[go: up one dir, main page]

CN106851613A - Service request method, the verification method of business handling number and its terminal - Google Patents

Service request method, the verification method of business handling number and its terminal Download PDF

Info

Publication number
CN106851613A
CN106851613A CN201611135599.5A CN201611135599A CN106851613A CN 106851613 A CN106851613 A CN 106851613A CN 201611135599 A CN201611135599 A CN 201611135599A CN 106851613 A CN106851613 A CN 106851613A
Authority
CN
China
Prior art keywords
terminal
service
verification
short message
authentication request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611135599.5A
Other languages
Chinese (zh)
Inventor
黄儒鸿
刘定京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201611135599.5A priority Critical patent/CN106851613A/en
Publication of CN106851613A publication Critical patent/CN106851613A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses a kind of service request method, the verification method of business handling number and its terminal, wherein service request method includes:Obtain the business handling number for asking transacting business;Authentication request is sent to checking terminal in the form of short message by the identification card of terminal, wherein, the authentication request includes the business handling number;Receive the result that the checking terminal is returned;Determined whether to continue executing with service request handling process according to the result.The embodiment of the present invention can improve the security of business handling, reduce the risk that the telephone number of user is illegally usurped by other people, the telephone number for overcoming user present in prior art may be used by other people, causing user itself cannot use, and if other people produce some bad operation notes in the telephone number transacting business by user, the problem that may be impacted to user.

