[go: up one dir, main page]

CN108990059B - Verification method and device - Google Patents

Verification method and device Download PDF

Info

Publication number
CN108990059B
CN108990059B CN201710409372.3A CN201710409372A CN108990059B CN 108990059 B CN108990059 B CN 108990059B CN 201710409372 A CN201710409372 A CN 201710409372A CN 108990059 B CN108990059 B CN 108990059B
Authority
CN
China
Prior art keywords
phone number
mobile phone
gateway
authentication information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710409372.3A
Other languages
Chinese (zh)
Other versions
CN108990059A (en
Inventor
张天宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201710409372.3A priority Critical patent/CN108990059B/en
Publication of CN108990059A publication Critical patent/CN108990059A/en
Application granted granted Critical
Publication of CN108990059B publication Critical patent/CN108990059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a verification method, which is used for solving the problems that in the prior art, when a mobile phone number is verified, the number of user operation steps is more, and the convenience is lower. The method comprises the following steps: a terminal sends a gateway authentication request to a gateway of a telecom operator, wherein the gateway authentication request comprises an international mobile subscriber identity of the terminal; the gateway determines a target mobile phone number corresponding to the international mobile subscriber identity according to the gateway authentication request, determines authentication information corresponding to the target mobile phone number, and sends the authentication information to the terminal; the terminal sends a verification request to a server, wherein the verification request comprises a mobile phone number to be verified and the authentication information; and the server acquires the target mobile phone number corresponding to the authentication information from the gateway according to the verification request, and verifies the mobile phone number to be verified according to the acquired target mobile phone number. The application also discloses a verification device.

