公钥进行解密并从中解析出所述第一标识和所述第二标识。
  13. 根据权利要求11所述的第二终端,其中,所述第二终端还包括:
    接收单元,配置为当第一终端请求第二终端对其进行身份验证以完成目标需求,且所述目标需求为地铁出行时,收到第一终端根据所述信息标识码发起的入闸请求;
    所述验证单元,还配置为若所述第一标识在恶意号码库中,则拒绝所述第一终端发起的入闸请求;若所述第一标识在入闸黑名单中,则拒绝所述第一终端发起的入闸请求;若所述第一标识不存在于所述恶意号码库和所述入闸黑名单中,则接受所述第一终端发起的入闸请求,将所述第一标识添加入所述入闸黑名单中。
  14. 根据权利要求13所述的第二终端,其中,所述接收单元,还配置为当服务器向第一终端推送已入闸信息之后,所述第二终端收到第一终端根据所述信息标识码发起的出闸请求;
    所述请求响应单元,还配置为对所述出闸请求进行响应,从所述出闸请求中解析出所述第一标识和所述第二标识;
    所述验证单元,还配置为将所述第一标识与本地存储的预设信息校验 库进行比对验证以确认用户身份时,若所述第一标识在恶意号码库中,则拒绝所述第一终端发起的出闸请求;若所述第一标识不在出闸白名单中,则拒绝所述第一终端发起的出闸请求;若所述第一标识在所述出闸白名单中,则将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,接受所述第一终端发起的出闸请求,将所述第一标识从所述出闸白名单中删除。
  15. 根据权利要求14所述的第二终端,其中,所述请求发送单元,还配置为:
    将用于表征第二终端身份的第三标识、由所述第一标识和所述第二标识构成的信息标识码、根据所述入闸请求和所述出闸请求得到的账单信息封装到第三请求中并发送给服务器,以使服务器从所述第三请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息,对所述信息标识码进行有效性校验后根据所述账单信息发起支付请求以完成与地铁出行相关的支付处理。
  16. 根据权利要求11所述的第二终端,其中,所述第二终端还包括:
    接收单元,配置为当第一终端请求第二终端对其进行身份验证以完成目标需求,且所述目标需求为公交出行时,收到第一终端根据所述信息标识码发起的乘车请求;
    所述验证单元,还配置为:若所述第一标识在恶意号码库中,则拒绝所述第一终端发起的乘车请求;若所述第一标识不存在于所述恶意号码库中,则接受所述第一终端发起的乘车请求,将所述第一标识添加入恶意号码黑名单中。
  17. 根据权利要求16所述的第二终端,其中,所述请求发送单元,还配置为将用于表征第二终端身份的第三标识、由所述第一标识和所述第二标识构成的信息标识码、根据所述乘车请求得到的账单信息封装到第二请 求中并发送给服务器,以使服务器从所述第二请求中解析出第三标识、由所述第一标识和所述第二标识构成的信息标识码和所述账单信息,对所述信息标识码进行有效性校验后根据所述账单信息发起支付请求以完成与公交出行相关的支付处理。
  18. 一种基于信息标识码进行信息验证的方法,应用于第一终端,所述第一终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
    在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
    在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
    第一终端根据所述信息标识码发起入闸请求或出闸请求,请求第二终端对其进行身份验证以完成地铁出行的目标需求。
  19. 一种基于信息标识码进行信息验证的方法,应用于第二终端,所述第二终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
    第二终端对所述入闸请求或出闸请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
    第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
    第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的入闸请求或出闸请求;
    第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述地铁出行相关的对应处理。
  20. 一种第一终端,所述第一终端包括:
    触发单元,配置为接收第一操作,根据所述第一操作触发展示信息标识码的请求;
    响应单元,配置为对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
    请求发起单元,配置为根据所述信息标识码发起入闸请求或出闸请求,请求第二终端对其进行身份验证以完成地铁出行的目标需求。
  21. 一种第二终端,所述第二终端包括:
    请求响应单元,配置为对所述入闸请求或出闸请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
    验证单元,配置为将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的入闸请求或出闸请求;
    请求发送单元,配置为将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与 所述地铁出行相关的对应处理。
  22. 一种基于信息标识码进行信息验证的方法,应用于第一终端,所述第一终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
    在第一终端侧接收第一操作,根据所述第一操作触发展示信息标识码的请求;
    在第一终端侧对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
    第一终端根据所述信息标识码发起乘车请求,请求第二终端对其进行身份验证以完成公交出行的目标需求。
  23. 一种基于信息标识码进行信息验证的方法,应用于第二终端,所述第二终端包括有一个或多个处理器以及存储器,以及一个或一个以上的程序,其中,所述一个或一个以上的程序存储于存储器中,所述程序可以包括一个或一个以上的每一个对应于一组指令的模块,所述一个或多个处理器被配置为执行指令;所述方法包括:
    第二终端对所述乘车请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
    第二终端将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;
    第二终端将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的乘车请求;
    第二终端将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述公交出行相关的对应处理。
  24. 一种第一终端,所述第一终端包括:
    触发单元,配置为接收第一操作,根据所述第一操作触发展示信息标识码的请求;
    响应单元,配置为对所述第一操作进行响应,根据本地存储的预设策略生成信息标识码,在所述信息标识码中携带用于表征用户身份的第一标识和用于表征信息标识码生成时间的第二标识;
    请求发起单元,配置为根据所述信息标识码发起乘车请求,请求第二终端对其进行身份验证以完成公交出行的目标需求。
  25. 一种第二终端,所述第二终端包括:
    请求响应单元,配置为对所述乘车请求进行响应,从所述信息标识码中解析出所述第一标识和所述第二标识;
    验证单元,配置为将所述第一标识与本地存储的预设信息校验库进行比对验证以确认用户身份;将所述第二标识与第二终端当前的时间进行比对验证,若时间差值在预设时间范围之内,则比对验证通过,第二终端接受所述第一终端发起的乘车请求;
    请求发送单元,配置为将用于表征第二终端身份的第三标识、和由所述第一标识和所述第二标识构成的信息标识码封装到第二请求中并发送给服务器,以使服务器根据接收到的所述第二请求进行有效性验证后进行与所述公交出行相关的对应处理。
  26. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行上述权利要求1、权利要求2-8、 权利要求18、权利要求19、权利要求22、权利要求23任一项所述的基于信息标识码进行信息验证的方法。
PCT/CN2018/073867 2017-01-25 2018-01-23 一种基于信息标识码进行信息验证的方法及终端 WO2018137622A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/420,331 US11188905B2 (en) 2017-01-25 2019-05-23 Information identification code-based information authentication method and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710061391.1 2017-01-25
CN201710061391.1A CN106846506B (zh) 2017-01-25 2017-01-25 一种基于信息标识码进行信息验证的方法及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/420,331 Continuation US11188905B2 (en) 2017-01-25 2019-05-23 Information identification code-based information authentication method and terminal