Description

Service request method, service handling number verification method and terminal thereof
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a service request method, a service handling number verification method, and a terminal thereof.
Background
In addition, according to the regulations of the national relevant law, the user identity needs to be authenticated in real name no matter whether a new identity card or an original identity card is provided with a data service function, namely, one identity card or one telephone number represents the identity of one person, so that many internet services can be authenticated and used through the telephone number at present.
In the prior art, a method for authenticating and using an internet service through a telephone number generally includes that a user inputs a telephone number to be authenticated and used in a display interface for service handling through a terminal, sends the telephone number to a corresponding service server, inputs a verification code in a specified input frame after receiving the verification code returned by the service server, sends the verification code to the service server for verification, completes authentication after the service server passes verification, and at the moment, the user can handle the corresponding service through the telephone number. However, in some cases, since the verification code received by the terminal may be stolen by other users, the phone number of the user may be illegally used by other users, so that the user cannot use the phone number, and if some bad operation records are generated when the other users transact business through the phone number of the user, the user may be affected.
Disclosure of Invention
The embodiment of the invention provides a service request method, a service handling number verification method and a terminal thereof, which can improve the safety of service handling.
In a first aspect, an embodiment of the present invention provides a service request method, where the method includes:
acquiring a service handling number for requesting handling of a service;
sending an identity verification request to a verification terminal in a form of short message through an identity identification card of the terminal, wherein the identity verification request comprises the service handling number;
receiving a verification result returned by the verification terminal;
and determining whether to continue executing the service request processing flow or not according to the verification result.
On the other hand, an embodiment of the present invention provides a method for verifying a service handling number, including:
receiving an identity authentication request sent by a terminal in a short message form, wherein the identity authentication request comprises a service handling number which is input on the terminal by a user and is used for requesting to handle a service;
reading the communication number of the short message sending the identity authentication request, and verifying whether the service handling number is consistent with the communication number;
and returning the verification result to the terminal.
In another aspect, an embodiment of the present invention provides a terminal, where the terminal includes:
a service handling number acquiring unit for acquiring a service handling number for requesting handling of a service;
the authentication request sending unit is used for sending an authentication request to an authentication terminal in a form of a short message through an identity identification card of the terminal, wherein the authentication request comprises the service handling number;
the verification result receiving unit is used for receiving the verification result returned by the verification terminal;
and the service request processing unit is used for determining whether to continuously execute the service request processing flow according to the verification result.
In another aspect, an embodiment of the present invention provides an authentication terminal, where the authentication terminal includes:
the terminal comprises an authentication request receiving unit, a verification request sending unit and a verification processing unit, wherein the authentication request receiving unit is used for receiving an identity authentication request sent by the terminal in a short message form, and the identity authentication request comprises a service processing number which is input by a user on the terminal and is used for requesting to process a service;
a verification request processing unit, configured to read a communication number of a short message that sends the identity verification request, and verify whether the service transaction number is consistent with the communication number;
and the verification result returning unit is used for returning the verification result to the terminal.
The embodiment of the invention obtains the service handling number used for requesting to handle the service; sending an identity verification request to a verification terminal in a form of short message through an identity identification card of the terminal, wherein the identity verification request comprises the service handling number; receiving a verification result returned by the verification terminal; and determining whether to continue to execute the service request processing flow according to the verification result, thereby improving the safety of handling the service, greatly reducing the risk that the telephone number of the user is illegally stolen by other people, and overcoming the problems that the telephone number of the user can be illegally used by other people in the prior art, so that the user cannot use the telephone number, and the user can be influenced if other people generate some bad operation records when handling the service through the telephone number of the user.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a service request method according to a first embodiment of the present invention;
fig. 2 is a schematic flow chart of a service request method according to a second embodiment of the present invention;
fig. 3 is a schematic flow chart of a service request method according to a third embodiment of the present invention;
FIG. 4 is a schematic flow chart of a method for verifying a service transaction number according to a fourth embodiment of the present invention;
fig. 5 is a schematic flowchart of a method for verifying a service transaction number according to a fifth embodiment of the present invention;
fig. 6 is a schematic block diagram of a terminal according to a sixth embodiment of the present invention;
fig. 7 is a schematic block diagram of a terminal according to a seventh embodiment of the present invention;
fig. 8 is a schematic block diagram of a terminal according to an eighth embodiment of the present invention;
fig. 9 is a schematic block diagram of an authentication terminal according to a ninth embodiment of the present invention;
fig. 10 is a schematic block diagram of an authentication terminal according to a tenth embodiment of the present invention;
fig. 11 is a schematic block diagram of a terminal according to an eleventh embodiment of the present invention;
fig. 12 is a schematic block diagram of an authentication terminal according to a twelfth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In particular implementations, the terminals described in embodiments of the invention include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the discussion that follows, a terminal that includes a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the terminal may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal can be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