Description

Verification method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a verification method and apparatus.
Background
In the internet, when some services based on the mobile phone number are processed, the mobile phone number is often required to be verified so as to ensure that the mobile phone number input by the user is correct and that the user actually has the right of use of the mobile phone number. For example, when a user registers an account number through a mobile phone number, the server often verifies the mobile phone number input by the user.
In the prior art, when a mobile phone number is verified, a server issues a verification code to a terminal corresponding to the mobile phone number to be verified in a form of a short message or voice through a telecom operator, a user sends the received verification code to the server through the terminal, and the server determines that the mobile phone number passes verification after determining that the received verification code is consistent with the issued verification code.
In the existing process of verifying the mobile phone number, more operations need to be carried out by a user, and the convenience is lower. Taking the verification by the short message as an example, please refer to fig. 1, after the user inputs the mobile phone number on the verification interface, the user needs to click the button for sending the verification code, then go to the short message interface to check the received verification code, then return to the verification interface to fill the received verification code into the corresponding input box, and finally click to determine to complete the operation process of the client.
Disclosure of Invention
The embodiment of the application provides a verification method, which is used for solving the problems that in the prior art, when a mobile phone number is verified, the number of user operation steps is more, and the convenience is lower.
The embodiment of the application adopts the following technical scheme:
a method of authentication, comprising:
a terminal sends a gateway authentication request to a gateway of a telecom operator, wherein the gateway authentication request comprises an international mobile subscriber identity of the terminal;
the gateway determines a target mobile phone number corresponding to the international mobile subscriber identity according to the gateway authentication request, determines authentication information corresponding to the target mobile phone number, and sends the authentication information to the terminal;
the terminal sends a verification request to a server, wherein the verification request comprises a mobile phone number to be verified and the authentication information;
and the server acquires the target mobile phone number corresponding to the authentication information from the gateway according to the verification request, and verifies the mobile phone number to be verified according to the acquired target mobile phone number.
The embodiment of the application also provides a verification method, which is used for solving the problems of more user operation steps and lower convenience in the prior art when the mobile phone number is verified.
The embodiment of the application adopts the following technical scheme:
a method of authentication, comprising:
according to the international mobile subscriber identity of the terminal, acquiring authentication information through a gateway of a telecom operator, wherein the authentication information is information corresponding to a target mobile phone number of the terminal;
and sending a verification request to a server, wherein the verification request comprises the mobile phone number to be verified and the authentication information, and the verification request is used for requesting the server to verify the mobile phone number to be verified through the gateway according to the authentication information.
The embodiment of the application also provides a verification method, which is used for solving the problems of more user operation steps and lower convenience in the prior art when the mobile phone number is verified.
The embodiment of the application adopts the following technical scheme:
the method comprises the steps that a server receives a verification request sent by a terminal, wherein the verification request comprises a mobile phone number to be verified and authentication information, and the authentication information is information which is acquired by the terminal through a gateway of a telecom operator and corresponds to a target mobile phone number of the terminal;
and the server responds to the verification request and verifies the mobile phone number to be verified through the gateway according to the authentication information.
The embodiment of the application also provides a verification device, which is used for solving the problems of more user operation steps and lower convenience in the prior art when the mobile phone number is verified.
The embodiment of the application adopts the following technical scheme:
an authentication apparatus comprising:
the authentication information acquisition unit is used for acquiring authentication information through a gateway of a telecom operator according to the international mobile subscriber identity of the terminal, wherein the authentication information is information corresponding to a target mobile phone number, and the target mobile phone number is a mobile phone number corresponding to the international mobile subscriber identity of the terminal;
and the verification request sending unit is used for sending a verification request to a server, wherein the verification request comprises the mobile phone number to be verified and the authentication information, and the verification request is used for requesting the server to verify the mobile phone number to be verified through the gateway according to the authentication information.
The embodiment of the application also provides a verification device, which is used for solving the problems of more user operation steps and lower convenience in the prior art when the mobile phone number is verified.
The embodiment of the application adopts the following technical scheme:
the verification request receiving unit is used for receiving a verification request sent by a terminal, wherein the verification request comprises a mobile phone number to be verified and authentication information, and the authentication information is acquired by the terminal through a gateway of a telecom operator;
and the authentication unit responds to the authentication request and authenticates the mobile phone number to be authenticated through the gateway according to the authentication information.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
the terminal obtains the authentication information through the gateway of the telecom operator, the authentication information is information corresponding to the target mobile phone number of the terminal, therefore, after the terminal sends the verification request to the server, the server can send the authentication information to the gateway, the gateway returns the authentication information to the server and the target mobile phone number corresponding to the authentication information, and the server can verify the mobile phone number to be verified in the verification request according to the target mobile phone number. The whole verification process only needs the user to input the mobile phone number to be verified, other operations such as short message checking and verification code inputting are not needed, and compared with the prior art, the method and the device are high in convenience.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic view of an operation flow of a user when verifying a mobile phone number in the prior art;
fig. 2 is a schematic flow chart illustrating an implementation of a verification method provided in the present application;
fig. 3 is a schematic flow chart illustrating an implementation of a verification method provided in the present application;
fig. 4 is a schematic view of an implementation scenario of a verification method provided in the present application;
fig. 5 is a schematic structural diagram of a verification method provided in the present application;