Publications (1)

Publication Number Publication Date
WO2018137622A1 true WO2018137622A1 (zh) 2018-08-02

Family

ID=59122622

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/073867 WO2018137622A1 (zh) 2017-01-25 2018-01-23 一种基于信息标识码进行信息验证的方法及终端

Country Status (3)

Country Link
US (1) US11188905B2 (zh)
CN (1) CN106846506B (zh)
WO (1) WO2018137622A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3779832A4 (en) * 2018-08-20 2021-06-02 Advanced New Technologies Co., Ltd. PAYMENT RISK CONTROL PROCEDURE AND SYSTEM

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106846506B (zh) * 2017-01-25 2021-08-10 腾讯科技(深圳)有限公司 一种基于信息标识码进行信息验证的方法及系统
CN107170058B (zh) * 2017-07-05 2023-09-08 智慧互通科技股份有限公司 一种基于二维码的车辆出入停车场的控制系统
CN109308608A (zh) * 2017-07-27 2019-02-05 上海申通地铁集团有限公司 基于二维码脱机认证的轨道交通售检票消费系统及方法
CN107798531B (zh) * 2017-08-14 2022-07-15 中国银联股份有限公司 电子支付方法及系统
CN107944857A (zh) 2017-10-31 2018-04-20 阿里巴巴集团控股有限公司 一种支付乘车费的方法及装置
CN108460593B (zh) * 2017-11-01 2022-09-20 福建博思软件股份有限公司 一种离线二维码支付方法及装置
CN108062800A (zh) * 2017-12-22 2018-05-22 北京奇虎科技有限公司 一种公共交通计费方法及装置
CN108234517A (zh) * 2018-01-29 2018-06-29 成都智元汇信息技术股份有限公司 一种基于离线二维码票卡的地铁乘车离线处理系统及方法
CN110400377B (zh) * 2018-04-24 2022-05-20 腾讯科技(深圳)有限公司 凭证数据查重方法及相关设备
CN110427397B (zh) * 2018-04-27 2023-03-21 腾讯科技(深圳)有限公司 凭证数据查重方法及相关设备
CN108711206B (zh) * 2018-05-17 2021-11-30 腾讯科技(深圳)有限公司 闸机控制方法、相关设备、系统及存储介质
CN110633975B (zh) * 2018-06-22 2022-08-26 腾讯科技(深圳)有限公司 公共交通中的行程控制系统、方法、装置及交通支付方法
CN110634191B (zh) * 2018-06-22 2022-03-01 腾讯科技(深圳)有限公司 验证方法、装置、介质以及设备
CN110660139B (zh) * 2018-06-28 2021-07-23 腾讯科技(深圳)有限公司 一种乘车码复制使用的检测系统、方法、装置及终端设备
CN109102578B (zh) * 2018-07-20 2021-05-28 四川知格科技有限公司 一种自助停车计费系统及其运行方法
CN109118205B (zh) * 2018-07-27 2020-09-29 阿里巴巴集团控股有限公司 数据处理方法、数据处理装置和终端设备
CN110838012B (zh) * 2018-08-16 2023-09-19 腾讯科技(深圳)有限公司 一种支付方法、存储介质及相关设备
CN108762854A (zh) * 2018-08-17 2018-11-06 深圳市万通顺达科技股份有限公司 基于操作系统的呼出二维码的方法及其系统、存储介质
CN109194729B (zh) * 2018-08-24 2021-07-09 国广东方网络(北京)有限公司 一种信息通讯系统以及方法
CN109376818A (zh) * 2018-10-09 2019-02-22 杭州收盈科技有限公司 一种基于离线动态二维码的加密对时方法
CN111160915B (zh) * 2018-11-08 2024-01-09 腾讯科技(深圳)有限公司 一种乘车码验证方法、装置、交通扫码设备及终端设备
CN110009328A (zh) * 2018-11-09 2019-07-12 阿里巴巴集团控股有限公司 移动支付方法及装置和电子设备
CN110046881A (zh) * 2018-11-19 2019-07-23 阿里巴巴集团控股有限公司 离线场景下的支付处理方法、服务器及可读存储介质
CN109919607A (zh) * 2018-11-23 2019-06-21 阿里巴巴集团控股有限公司 基于离线乘车码的换乘优惠方法及装置和电子设备
CN109544764B (zh) * 2018-12-19 2022-04-05 广州羊城通有限公司 基于二维码的过闸控制方法及系统
US11462068B1 (en) * 2019-01-29 2022-10-04 American Airlines, Inc. Granting access to a secured area via a door and based on a travel document