Referring to fig. 1, it is a schematic flowchart of a service request method provided in a first embodiment of the present invention, where an execution subject of the method is a terminal described in the embodiment of the present invention. As shown in fig. 1, the method may include:
in S101, a service transaction number for requesting transaction of a service is acquired.
In this embodiment, the service includes, but is not limited to, a registration application, a login website, a payment service, and the like, and the service transaction number is a telephone number input by the user on the terminal for registering the application, logging in the website, or requesting payment.
In S102, an identity authentication request is sent to the authentication terminal in a form of a short message through an identity card of the terminal, where the identity authentication request includes the service handling number.
In this embodiment, since the terminal itself cannot directly read the telephone number that the identification card corresponds to and is opened by the operator, and only the ID number that the identification card corresponds to can be obtained, the terminal itself cannot verify whether the service transaction number that is input by the user and used for requesting transaction is the user's own telephone number, in this embodiment, it is necessary to send an authentication request to the authentication terminal in the form of a short message through the identification card of the terminal, and the authentication terminal performs authentication on the service transaction number. Further, in this embodiment, the identification card includes, but is not limited to, a SIM card, a USIM card, a UIM card, a CSIM card, and the like.
In S103, a verification result returned by the verification terminal is received.
In this embodiment, the verification terminal may read a communication number corresponding to the short message after receiving an identity verification request sent by the terminal through the short message, and the verification terminal may return a verification result to the terminal in the form of the short message according to the obtained communication number of the short message after verification is completed.
In S104, it is determined whether to continue executing the service request processing flow according to the verification result.
In this embodiment, after receiving the verification result returned by the verification terminal, the terminal may determine whether to continue to execute the service request process according to the verification result, specifically: if the verification result is that the verification is passed, the service handling number is the own telephone number of the user, and the terminal continues to execute the service request processing flow; if the verification result is verification failure, the service handling number is not the telephone number of the user, and the terminal is forbidden to continue executing the service request processing flow.
As can be seen from the above, in the service request method provided in this embodiment, the service handling number for requesting to handle the service is obtained; sending an identity verification request to a verification terminal in a form of short message through an identity identification card of the terminal, wherein the identity verification request comprises the service handling number; receiving a verification result returned by the verification terminal; and determining whether to continue to execute the service request processing flow according to the verification result, thereby improving the safety of service handling, greatly reducing the risk that the telephone number of the user is illegally stolen by other people, and overcoming the problems that the telephone number of the user can be illegally used by other people in the prior art, the user cannot use the telephone number, and the user can be influenced if other people generate some bad operation records when the service is handled through the telephone number of the user.
Referring to fig. 2, it is a schematic flowchart of a service request method provided in a second embodiment of the present invention, where an execution subject of the method is a terminal described in the embodiment of the present invention. As shown in fig. 2, with respect to the previous embodiment, after determining whether to continue executing the service request processing flow according to the verification result, the service request method provided in this embodiment may further include:
in S205, if the verification result is that the verification is passed, establishing a binding relationship between the identity card and the communication number corresponding to the short message according to the service transaction number, and storing the binding relationship in a local database; or,
in S206, if the verification result is that the verification fails, receiving a communication number corresponding to the short message returned by the verification terminal, establishing a binding relationship between the identification card and the communication number corresponding to the short message, and storing the binding relationship in a local database.
In this embodiment, after receiving the verification result, the terminal acquires the communication number corresponding to the short message in different manners according to the verification result, establishes a binding relationship between the SIM and the communication number corresponding to the short message, and stores the binding relationship in the local database, so that when the terminal acquires the service handling number input by the user and requesting to handle the service next time, the terminal can directly perform identity verification on the service handling number according to the binding relationship stored in the local database without sending an identity verification request to the verification terminal.
Further, in another embodiment, when the terminal next obtains a service handling number for requesting handling of a service, which is input by the user, before the step of sending an authentication request to the authentication terminal in the form of a short message through the identification card of the terminal is executed, the method may further include:
judging whether a local database of the terminal stores the binding relationship between the identity recognition card and the communication number corresponding to the short message;
and if the binding relationship between the identity identification card and the communication number corresponding to the short message is stored, locally verifying whether the service handling number is consistent with the communication number corresponding to the short message according to the binding relationship, and determining whether to continue executing the service request processing flow according to the verification result.
In this embodiment, if the service handling number is consistent with the communication number corresponding to the short message, the verification is passed, and at this time, the terminal continues to execute the service request processing flow; and if the service handling number is not consistent with the communication number corresponding to the short message, the verification fails, and the terminal interrupts the current service request processing flow.
It should be noted that steps S201 to S204 in this embodiment are completely the same as steps S101 to S104 in the embodiment shown in fig. 1, and therefore, are not described herein again.