fig. 6 is a schematic flow chart illustrating an implementation of a verification method provided in the present application;
fig. 7 is a schematic view of an operation flow of a user when verifying a mobile phone number according to the present application;
fig. 8 is a schematic structural diagram of an authentication apparatus provided in the present application;
fig. 9 is a schematic structural diagram of an authentication apparatus provided in the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
At present, the scenes of verifying the mobile phone number are more and more, and the mobile phone number corresponds to the communication equipment, so that the verification of the mobile phone number can also be called as verification equipment in the field.
The Mobile phone Number described in the embodiment of the present application may be a user Number, such as a Mobile Directory Number (MDN), used for identifying a user identity when the terminal device communicates through a Mobile network, where a Number to be dialed when a calling user calls a called user is an MDN code, which is a so-called Mobile phone Number.
With the development of computer technology, the terminal device in the embodiment of the present application is not limited to a mobile phone, but may be a tablet computer, a smart watch, a vehicle-mounted mobile station, and other devices capable of communicating via a mobile network.
As described in the background art, in the prior art, in the process of verifying a mobile phone number, a user needs to perform more operations, and convenience is low. Therefore, the user needs to execute more operations unrelated to the ongoing service, which disturbs the service originally performed by the user and influences the user experience. For example, a user is using a mobile phone number to perform an account registration service, and when registering an account, information such as some account, password, identity information, and the like is often filled in, so that the user is obviously disturbed to perform the account registration service for the mobile phone number in the verification process of the mobile phone number, and the user experience is affected.
In addition, in the prior art, the process of verifying the mobile phone number is time-consuming. Specifically, for example, after the user clicks the send-to-send short message button, it usually takes ten seconds or more for the terminal to receive the short message, and after receiving the short message, the user also switches the application program, memorizes (or copies) the verification code, and then inputs (or pastes) the verification code. The whole operation process usually takes about 30 seconds.
In addition, in the prior art, the failure rate of verifying the mobile phone number is high. Specifically, for some users with unskilled operation, misoperation is easy to occur, and errors are easy to occur when the verification code is memorized and input, so that the verification of the mobile phone number fails. In addition, in a weak network environment, the arrival rate of the short messages is low, which easily causes the failure of the verification of the mobile phone number.
In addition, in the prior art, the way of automatically reading short messages and other verification mobile phone numbers is not stable enough. When the short message is automatically read, the application program needs to read the short message received by the terminal through a preset interface, and then extracts the verification code in the short message to complete the verification of the mobile phone number. However, the device permission needs to be obtained when the short message is read, and whether the device permission can be obtained is often influenced by various factors, for example, the apple operating system does not provide the short message reading permission, most devices in the android operating system do not provide the short message reading permission, and in addition, the permission is easily limited by safety software, so that the realization of the function of automatically reading the short message is influenced, and therefore, the modes of automatically reading the short message and verifying the mobile phone number are not stable enough.
The authentication method provided by the present application will be described in detail below, and an execution subject of the method may be a computing device, such as a terminal device like a smart phone or a tablet computer. In addition, the execution subject of the method can also be an application program for realizing the verification method provided by the application. For convenience of description, the following description will be made of an embodiment of the method taking the main implementation of the method as an example. It is to be understood that the implementation of the method by the terminal is merely an exemplary illustration and should not be construed as a limitation of the method.
An implementation flow diagram of the verification method provided by the present application is shown in fig. 2, and includes the following steps:
step S101: acquiring authentication information through a gateway of a telecom operator according to the international mobile subscriber identity of the terminal;
the authentication information is information corresponding to a Mobile phone Number of the terminal, and the Mobile phone Number of the terminal is information corresponding to an International Mobile Subscriber Identity (IMSI) of the terminal. The terminal may be a terminal that acquires authentication information from a gateway, and if the execution subject of step S101 is software (client), the authentication information may be information corresponding to an international mobile subscriber identity of the terminal on which the software is operating.
The IMSI is used to distinguish between different users in a cellular network, being unique across all cellular networks. The user of the mobile network uses the IMSI as an identifier when communicating. In a Global System for Mobile communications (GSM) network, a Universal Mobile Telecommunications System (UMTS) network, and a Long Term Evolution (LTE) network, the IMSI is from a Subscriber Identity Module (SIM) card, and in a CDMA2000 network, the IMSI is directly from a Mobile phone or a Removable User Identity Module (RUIM) card. For SIM cards and RUIM cards, the IMSI of the terminal device is often variable, since it can be removed from the terminal.
The corresponding relationship between the IMSI and the mobile phone number may be defined by a gateway of a telecommunications carrier in a Home Location Register (HLR), where the Home Location Register includes a database responsible for user management of the telecommunications carrier, and the gateway of the telecommunications carrier may determine the mobile phone number corresponding to the IMSI by querying the database.
The gateway of the telecom operator is a gateway system which is set by the telecom operator and has a mobile phone number acquisition function. When the user accesses the mobile data network through the terminal, the telecom operator can obtain the mobile phone number of the user through the interface for charging. At present, the interface is opened to the outside as a gateway authentication interface, and a partner is allowed to use the interface to acquire the mobile phone number of a user. Then, the terminal may obtain the IMSI of the terminal itself, and then request the gateway of the telecom operator to obtain the mobile phone number corresponding to the IMSI, so as to obtain the mobile phone number corresponding to the terminal.
It should be noted that, when the mobile phone number is verified, for the sake of security, the target mobile phone number determined according to the IMSI is often not directly returned to the terminal, but the authentication information corresponding to the target mobile phone number is returned to the terminal, and since the IMSI corresponds to the target mobile phone number, the authentication information corresponding to the target mobile phone number is the authentication information corresponding to the IMSI. The authentication information may include encrypted information obtained by encrypting the target mobile phone number, and may also include identification information corresponding to the target mobile phone number, which is not limited in the present application.