CN109919601A (zh) * 2019-03-05 2019-06-21 广州佳都数据服务有限公司 支付验证方法、装置及电子设备
CN111901283B (zh) * 2019-05-05 2022-08-05 腾讯科技(深圳)有限公司 资源转移方法、装置、终端及存储介质
CN110321752B (zh) * 2019-06-03 2023-07-14 创新先进技术有限公司 离线图形码的校验方法及装置
CN110298421B (zh) * 2019-06-26 2023-11-03 云宝宝大数据产业发展有限责任公司 一种二维码的在线生成、离线生成和验证方法及装置
CN110533409A (zh) * 2019-07-10 2019-12-03 北京如易行科技有限公司 乘车反馈信息的推送方法及系统
CN110689950A (zh) * 2019-08-30 2020-01-14 万达信息股份有限公司 一种居民健康卡办理方法及系统
CN110837400A (zh) * 2019-11-06 2020-02-25 北京小米移动软件有限公司 调用系统文件的方法、调用系统文件的装置及存储介质
CN110929237A (zh) * 2019-11-22 2020-03-27 支付宝(杭州)信息技术有限公司 身份验证系统、方法及装置、信息验证系统
CN111104629B (zh) * 2019-11-26 2023-04-11 广州羊城通有限公司 一种动态二维码的验证方法及装置
CN111031125A (zh) * 2019-12-10 2020-04-17 咪付(广西)网络技术有限公司 一种基于出行记录的用户数据推送方法及系统
CN111027979B (zh) * 2019-12-11 2021-06-29 支付宝(杭州)信息技术有限公司 双离线支付的开通、收款、结算方法和装置
CN111340969B (zh) * 2020-03-03 2021-01-05 广州优路加信息科技有限公司 无卡化etc离线处理方法、装置、计算机设备和存储介质
TWI725786B (zh) * 2020-03-20 2021-04-21 新唐科技股份有限公司 受控裝置、主控裝置及資料傳輸方法
CN111444992B (zh) * 2020-03-27 2023-04-07 腾讯云计算(北京)有限责任公司 基于信息码的用户信息查验方法及系统
US20210311710A1 (en) * 2020-04-06 2021-10-07 Bank Of Montreal Systems and methods for automated digital enrollment
CN111488568B (zh) * 2020-04-13 2023-04-11 抖音视界有限公司 客户端方法、装置、设备和存储介质
CN111460430B (zh) * 2020-04-23 2023-06-30 珠海格力电器股份有限公司 设备安装调试控制方法及空调系统
CN111639896A (zh) * 2020-05-25 2020-09-08 上海中通吉网络技术有限公司 电子签单返还方法和装置
CN111710422B (zh) * 2020-06-04 2024-01-26 四川虹微技术有限公司 标识码确定方法、装置、电子设备及可读存储介质
WO2022003796A1 (ja) * 2020-06-29 2022-01-06 日本電気株式会社 情報処理システム、情報処理方法及びプログラム
CN111815840B (zh) * 2020-07-17 2021-12-31 河南华辰智控技术有限公司 一种基于生物识别的地铁快速身份识别系统
CN112100983A (zh) * 2020-08-14 2020-12-18 许继集团有限公司 一种用于系统中的标识码以及标识码的生成方法
CN112419515A (zh) * 2020-10-20 2021-02-26 四川长虹电器股份有限公司 基于微信OpenID的无牌车收费管理方法及系统
CN112419517A (zh) * 2020-10-27 2021-02-26 四川长虹电器股份有限公司 一种适用于无人停车场无牌车识别和收费的方法和系统
EP4236397A4 (en) * 2020-11-30 2023-12-27 Huawei Technologies Co., Ltd. AUTOMOBILE ELECTRONIC IDENTIFIER TRANSMISSION METHOD, ON-BOARD DEVICE AND READ-WRITE DEVICE
CN112616183A (zh) * 2020-12-31 2021-04-06 杭州罗莱迪思科技股份有限公司 一种离线模式下的设备时间同步方法
CN112801253A (zh) * 2021-01-14 2021-05-14 山大地纬软件股份有限公司 一种基于区块链的多场景一码通管控方法及平台
CN112785305A (zh) * 2021-01-22 2021-05-11 新开普电子股份有限公司 一种收款终端、双离线交易方法及系统
CN114898503A (zh) * 2021-01-26 2022-08-12 腾讯科技(深圳)有限公司 一种充电数据处理方法、系统、计算机设备和存储介质
CN112508575B (zh) * 2021-02-03 2021-05-18 八维通科技有限公司 一种基于数字货币的地铁过闸支付方法和系统
CN113744421B (zh) * 2021-09-17 2023-05-05 北京智芯原动科技有限公司 一种基于蓝牙的端云停车管理系统
CN113986943B (zh) * 2021-12-28 2022-04-22 畅捷通信息技术股份有限公司 一种基于场景数据戳的数据一致性验证方法、装置及介质
CN115082051B (zh) * 2022-08-24 2022-12-16 中铁电气化局集团有限公司 一种铁路票务多元化支付平台、加密方法及支付设备