Therefore, it can be seen that the service request method provided by the embodiment can also improve the security of service handling, reduce the risk that the telephone number of the user is illegally stolen by others, and overcome the problems that the telephone number of the user may be illegally used by others in the prior art, so that the user cannot use the telephone number, and the user may be affected if some bad operation records are generated when the other people handle the service through the telephone number of the user; compared with the previous embodiment, the identity authentication of the service handling number can be directly performed on the service handling number locally at the terminal when the terminal acquires the service handling number next time, and an identity authentication request does not need to be sent to the authentication terminal.
Fig. 3 is a schematic flowchart of a service request method according to a third embodiment of the present invention, where an execution subject of the method is a terminal described in the embodiment of the present invention. Referring to fig. 3, with respect to the previous embodiment, before the sending an authentication request to the authentication terminal in the form of a short message through the identification card of the terminal, the service request method provided in this embodiment further includes:
in S302, the service transaction number is encrypted by a preset secure encryption algorithm, and the authentication request is generated according to the encrypted service transaction number.
In this embodiment, the terminal includes a secure encryption chip, the preset secure encryption algorithm is stored in the secure encryption chip, and when the terminal is specifically implemented, the secure encryption chip encrypts the service transaction number by using the preset secure encryption algorithm. Preferably, the preset security algorithm is a hash algorithm, and due to the uniqueness and irreversibility of a one-way password mechanism of the hash algorithm, the accuracy and the security of the service handling number verification can be ensured.
In this embodiment, before sending the authentication request, the terminal first performs encryption calculation on the service handling number by using a security encryption algorithm preset in a security encryption chip, then generates the authentication request according to the encrypted service handling number, and then sends the authentication request including the encrypted service handling number to the authentication terminal, so that the service handling number can be prevented from being illegally intercepted by other people in the communication process between the terminal and the authentication terminal, and the security of the whole communication process is ensured.
It should be noted that, the implementation manners of step S301 and steps S303 to S307 in this embodiment are completely the same as those of steps S201 to S206 in the embodiment shown in fig. 2, and therefore, the description thereof is omitted here.
Therefore, it can be seen that the service request method provided by the embodiment can also improve the security of handling the service, reduce the risk that the telephone number of the user is illegally stolen by others, and overcome the problems that the telephone number of the user may be illegally used by others in the prior art, so that the user cannot use the telephone number, and the user may be affected if some bad operation records are generated when the others handle the service through the telephone number of the user; compared with the previous embodiment, the method and the device can also prevent the service handling number from being illegally intercepted by others in the communication process of the terminal and the verification terminal, and ensure the safety of the whole communication process.
Fig. 4 is a schematic flowchart of a method for verifying a service transaction number according to a fourth embodiment of the present invention, where an execution subject of the method is a verification terminal according to the embodiment of the present invention. Referring to fig. 4, the method may include:
in S401, an authentication request sent by a terminal in a form of a short message is received, where the authentication request includes a service transaction number input by a user on the terminal and used for requesting transaction of a service.
In S402, the communication number of the short message that sent the authentication request is read, and it is verified whether the service transaction number is consistent with the communication number.
In this embodiment, after receiving an authentication request sent by a terminal through a short message, an authentication terminal may read a communication number for sending the short message, where the communication number is a communication number corresponding to an SIM of the terminal, and therefore, the authentication terminal may perform authentication on the service handling number according to the communication number, specifically: verifying whether the service handling number is consistent with the communication number corresponding to the short message or not, and if so, passing the verification; if not, the verification fails.
In S403, the verification result is returned to the terminal.
In this embodiment, the verification terminal returns the verification result to the terminal in the form of a short message through the communication number, so that the terminal determines whether to continue to execute the service request processing flow according to the verification result. Further, the verification result includes two types of verification pass or verification fail: if the verification is passed, the verification terminal returns the information that the verification is passed to the terminal; and if the verification fails, the verification terminal returns the information of the failure of the verification to the terminal and returns the acquired communication number corresponding to the short message to the terminal.
Therefore, it can be seen that the method for verifying the service handling number provided by the embodiment can also improve the security of handling the service, reduce the risk that the telephone number of the user is illegally stolen by other people, and overcome the problems that the telephone number of the user may be illegally used by other people in the prior art, so that the user cannot use the telephone number, and the user may be affected if other people generate some bad operation records when handling the service through the telephone number of the user.
Fig. 5 is a schematic flowchart of a method for verifying a service transaction number according to a fifth embodiment of the present invention, where an execution main body of the method is a verification terminal according to the embodiment of the present invention. Referring to fig. 5, a service request method provided in this embodiment includes:
in S501, an authentication request sent by a terminal in the form of a short message is received, where the authentication request includes a service transaction number processed by a preset secure encryption algorithm.
In this embodiment, since the service transaction number in the authentication request is processed by the preset security encryption algorithm, the service transaction number can be prevented from being illegally intercepted by others in the communication process between the terminal and the authentication terminal, and the security of the whole communication process is ensured.
In S502, the communication number of the short message that sends the authentication request is read, the communication number is encrypted and calculated by the preset secure encryption algorithm, and it is verified whether the service transaction number after the encryption calculation is consistent with the communication number after the encryption calculation.