After acquiring the authentication information corresponding to the IMSI of the terminal, the gateway of the telecom operator can return the authentication information to the terminal. After receiving the authentication information, the terminal can request the server to verify the mobile phone number to be verified.
Step S102: an authentication request is sent to the server.
The verification request comprises the mobile phone number to be verified and authentication information, and is used for requesting the server to verify the mobile phone number to be verified according to the authentication information.
The mobile phone number to be verified can be a mobile phone number to be verified, which is input by a terminal receiving user, and the user can input the mobile phone number to be verified through a preset input box, or the mobile phone number to be verified can also be a mobile phone number to be verified, which is determined by the terminal according to local information of the terminal, wherein the local information of the terminal can be a local number pre-stored in the terminal, so that the user does not need to manually input the mobile phone number of the terminal, and the convenience is high. That is to say, before sending the authentication request to the server, the terminal may further receive the input mobile phone number to be authenticated, or may further determine the mobile phone number to be authenticated according to the terminal local information.
It should be noted that, when the terminal sends the gateway authentication request to the gateway of the operator, the gateway authentication request may be sent to the gateway through the mobile data network of the terminal, where the mobile data network may be a cellular network provided by a telecommunications operator for network data transmission.
Before sending the gateway authentication request, whether the mobile data network is available or not can be determined, and if the mobile data network is available, the gateway authentication request can be sent through the mobile data network; if the mobile phone number is unavailable, the user can be informed to verify the mobile phone number by other verification modes. The other authentication means mentioned here may be, for example, an authentication means in the form of short message, voice, etc.
In the embodiment of the application, the terminal acquires the authentication information through the gateway of the telecom operator, wherein the authentication information is information corresponding to the target mobile phone number of the terminal, so that after the terminal sends the verification request to the server, the server can send the authentication information to the gateway, the gateway returns the authentication information to the server and the target mobile phone number corresponding to the authentication information, and the server can verify the mobile phone number to be verified in the verification request according to the target mobile phone number. The whole verification process only needs the user to input the mobile phone number to be verified, other operations such as short message checking and verification code inputting are not needed, and compared with the prior art, the method and the device are high in convenience.
After the terminal sends the verification request to the server, the server can determine the target mobile phone number corresponding to the authentication information through the gateway, and then verify the mobile phone number to be verified according to the target mobile phone number.
The following describes in detail a process of performing authentication on a server, and an implementation flow diagram of the process is shown in fig. 3, and includes the following steps:
step S201: receiving a verification request sent by a terminal;
the verification request comprises a mobile phone number to be verified and authentication information, wherein the authentication information is acquired by the terminal through a gateway of a telecom operator.
Step S202: and responding to the verification request, and verifying the mobile phone number to be verified according to the authentication information.
The server can obtain the target mobile phone number corresponding to the authentication information from the gateway of the telecom operator according to the verification request sent by the client. Because the verification request contains the authentication information, the server can send the authentication information to the gateway and then request the gateway to return the mobile phone number corresponding to the authentication information.
As described above, if the target mobile phone number is directly returned to the terminal, the mobile phone number of the terminal may be acquired by an illegal user. In addition, if the target mobile phone number is directly returned to the terminal, it means that the terminal is likely to send the target mobile phone number without any processing and the mobile phone number to be verified to the server for confirmation, and then an illegal user may crack software, directly set the target mobile phone number as the same number as the mobile phone number to be verified, and then send the target mobile phone number to the server for verification, so that the correct verification of the mobile phone number of the terminal cannot be performed.
Based on the above consideration, in the embodiment of the present application, the authentication information may include encrypted information obtained by encrypting the target mobile phone number, and may also include identification information corresponding to the target mobile phone number.
Then, when the authentication information contains the encryption information, the gateway can decrypt the encryption information to obtain the target mobile phone number, and then the target mobile phone number is returned to the server; when the authentication information contains identification information corresponding to the target mobile phone number, the gateway can determine the target mobile phone number corresponding to the identification information in the authentication information according to a pre-established corresponding relationship between the target mobile phone number and the identification information, and then return the target mobile phone number to the server.
And after receiving the target mobile phone number sent by the gateway, the server can verify the mobile phone number to be verified according to the target mobile phone number. Specifically, during verification, the server can judge whether the target mobile phone number is consistent with the mobile phone number to be verified, if so, the verification is successful, and if not, the verification is failed.
If the verification is successful, the server can execute the relevant service logic after the verification is successful, and then the processing result of the service logic is returned to the terminal. For example, when a user is performing an account registration service through a mobile phone number, the user directly prompts that the mobile phone number of the user is successfully verified under the condition that the verification is successful after the user inputs the mobile phone number and clicks a verification button.
And if the verification fails, notifying the terminal that the mobile phone number verification fails. The user can select other mobile phone number verification modes for verification.
It should be noted that the gateway authentication request sent by the terminal to the gateway may include a device identifier (Token) of the terminal, where the device identifier is used to identify identity information of the device and may also be referred to as a Token. After the gateway acquires the authentication information according to the IMSI, the authentication information is associated with the equipment identifier, and then the associated authentication information and the equipment identifier are sent to the terminal corresponding to the equipment identifier.