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1517272A1 (en) * 2002-06-24 2005-03-23 Sumitomo Heavy Industries, Ltd. Gate management system and method for vehicle passage gate
GB2423853A (en) * 2005-03-01 2006-09-06 Chunghwa Telecom Co Ltd An electronic ticketing system in which colour barcodes are displayed on mobile comunication devices
CN101364329A (zh) * 2008-09-23 2009-02-11 中国移动通信集团广东有限公司 基于移动通信设备的非接触公交卡类应用系统及管理方法
CN103415858A (zh) * 2011-01-14 2013-11-27 闪席有限责任公司 移动应用条形码识别方法和系统
CN104751334A (zh) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 一种业务处理方法、装置及系统
CN106296293A (zh) * 2016-08-16 2017-01-04 成都仁通融合信息技术有限公司 一种基于电子钱包地铁乘车方法
CN106846506A (zh) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 一种基于信息标识码进行信息验证的方法及系统

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60125744T2 (de) * 2000-04-18 2007-11-08 British Airways Plc, Harmondsworth Ein verfahren zum betreiben eines fahrkartenausgabesystems
US8915431B2 (en) * 2009-07-06 2014-12-23 Visa International Service Association Transit access system and method including device authentication
US9996831B2 (en) * 2009-11-25 2018-06-12 Cubic Corporation Mobile wireless payment and access
US20120054491A1 (en) * 2010-08-31 2012-03-01 Peter John Tippett Re-authentication in client-server communications
CN102842081A (zh) * 2011-06-23 2012-12-26 上海易悠通信息科技有限公司 一种移动电话生成二维码并实现移动支付的方法
US8960536B2 (en) * 2012-02-12 2015-02-24 Norman Wolverton WRIGHT Mobile device for exiting a parking structure and methods thereof
CN105574629B (zh) * 2014-10-13 2020-08-21 航天信息股份有限公司 基于图形编码的电子票务验票方法和系统
EP3335172A1 (en) * 2015-08-14 2018-06-20 Mastercard International Incorporated Managing customer uniqueness in tokenised transaction systems
CN106022819A (zh) * 2016-05-13 2016-10-12 昆山爱贝儿网络科技有限公司 用于轨道交通的移动终端支付车资的方法及系统
CN106296201A (zh) * 2016-08-15 2017-01-04 广州地理研究所 公交一卡通设备离线信用支付验证方法
AU2017100350A4 (en) * 2016-10-06 2017-06-29 Bits Avenue Pty Ltd Scan and Pay Mobile Application

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1517272A1 (en) * 2002-06-24 2005-03-23 Sumitomo Heavy Industries, Ltd. Gate management system and method for vehicle passage gate
GB2423853A (en) * 2005-03-01 2006-09-06 Chunghwa Telecom Co Ltd An electronic ticketing system in which colour barcodes are displayed on mobile comunication devices
CN101364329A (zh) * 2008-09-23 2009-02-11 中国移动通信集团广东有限公司 基于移动通信设备的非接触公交卡类应用系统及管理方法
CN103415858A (zh) * 2011-01-14 2013-11-27 闪席有限责任公司 移动应用条形码识别方法和系统
CN104751334A (zh) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 一种业务处理方法、装置及系统
CN106296293A (zh) * 2016-08-16 2017-01-04 成都仁通融合信息技术有限公司 一种基于电子钱包地铁乘车方法
CN106846506A (zh) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 一种基于信息标识码进行信息验证的方法及系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3779832A4 (en) * 2018-08-20 2021-06-02 Advanced New Technologies Co., Ltd. PAYMENT RISK CONTROL PROCEDURE AND SYSTEM
US11861621B2 (en) 2018-08-20 2024-01-02 Advanced New Technologies Co., Ltd. Payment risk control method and system

Also Published As

Publication number Publication date
US20190279326A1 (en) 2019-09-12
US11188905B2 (en) 2021-11-30
CN106846506B (zh) 2021-08-10
CN106846506A (zh) 2017-06-13

Similar Documents

Publication Publication Date Title
WO2018137622A1 (zh) 一种基于信息标识码进行信息验证的方法及终端
CN102103778B (zh) 移动支付系统、移动终端及移动支付业务的实现方法
CN104050567B (zh) 离线模式下的数据交互方法、终端以及服务器
CN104599408B (zh) 基于动态二维码的第三方账户自动柜员机取款方法及系统
CN108701305A (zh) 数字资产转换
US20090070263A1 (en) Peer to peer fund transfer
CN104471599A (zh) 使用移动通信装置进行金融交易的方法及系统
Raina Overview of mobile payment: technologies and security
CN102722816B (zh) 一种移动支付的方法、系统及装置
CN103839157A (zh) 一种电子支付方法、装置及系统
CN101739771A (zh) 一种公交一卡通业务系统及其实现方法
CN106529938A (zh) 虚拟卡发卡方法、装置、终端
CN101697220A (zh) 保护基于pin交易的安全的系统和方法
WO2014079330A1 (zh) 同步支付系统
US20200013045A1 (en) Stake pool for a secure and trusted data communication system
CN110766397B (zh) 基于数据识别模型的近场支付方法
TW201935349A (zh) 支付乘車費的方法、裝置及設備
CN103268436A (zh) 移动支付中一种基于触摸屏的图形化密码验证方法与系统
CN102611702A (zh) 一种保证网络交易安全的系统及方法
CN106934608B (zh) 多态二维码合成和用户免签免密的交易方法
KR102333811B1 (ko) 블록체인 기반의 카드 결제 처리 시스템 및 방법
CN111062717A (zh) 一种数据转移处理方法、装置和计算机可读存储介质
US11151555B2 (en) Code-based or token-based transfers using automated teller machines
CN102693478A (zh) 一种招投标过程中的投标保证金交易方法及系统
CN106462839A (zh) 用于提供信用的系统和方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18745225

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18745225

Country of ref document: EP

Kind code of ref document: A1