In this embodiment, after receiving an authentication request sent by the terminal through a short message, the authentication terminal may read a communication number for sending the short message, and since a service handling number in the authentication request is processed by a preset security encryption algorithm, in order to verify whether the service handling number is consistent with the communication number, it is necessary to perform encryption calculation on the communication number by using the preset security encryption algorithm, and then compare whether the service handling number after the encryption calculation is consistent with the communication number after the encryption calculation.
Further, in this embodiment, the preset security algorithm is a hash algorithm, and due to the uniqueness and irreversibility of a one-way password mechanism of the hash algorithm, the accuracy and security of number verification in service handling can be ensured.
In S503, the verification result is returned to the terminal.
In this embodiment, the implementation process of step S503 is completely the same as the implementation process of step S403 in the previous embodiment, and therefore, the description thereof is omitted here.
Therefore, it can be seen that the verification method for the service handling number provided by the embodiment can also improve the security of handling the service, reduce the risk that the telephone number of the user is illegally stolen by others, and overcome the problems that the telephone number of the user may be illegally used by others in the prior art, so that the user cannot use the telephone number, and the user may be affected if some bad operation records are generated when others handle the service through the telephone number of the user; in addition, compared with the previous embodiment, the embodiment can also prevent the service handling number from being illegally intercepted by others in the communication process of the terminal and the verification terminal, and ensure the safety of the whole communication process.
Fig. 6 is a schematic block diagram of a terminal according to a sixth embodiment of the present invention, and only the parts related to this embodiment are shown for convenience of description.
Referring to fig. 6, the present embodiment provides a terminal 10, including:
a service handling number obtaining unit 11, configured to obtain a service handling number used for requesting handling of a service;
an authentication request sending unit 12, configured to send an authentication request to an authentication terminal in a form of a short message through an identification card of the terminal 10, where the authentication request includes the service handling number;
a verification result receiving unit 13, configured to receive a verification result returned by the verification terminal;
and the service request processing unit 14 is configured to determine whether to continue to execute the service request processing flow according to the verification result.
Optionally, referring to fig. 7, in a seventh embodiment of the present invention, the terminal 10 further includes:
a binding relationship establishing unit 15, configured to:
if the verification result is that the verification is passed, establishing a binding relationship between the identity identification card and a communication number corresponding to the short message according to the service handling number, and storing the binding relationship into a local database; or,
and if the verification result is verification failure, receiving a communication number corresponding to the short message returned by the verification terminal, establishing a binding relationship between the identity identification card and the communication number corresponding to the short message, and storing the binding relationship to a local database.
Optionally, the terminal 10 further includes:
a local database querying unit 16 for:
judging whether a local database of the terminal 10 stores the binding relationship between the identity recognition card and the communication number corresponding to the short message;
and if the binding relationship between the identity identification card and the communication number corresponding to the short message is stored, locally verifying whether the service handling number is consistent with the communication number corresponding to the short message according to the binding relationship, and determining whether to continue executing the service request processing flow according to the verification result.
Optionally, referring to fig. 8, in an eighth embodiment of the present invention, the terminal 10 further includes:
and the first encryption calculation unit 17 is configured to perform encryption calculation on the service handling number through a preset security encryption algorithm, and generate the authentication request according to the encrypted service handling number.
It should be noted that, since the method embodiments shown in fig. 1 to fig. 3 of the present invention are based on the same concept, the technical effects of the units in the terminal 10 provided in this embodiment are the same as the method embodiments shown in fig. 1 to fig. 3 of the present invention, and specific contents may refer to the description in the method embodiments shown in fig. 1 to fig. 3 of the present invention, and are not described again here.
Therefore, it can be seen that the terminal provided in the embodiment of the present invention can also improve the security of handling the service, reduce the risk that the phone number of the user is illegally stolen by others, and overcome the problems that the phone number of the user may be illegally used by others in the prior art, so that the user cannot use the phone number, and the user may be affected if some bad operation records are generated when the others handle the service through the phone number of the user.
Fig. 9 is a schematic block diagram of an authentication terminal according to a ninth embodiment of the present invention. Only the portions related to the present embodiment are shown for convenience of explanation.
Referring to fig. 9, the present embodiment provides an authentication terminal 20, including:
an authentication request receiving unit 21, configured to receive an authentication request sent by a terminal 10 in a short message form, where the authentication request includes a service transaction number input by a user on the terminal 10 and used for requesting transaction of a service;
a verification request processing unit 22, configured to read a communication number of the short message that sends the identity verification request, and verify whether the service transaction number is consistent with the communication number;
an authentication result returning unit 23, configured to return an authentication result to the terminal 10.
Optionally, referring to fig. 10, in a tenth embodiment of the present invention, the service transaction number in the authentication request is processed by a preset secure encryption algorithm, and the authentication request processing unit 22 includes:
the second encryption calculation unit 221 is configured to perform encryption calculation on the communication number through the preset secure encryption algorithm;
and the comparing unit 222 is configured to verify whether the service handling number after the encryption calculation is consistent with the communication number after the encryption calculation.
It should be noted that, since the method embodiments shown in fig. 4 to fig. 5 of the present invention are based on the same concept, the technical effects of the units in the verification terminal provided in this embodiment are the same as those of the method embodiments shown in fig. 4 to fig. 5 of the present invention, and specific contents may refer to descriptions in the method embodiments shown in fig. 4 to fig. 5 of the present invention, and are not described again here.