Similarly, when the terminal sends a verification request to the server, the request also includes the device identifier of the terminal, and the server returns an authentication result to the terminal according to the device identifier. When the server requests the gateway to decrypt the authentication information, the server also sends the equipment identifier associated with the authentication information to the gateway, and the gateway associates the target mobile phone number obtained by decryption with the equipment identifier and returns the equipment identifier to the server, so that the server can verify the target mobile phone number and the mobile phone number to be verified according to the equipment identifier.
In the verification method provided by the embodiment of the application, the terminal acquires the authentication information through the gateway of the telecom operator, and the authentication information is information corresponding to the target mobile phone number of the terminal, so that after the terminal sends the verification request to the server, the server can send the authentication information to the gateway and return the authentication information to the server and the target mobile phone number corresponding to the authentication information through the gateway, and the server can verify the mobile phone number to be verified in the verification request according to the target mobile phone number. The whole verification process only needs the user to input the mobile phone number to be verified, other operations such as short message checking and verification code inputting are not needed, and compared with the prior art, the method and the device are high in convenience.
In addition, the verification method provided by the embodiment of the application does not need complex operation of a user, does not need processes of sending short messages, waiting for receiving the short messages and the like, can depend on the established mobile data network during verification, and can complete the whole verification process within 1 second, so that compared with the prior art, the time consumed is shorter.
In addition, the verification method provided by the embodiment of the application does not need a user to perform complex operation, can avoid various errors in user operation, and avoids the situation of verification failure caused by user errors. And when the weak network (the short message function of the terminal is unavailable, but the mobile data network is available), the verification of the mobile phone number can still be realized, as long as the mobile data network is available, and compared with the prior art, the success rate of the verification is higher.
In addition, the verification method provided by the embodiment of the application does not need to apply for the authority of the mobile device, is irrelevant to the interface provided by the mobile device, and is stable and reliable in verification process compared with the prior art.
Based on the above inventive concept of the present application, in order to better understand the technical features, means, and effects of the present application, the verification method of the present application is further described below with reference to an implementation scenario diagram of the verification method shown in fig. 4. The following process of verifying the mobile phone number is similar to the process of verifying the mobile phone number described above, and other steps not described below may refer to the above description, and are not described herein again.
The implementation flow diagram of the process is shown in fig. 5, and includes the following steps:
step S301: a terminal sends a gateway authentication request to a gateway of a telecom operator, wherein the gateway authentication request comprises an international mobile subscriber identity of the terminal;
step S302: the gateway determines a target mobile phone number corresponding to the international mobile subscriber identity according to the gateway authentication request, determines authentication information corresponding to the target mobile phone number, and sends the authentication information to the terminal;
step S303: the terminal sends a verification request to a server, wherein the verification request comprises a mobile phone number to be verified and the authentication information;
step S304: and the server acquires the target mobile phone number corresponding to the authentication information from the gateway according to the verification request, and verifies the mobile phone number to be verified according to the acquired target mobile phone number.
Based on the above inventive concept of the present application, in order to better understand the technical features, means and effects of the present application, the following steps S301 to S304 are further described. The following process of verifying the mobile phone number is similar to the process of verifying the mobile phone number described above, and other steps not described below may refer to the above description, and are not described herein again.
The implementation flow diagram of the process is shown in fig. 6, and includes the following steps:
step S401: the terminal determines a number to be verified input by a user;
the terminal can receive the number to be verified input by the user through an input box preset by the client.
Step S402: the terminal judges whether the mobile data network is available;
the mobile data network referred to in this application may be available when the mobile data network of the terminal is in an open state. It should be noted that when the mobile data network is in the on state, the current networking mode of the terminal device may be the mobile data network, or may be another network, where the other network may be, for example, a Wireless local area network (Wi-Fi).
Step S403: if the gateway authentication request is available, the terminal sends a gateway authentication request to a gateway of a telecom operator through a mobile data network;
wherein, the gateway authentication request includes the international mobile subscriber identity of the terminal.
Step S404: if the verification is unavailable, the verification method is switched to other verification methods to verify the number to be verified;
step S405: the gateway determines a target mobile phone number corresponding to the international mobile subscriber identity in the gateway authentication request according to the received gateway authentication request;
the gateway may query the HLR to obtain the target mobile phone number corresponding to the international mobile subscriber identity.
Step S406: the gateway determines authentication information corresponding to the target mobile phone number and sends the authentication information to the terminal;
the gateway can encrypt the target mobile phone number to obtain encrypted information, and then the encrypted information is contained in the authentication information.
Step S407: sending the authentication information to the terminal;
step S408: the terminal receives the authentication information and then sends a verification request to the server, wherein the verification request comprises the authentication information and the mobile phone number to be verified;
step S409: the server sends the authentication information in the received verification request to the gateway;
step S410: the gateway decrypts the received authentication information to obtain a target mobile phone number contained in the authentication information;
the gateway decrypts the encrypted information in the authentication information according to the encryption mode of the target mobile phone number to obtain the target mobile phone number; or the authentication information can be decrypted according to the encryption mode of the authentication information to obtain the target mobile phone number.
Step S411: the gateway sends the decrypted target mobile phone number to a server;
step S412: the server judges whether the received target mobile phone number is the same as the mobile phone number to be verified;
step S413: if not, the server notifies the terminal that the authentication fails, and proceeds to step S415;
step S414: if the two are the same, the server executes the relevant service logic after the verification is successful, returns the processing result of the service logic to the terminal, and goes to step S415;
step S415: and the terminal receives the result returned by the server and displays the processing result to inform the user of the mobile phone number verification result.