Therefore, it can be seen that the terminal 10 provided in the embodiment of the present invention can also improve the security of handling the service, reduce the risk that the phone number of the user is illegally stolen by others, and overcome the problems that the phone number of the user may be illegally used by others in the prior art, so that the user cannot use the phone number of the user, and the user may be affected if some bad operation records are generated when the others handle the service through the phone number of the user.
Referring to fig. 11, a schematic block diagram of a terminal 10 according to an eleventh embodiment of the present invention is shown, where the terminal 10 is configured to operate the method according to the embodiments of the present invention shown in fig. 1 to fig. 3. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 11, the present embodiment provides a terminal 10, including:
a first processor 100(processor), a first communication Interface 200(Communications Interface), a first memory 300(memory), and a first bus 400.
The first processor 100, the first communication interface 200 and the first memory 300 are communicated with each other through a bus 400.
A first communication interface 200 for communicating with a cable modem.
The first processor 100 is configured to execute a first program 301.
In particular, the first program 301 may include program code comprising computer operating instructions.
The first processor 100 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention.
The first memory 300 is used for storing a first program 301. The first memory 300 may comprise a high-speed RAM memory, and may further comprise a non-volatile memory (non-volatile memory), such as at least one disk memory. The first program 301 specifically includes:
a service handling number obtaining unit 11, configured to obtain a service handling number used for requesting handling of a service;
an authentication request sending unit 12, configured to send an authentication request to an authentication terminal 20 in a form of a short message through an identification card of the terminal 10, where the authentication request includes the service handling number;
a verification result receiving unit 13, configured to receive a verification result returned by the verification terminal 20;
and the service request processing unit 14 is configured to determine whether to continue to execute the service request processing flow according to the verification result.
Optionally, the first program 301 further includes:
a binding relationship establishing unit 15, configured to:
if the verification result is that the verification is passed, establishing a binding relationship between the identity identification card and a communication number corresponding to the short message according to the service handling number, and storing the binding relationship into a local database; or,
and if the verification result is verification failure, receiving a communication number corresponding to the short message returned by the verification terminal 20, establishing a binding relationship between the identity identification card and the communication number corresponding to the short message, and storing the binding relationship in a local database.
Optionally, the first program 301 further includes:
a local database querying unit 16 for:
judging whether a local database of the terminal 10 stores the binding relationship between the identity recognition card and the communication number corresponding to the short message;
and if the binding relationship between the identity identification card and the communication number corresponding to the short message is stored, locally verifying whether the service handling number is consistent with the communication number corresponding to the short message according to the binding relationship, and determining whether to continue executing the service request processing flow according to the verification result.
Optionally, the first program 301 further includes:
and the first encryption calculation unit 17 is configured to perform encryption calculation on the service handling number through a preset security encryption algorithm, and generate the authentication request according to the encrypted service handling number.
Referring to fig. 12, a schematic block diagram of an authentication terminal 20 according to a twelfth embodiment of the present invention is shown, where the authentication terminal 20 is configured to execute the methods according to the embodiments shown in fig. 4 to fig. 5 of the present invention. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 12, the present embodiment provides an authentication terminal 20, including:
a second processor 500(processor), a second communication Interface 600(Communications Interface), a second memory 700(memory), and a second bus 800.
The second processor 500, the second communication interface 600 and the second memory 700 are communicated with each other via the bus 800.
A second communication interface 600 for communicating with a cable modem.
A second processor 500 for executing a second program 701.
In particular, the second program 701 may include program code comprising computer operating instructions.
The second processor 500 may be a central processing unit CPU or an application Specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention.
The second memory 700 is used for storing a second program 701. The secondary memory 700 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory. The second program 701 specifically includes:
an authentication request receiving unit 21, configured to receive an authentication request sent by a terminal 10 in a short message form, where the authentication request includes a service transaction number input by a user on the terminal 10 and used for requesting transaction of a service;
a verification request processing unit 22, configured to read a communication number of the short message that sends the identity verification request, and verify whether the service transaction number is consistent with the communication number;
an authentication result returning unit 23, configured to return an authentication result to the terminal 10.
Optionally, the service transaction number in the authentication request is processed by a preset secure encryption algorithm, and the authentication request processing unit 22 includes:
the second encryption calculation unit 221 is configured to perform encryption calculation on the communication number through the preset secure encryption algorithm;
and the comparing unit 222 is configured to verify whether the service handling number after the encryption calculation is consistent with the communication number after the encryption calculation.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the unit in the terminal described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal and method can be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the terminal of the embodiment of the invention can be merged, divided and deleted according to actual needs.
The functions, if implemented in the form of software function modules and sold or used as a stand-alone product, may be stored in a terminal-readable storage medium. Based on such understanding, the technical solution of the present invention or a part thereof, which essentially contributes to the prior art, may be embodied in the form of a software product stored in a storage medium and including instructions for causing a terminal (which may be a mobile phone, an IPAD, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (12)

1. A service request method, comprising:
acquiring a service handling number for requesting handling of a service;
sending an identity verification request to a verification terminal in a form of short message through an identity identification card of the terminal, wherein the identity verification request comprises the service handling number;
receiving a verification result returned by the verification terminal;
and determining whether to continue executing the service request processing flow or not according to the verification result.
2. The service request method according to claim 1, wherein after determining whether to continue executing the service request processing flow according to the verification result, the method further comprises:
if the verification result is that the verification is passed, the service handling number is consistent with the communication number corresponding to the short message, a binding relation between the identity recognition card and the communication number corresponding to the short message is established according to the service handling number, and the binding relation is stored in a local database; or,
and if the verification result is verification failure, receiving a communication number corresponding to the short message returned by the verification terminal, establishing a binding relationship between the identity identification card and the communication number corresponding to the short message, and storing the binding relationship to a local database.
3. The service request method according to claim 2, wherein after obtaining the service handling number for requesting handling of the service, the method further comprises:
judging whether a local database of the terminal stores the binding relationship between the identity recognition card and the communication number corresponding to the short message;
and if the binding relationship between the identity identification card and the communication number corresponding to the short message is stored, locally verifying whether the service handling number is consistent with the communication number corresponding to the short message according to the binding relationship, and determining whether to continue executing the service request processing flow according to the verification result.
4. The service request method according to claim 1, wherein before sending the authentication request to the authentication terminal in a form of a short message through the terminal's identification card, the method further comprises:
and carrying out encryption calculation on the service handling number through a preset security encryption algorithm, and generating the authentication request according to the encrypted service handling number, wherein the service handling number included in the authentication request is specifically the encrypted service handling number.
5. A method for verifying a service handling number is characterized by comprising the following steps:
receiving an identity authentication request sent by a terminal in a short message form, wherein the identity authentication request comprises a service handling number which is input on the terminal by a user and is used for requesting to handle a service;
reading the communication number of the short message sending the identity authentication request, and verifying whether the service handling number is consistent with the communication number;
and returning the verification result to the terminal.
6. The method for verifying the service transaction number according to claim 5, wherein the service transaction number in the authentication request is processed by a preset security encryption algorithm, and the verifying whether the service transaction number is consistent with the communication number comprises:
and carrying out encryption calculation on the communication number through the preset security encryption algorithm, and verifying whether the service handling number after encryption calculation is consistent with the communication number after encryption calculation.
7. A terminal, comprising:
a service handling number acquiring unit for acquiring a service handling number for requesting handling of a service;
the authentication request sending unit is used for sending an authentication request to an authentication terminal in a form of a short message through an identity identification card of the terminal, wherein the authentication request comprises the service handling number;
the verification result receiving unit is used for receiving the verification result returned by the verification terminal;
and the service request processing unit is used for determining whether to continuously execute the service request processing flow according to the verification result.
8. The terminal of claim 7, further comprising:
a binding relationship establishing unit configured to:
if the verification result is that the verification is passed, establishing a binding relationship between the identity identification card and a communication number corresponding to the short message according to the service handling number, and storing the binding relationship into a local database; or,
and if the verification result is verification failure, receiving a communication number corresponding to the short message returned by the verification terminal, establishing a binding relationship between the identity identification card and the communication number corresponding to the short message, and storing the binding relationship to a local database.
9. The terminal of claim 8, further comprising:
a local database query unit to:
judging whether a local database of the terminal stores the binding relationship between the identity recognition card and the communication number corresponding to the short message;
and if the binding relationship between the identity identification card and the communication number corresponding to the short message is stored, locally verifying whether the service handling number is consistent with the communication number corresponding to the short message according to the binding relationship, and determining whether to continue executing the service request processing flow according to the verification result.
10. The terminal of claim 7, further comprising:
and the first encryption calculation unit is used for carrying out encryption calculation on the service handling number through a preset security encryption algorithm and generating the authentication request according to the encrypted service handling number.
11. An authentication terminal, comprising:
the terminal comprises an authentication request receiving unit, a verification request sending unit and a verification processing unit, wherein the authentication request receiving unit is used for receiving an identity authentication request sent by the terminal in a short message form, and the identity authentication request comprises a service processing number which is input by a user on the terminal and is used for requesting to process a service;
a verification request processing unit, configured to read a communication number of a short message that sends the identity verification request, and verify whether the service transaction number is consistent with the communication number;
and the verification result returning unit is used for returning the verification result to the terminal.
12. The authentication terminal according to claim 11, wherein the service transaction number in the authentication request is processed by a preset secure encryption algorithm, and the authentication request processing unit comprises:
the second encryption calculation unit is used for carrying out encryption calculation on the communication number through the preset security encryption algorithm;
and the comparison unit is used for verifying whether the service handling number after the encryption calculation is consistent with the communication number after the encryption calculation.
CN201611135599.5A 2016-12-09 2016-12-09 Service request method, the verification method of business handling number and its terminal Pending CN106851613A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611135599.5A CN106851613A (en) 2016-12-09 2016-12-09 Service request method, the verification method of business handling number and its terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611135599.5A CN106851613A (en) 2016-12-09 2016-12-09 Service request method, the verification method of business handling number and its terminal