In the whole verification process of steps S401 to S415, after the user finishes inputting the mobile phone number to be verified when executing step S401, the user only needs to click the verification button to inform the terminal to start verifying the mobile phone number to be verified, and the terminal, the gateway, and the server can verify the mobile phone number to be verified.
Referring to fig. 7, which is a schematic view of an operation flow of a user when verifying a mobile phone number provided by the present application, compared with the prior art, after the user inputs a mobile phone number to be verified, the user only needs to click a verification button, and the terminal can verify the mobile phone number to be verified according to the IMSI of the terminal, and the user does not need to perform other operations, so that the convenience is high.
Based on the same idea, the verification method provided by the embodiment of the present application further provides a corresponding verification device, as shown in fig. 8, where the device specifically includes:
an authentication information obtaining unit 501, configured to obtain, through a gateway of a telecommunications carrier, authentication information according to an international mobile subscriber identity of a terminal, where the authentication information is information corresponding to a target mobile phone number, and the target mobile phone number is a mobile phone number corresponding to the international mobile subscriber identity of the terminal;
a verification request sending unit 502, configured to send a verification request to a server, where the verification request includes a mobile phone number to be verified and the authentication information, and the verification request is used to request the server to verify, according to the authentication information, the mobile phone number to be verified through the gateway.
In an embodiment, the authentication information obtaining unit 501 sends a gateway authentication request to a gateway, where the gateway authentication request includes an international mobile subscriber identity of the terminal; and receiving authentication information which is sent by the gateway and corresponds to the international mobile subscriber identity.
In one embodiment, the authentication information obtaining unit 501 sends a gateway authentication request to the gateway through a mobile data network, which is provided by the mobile operator.
In an embodiment, the apparatus further includes a to-be-verified mobile phone number determining unit 503, which receives an input to-be-verified mobile phone number or determines the to-be-verified mobile phone number according to the terminal local information before the authentication information obtaining unit 501 obtains the authentication information through a gateway of a telecommunications carrier.
Based on the same idea, the verification method provided by the embodiment of the present application further provides a corresponding verification device, as shown in fig. 9, where the device specifically includes:
a verification request receiving unit 601, configured to receive a verification request sent by a terminal, where the verification request includes a mobile phone number to be verified and authentication information, and the authentication information is obtained by the terminal through a gateway of a telecom operator;
and the authentication unit 602, in response to the authentication request, authenticates the mobile phone number to be authenticated through the gateway according to the authentication information.
In an embodiment, the authentication unit 602 acquires, from the gateway, a target mobile phone number corresponding to the authentication information according to the authentication request; and verifying the mobile phone number to be verified according to the target mobile phone number.
In one embodiment, the authentication information includes at least one of:
encrypting information obtained by encrypting a target mobile phone number, wherein the target mobile phone number is a mobile phone number corresponding to the international mobile subscriber identity; and identification information corresponding to the target mobile phone number.
In an embodiment, when the authentication information is encrypted information obtained by encrypting a target mobile phone number, the authentication unit 602 sends the authentication information to the gateway, so that the gateway decrypts the encrypted information in the authentication information to obtain the target mobile phone number; the server receives the target mobile phone number sent by the gateway;
in an embodiment, when the authentication information is identification information corresponding to the target mobile phone number, the authentication unit 602 sends the authentication information to the gateway, so that the gateway determines the target mobile phone number corresponding to the identification in the authentication information; and the server receives the target mobile phone number sent by the gateway.
In an embodiment, the authentication unit 602 determines whether the target mobile phone number is consistent with the mobile phone number to be verified; when the target mobile phone number is consistent with the mobile phone number to be verified, determining that the verification is successful; and when the target mobile phone number is inconsistent with the mobile phone number to be verified, determining that the verification fails.
In an implementation manner, the apparatus further includes a service processing unit 603 and a notification unit 604, where, when the verification is successful, the service processing unit 603 executes the relevant service logic after the verification is successful, and returns a processing result of the service logic to the terminal;
the notifying unit 604 notifies the terminal that the mobile phone number fails to be verified when the verification fails.
The above-mentioned at least one technical scheme that this application embodiment provided can reach following beneficial effect:
the terminal obtains the authentication information through the gateway of the telecom operator, the authentication information is information corresponding to the target mobile phone number of the terminal, therefore, after the terminal sends the verification request to the server, the server can send the authentication information to the gateway, the gateway returns the authentication information to the server and the target mobile phone number corresponding to the authentication information, and the server can verify the mobile phone number to be verified in the verification request according to the target mobile phone number. The whole verification process only needs the user to input the mobile phone number to be verified, other operations such as short message checking and verification code inputting are not needed, and compared with the prior art, the method and the device are high in convenience.
In addition, the verification method provided by the embodiment of the application does not need complex operation of a user, does not need to send short messages and wait for receiving the short messages, and the whole verification process can be completed within 1 second by depending on the established mobile data network during verification, so that the consumed time is shorter compared with the prior art.
In addition, the verification method provided by the embodiment of the application does not need a user to perform complicated operation, can avoid various errors in user operation, and avoids the situation of verification failure caused by user errors. And when the weak network (the short message function of the terminal is unavailable, but the mobile data network is available), the verification of the mobile phone number can still be realized, only the mobile data network is available, and compared with the prior art, the success rate of the verification is higher.
In addition, the verification method provided by the embodiment of the application does not need to apply for the authority of the mobile device, is irrelevant to the interface provided by the mobile device, and is stable and reliable in verification process compared with the prior art.
It should be noted that in the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (13)

1. A method of authentication, comprising:
a terminal sends a gateway authentication request to a gateway of a telecom operator, wherein the gateway authentication request comprises an international mobile subscriber identity of the terminal;
the gateway determines a target mobile phone number corresponding to the international mobile subscriber identity according to the gateway authentication request, determines authentication information corresponding to the target mobile phone number, and sends the authentication information to the terminal;
the terminal sends a verification request to a server, wherein the verification request comprises a mobile phone number to be verified and the authentication information;
and the server acquires the target mobile phone number corresponding to the authentication information from the gateway according to the verification request, and verifies the mobile phone number to be verified according to the acquired target mobile phone number.
2. A method of authentication, comprising:
according to the international mobile subscriber identity of the terminal, acquiring authentication information through a gateway of a telecom operator, wherein the authentication information is information corresponding to a target mobile phone number of the terminal, and the target mobile phone number is a mobile phone number corresponding to the international mobile subscriber identity of the terminal;
and sending a verification request to a server, wherein the verification request comprises a mobile phone number to be verified and the authentication information, and the verification request is used for requesting the server to obtain a target mobile phone number corresponding to the authentication information through the gateway according to the authentication information and verify the mobile phone number to be verified according to the obtained target mobile phone number.
3. The method according to claim 2, wherein the obtaining the authentication information through the gateway of the telecom operator according to the international mobile subscriber identity of the terminal specifically comprises:
sending a gateway authentication request to a gateway, wherein the gateway authentication request comprises an international mobile subscriber identity of the terminal;
and receiving authentication information which is sent by the gateway and corresponds to the international mobile subscriber identity.
4. The method according to claim 3, wherein sending a gateway authentication request to the gateway specifically includes:
sending a gateway authentication request to the gateway over a mobile data network, the mobile data network being provided by the telecommunications carrier.
5. The method of any of claims 2-4, prior to obtaining the authentication information through the gateway of the telecommunications carrier, the method further comprising:
receiving an input mobile phone number to be verified; or the like, or, alternatively,
and determining the number of the mobile phone to be verified according to the local information of the terminal.
6. A method of authentication, comprising:
the method comprises the steps that a server receives a verification request sent by a terminal, wherein the verification request comprises a mobile phone number to be verified and authentication information, the authentication information is information which is acquired by the terminal through a gateway of a telecom operator according to an international mobile subscriber identity of the terminal and corresponds to a target mobile phone number of the terminal, and the target mobile phone number of the terminal is a mobile phone number corresponding to the international mobile subscriber identity of the terminal;
and the server responds to the verification request, acquires a target mobile phone number corresponding to the authentication information through the gateway according to the authentication information, and verifies the mobile phone number to be verified according to the acquired target mobile phone number.
7. The method according to claim 6, wherein the server responds to the verification request, verifies the mobile phone number to be verified through the gateway according to the authentication information, and specifically includes:
the server acquires a target mobile phone number corresponding to the authentication information from the gateway according to the verification request;
and the server verifies the mobile phone number to be verified according to the target mobile phone number.
8. The method of claim 7, wherein the authentication information comprises at least one of:
encrypting the target mobile phone number to obtain encrypted information;
and identification information corresponding to the target mobile phone number.
9. The method of claim 8:
if the authentication information is encrypted information obtained by encrypting a target mobile phone number, acquiring the target mobile phone number corresponding to the authentication information from the gateway, specifically comprising:
the server sends the authentication information to the gateway so that the gateway can decrypt the encrypted information in the authentication information to obtain the target mobile phone number;
the server receives the target mobile phone number sent by the gateway;
if the authentication information is identification information corresponding to the target mobile phone number, acquiring the target mobile phone number corresponding to the authentication information from the gateway, specifically including:
the server sends the authentication information to the gateway so that the gateway can determine a target mobile phone number corresponding to the identification in the authentication information;
and the server receives the target mobile phone number sent by the gateway.
10. The method according to any one of claims 6 to 9, wherein verifying the mobile phone number to be verified according to the target mobile phone number specifically includes:
judging whether the target mobile phone number is consistent with the mobile phone number to be verified;
if the target mobile phone number is consistent with the mobile phone number to be verified, the verification is successful;
and if the target mobile phone number is inconsistent with the mobile phone number to be verified, the verification fails.
11. The method as claimed in claim 10, wherein after the authentication of the phone number to be authenticated is performed according to the target phone number, the method further comprises:
if the verification is successful, executing the relevant service logic after the verification is successful, and returning the processing result of the service logic to the terminal;
and if the verification fails, notifying the terminal that the mobile phone number verification fails.
12. An authentication apparatus comprising:
the authentication information acquisition unit is used for acquiring authentication information through a gateway of a telecom operator according to the international mobile subscriber identity of the terminal, wherein the authentication information is information corresponding to a target mobile phone number, and the target mobile phone number is a mobile phone number corresponding to the international mobile subscriber identity of the terminal;
and the verification request sending unit is used for sending a verification request to a server, wherein the verification request comprises the mobile phone number to be verified and the authentication information, and the verification request is used for requesting the server to acquire a target mobile phone number corresponding to the authentication information through the gateway according to the authentication information and verify the mobile phone number to be verified according to the acquired target mobile phone number.
13. An authentication apparatus comprising:
the terminal comprises a verification request receiving unit and a verification request sending unit, wherein the verification request comprises a mobile phone number to be verified and authentication information, the authentication information is information which is acquired by the terminal through a gateway of a telecom operator according to an international mobile subscriber identity of the terminal and corresponds to a target mobile phone number of the terminal, and the target mobile phone number of the terminal is the mobile phone number corresponding to the international mobile subscriber identity of the terminal;
and the authentication unit is used for responding to the authentication request, acquiring a target mobile phone number corresponding to the authentication information through the gateway according to the authentication information, and authenticating the mobile phone number to be authenticated according to the acquired target mobile phone number.
CN201710409372.3A 2017-06-02 2017-06-02 Verification method and device Active CN108990059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710409372.3A CN108990059B (en) 2017-06-02 2017-06-02 Verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710409372.3A CN108990059B (en) 2017-06-02 2017-06-02 Verification method and device