Publications (1)

Publication Number Publication Date
CN106851613A true CN106851613A (en) 2017-06-13

Family

ID=59139122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611135599.5A Pending CN106851613A (en) 2016-12-09 2016-12-09 Service request method, the verification method of business handling number and its terminal

Country Status (1)

Country Link
CN (1) CN106851613A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733891A (en) * 2017-10-17 2018-02-23 深圳市金立通信设备有限公司 A kind of user registering method, server and computer-readable recording medium
CN108416485A (en) * 2017-07-25 2018-08-17 平安科技(深圳)有限公司 Method for identifying ID, electronic device and computer readable storage medium
CN109345186A (en) * 2018-08-15 2019-02-15 中国平安人寿保险股份有限公司 Business handling method and terminal device based on Internet of Things
CN110049106A (en) * 2019-03-22 2019-07-23 口碑(上海)信息技术有限公司 Service request processing system and method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1996839A (en) * 2006-01-07 2007-07-11 孟庆川 A low-cost and easy-to-distribute identity verification method and device
EP0862104B1 (en) * 1997-02-28 2009-08-19 Casio Computer Co., Ltd. Authentication system using network
KR20100079325A (en) * 2008-12-31 2010-07-08 이태원 System and method of certification of call center service using wireless public ceritification of mobile terminal
US20150024712A1 (en) * 2013-07-19 2015-01-22 Seung Han Kang User authentification system using call identification information and method thereof
CN104901801A (en) * 2014-03-06 2015-09-09 腾讯科技(深圳)有限公司 Method and device for verifying identity
CN106130956A (en) * 2016-06-03 2016-11-16 谢渤 A kind of telephone authentication method and apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0862104B1 (en) * 1997-02-28 2009-08-19 Casio Computer Co., Ltd. Authentication system using network
CN1996839A (en) * 2006-01-07 2007-07-11 孟庆川 A low-cost and easy-to-distribute identity verification method and device
KR20100079325A (en) * 2008-12-31 2010-07-08 이태원 System and method of certification of call center service using wireless public ceritification of mobile terminal
US20150024712A1 (en) * 2013-07-19 2015-01-22 Seung Han Kang User authentification system using call identification information and method thereof
CN104901801A (en) * 2014-03-06 2015-09-09 腾讯科技(深圳)有限公司 Method and device for verifying identity
CN106130956A (en) * 2016-06-03 2016-11-16 谢渤 A kind of telephone authentication method and apparatus

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108416485A (en) * 2017-07-25 2018-08-17 平安科技(深圳)有限公司 Method for identifying ID, electronic device and computer readable storage medium
CN107733891A (en) * 2017-10-17 2018-02-23 深圳市金立通信设备有限公司 A kind of user registering method, server and computer-readable recording medium
CN109345186A (en) * 2018-08-15 2019-02-15 中国平安人寿保险股份有限公司 Business handling method and terminal device based on Internet of Things
CN109345186B (en) * 2018-08-15 2023-04-18 中国平安人寿保险股份有限公司 Service handling method based on Internet of things and terminal equipment
CN110049106A (en) * 2019-03-22 2019-07-23 口碑(上海)信息技术有限公司 Service request processing system and method

Similar Documents

Publication Publication Date Title
US9560033B2 (en) Method and system for authenticating user identity
CN109257321B (en) Secure login method and device
CN111917773A (en) Service data processing method and device and server
CN108683667B (en) Account protection method, device, system and storage medium
CN106921799A (en) A kind of mobile terminal safety means of defence and mobile terminal
CN104378343A (en) Network account password regain method, device and system
EP2690589A1 (en) Method and system for security information interaction based on internet
CA3122376A1 (en) Systems and methods for securing login access
TW201426593A (en) Method and apparatus for information verification
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
CN111274563A (en) Security authentication method and related device
CN104853030B (en) Information processing method and mobile terminal
TWM539667U (en) System of online credentials application for network transaction via carrier
CN108964921A (en) Verification System, authentication method and service server
CN107679383B (en) Identity verification method and device based on geographic position and touch area
CN114625756A (en) Data query method and device and server
WO2020215905A1 (en) Data delivery method, apparatus, and device, and computer-readable storage medium
US10845990B2 (en) Method for executing of security keyboard, apparatus and system for executing the method
US20140215592A1 (en) Method, apparatus and system for user authentication
CN105405010B (en) Trading device, trading system and trading method using the same
CN115482132A (en) Data processing method and device for electronic contract based on block chain and server
WO2014117563A1 (en) Method, apparatus and system for user authentication
JP5947358B2 (en) Authentication processing apparatus, method and program
CN111324876A (en) Exchange login method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20201215