Publications (2)

Publication Number Publication Date
CN108990059A CN108990059A (en) 2018-12-11
CN108990059B true CN108990059B (en) 2021-06-29

Family

ID=64502320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710409372.3A Active CN108990059B (en) 2017-06-02 2017-06-02 Verification method and device

Country Status (1)

Country Link
CN (1) CN108990059B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587683B (en) * 2019-01-04 2022-04-26 中国联合网络通信集团有限公司 Method and system, application program and terminal information database for SMS anti-monitoring
CN110248356B (en) * 2019-06-06 2022-03-25 北京达佳互联信息技术有限公司 Information acquisition method and device
CN113132317B (en) * 2019-12-31 2023-03-21 中移互联网有限公司 Identity authentication method, system and device
TR202004363A2 (en) * 2020-03-20 2021-09-21 Crenno Bilisim Hizmetleri Ar Ge Sanayi Ve Ticaret Ltd Sirketi The method and system of verifying the mobile phone information of the users who are connected to the Internet with a Mobile Device in the GSM Mobile Network area and a Wired/Wireless gateway outside the GSM Mobile Network
CN111404965B (en) * 2020-04-02 2023-11-10 苏州众信至诚科技有限公司 Method for realizing mobile terminal application safety verification
CN111709007A (en) * 2020-06-10 2020-09-25 中国建设银行股份有限公司 User authentication method, device and equipment
CN112714108B (en) * 2020-12-21 2022-08-12 中国移动通信集团江苏有限公司 Method, device, device and computer storage medium for terminal communication number verification
CN113115310B (en) * 2021-04-08 2024-06-28 武汉极意网络科技有限公司 Non-inductive authentication gateway calling method
CN114051243B (en) * 2021-10-16 2023-09-26 北京达佳互联信息技术有限公司 Verification method, verification device, electronic equipment and storage medium
CN114828011B (en) * 2022-04-26 2024-11-12 中国电信股份有限公司 Access control method, device and system

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902730B (en) * 2010-06-10 2013-04-03 候万春 Multi-number supporting mobile phone terminal and multi-number addressing system and method
CN102143457A (en) * 2010-11-11 2011-08-03 华为软件技术有限公司 Method for logging on by using own telephone number, mobile terminal and communication system
CN102437914B (en) * 2010-12-08 2013-12-04 袁永亮 Method by utilizing telecommunication network to supply user identity label and user identity authentication to Internet service
CN102143482B (en) * 2011-04-13 2013-11-13 中国工商银行股份有限公司 Method and system for authenticating mobile banking client information, and mobile terminal
US20120275444A1 (en) * 2011-04-28 2012-11-01 Salah Shahsavari Push-to-multimedia method and system for sharing multimedia information
CN103701758B (en) * 2012-09-27 2017-07-07 中国电信股份有限公司 Method, system and the authentication gateway of business are used by mobile terminal client terminal
CN103812653B (en) * 2012-11-15 2017-07-07 中国电信股份有限公司 Automatically obtain the method and system of wireless network access account information
CN103198428A (en) * 2013-03-14 2013-07-10 中国农业银行股份有限公司四川省分行 System and method for air depositing and withdrawing of bank
US9877185B2 (en) * 2013-09-13 2018-01-23 Facebook, Inc. Techniques for phone number and data management
CN103812874A (en) * 2014-03-04 2014-05-21 世纪龙信息网络有限责任公司 Method and system for logging in mobile terminal quickly
CN104918245B (en) * 2014-03-11 2018-12-07 中国移动通信集团广东有限公司 A kind of identity identifying method, device, server and client
CN105450416A (en) * 2014-09-01 2016-03-30 阿里巴巴集团控股有限公司 Security authentication method and apparatus
CN105992204A (en) * 2015-02-03 2016-10-05 北京神州泰岳信息安全技术有限公司 Access authentication method of applications of mobile intelligent terminal and device
CN105791262B (en) * 2015-12-30 2019-05-17 广东亿迅科技有限公司 APP real-name authentication safe login system and method based on mobile phone IMSI

Also Published As

Publication number Publication date
CN108990059A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
CN108990059B (en) Verification method and device
CN112771826B (en) Application program registration method, application program registration device and mobile terminal
US10911939B2 (en) Embedded universal integrated circuit card profile management method and apparatus
US12035416B2 (en) ESIM card change method and related device
CN113014568B (en) Account login method, equipment and server
US9270758B2 (en) System for mobile application notary service
EP3337219B1 (en) Carrier configuration processing method, device and system, and computer storage medium
CN103067911B (en) The method and apparatus that control hardware module uses
US9548781B2 (en) Enabling pre-provisioned proprietary carrier-specific feature services and applications for execution on a mobile device
EP4195728A1 (en) Method and terminal device for keeping subscriber identity module card in standby state
CN104967997A (en) A wireless network access method, Wi-Fi equipment, terminal equipment and system
KR20200017175A (en) Electronic device, external electronic device and method for managing embedded subscriber identity module of the external electronic device
CN113439449A (en) Privacy enhancement method for linking ESIM profiles
EP3413600B1 (en) Communication device and method of managing profiles
EP3079329B1 (en) Terminal application registration method, device and system
US10924928B1 (en) System and method for providing authenticated identity of mobile phones
US20180107840A1 (en) Method of restoring a secure element to a factory state
US20140040988A1 (en) Method and System for Data Communication to an Identification Module in a Mobile Radio Terminal
CN107483534B (en) Service processing method and device
HK40001436A (en) Verification method and device
CN112100610B (en) Processing method, device and equipment for login and user login related services
US11533620B2 (en) Method of managing a tamper-proof device comprising a plurality of software containers
EP3343964A1 (en) Network communications for connected devices
HK40001436B (en) Verification method and device
CN118488438A (en) Network connection method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40001436

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant