CN114697117B - Verification method, device, cipher device and system based on positioning information - Google Patents
Verification method, device, cipher device and system based on positioning information Download PDFInfo
- Publication number
- CN114697117B CN114697117B CN202210359883.XA CN202210359883A CN114697117B CN 114697117 B CN114697117 B CN 114697117B CN 202210359883 A CN202210359883 A CN 202210359883A CN 114697117 B CN114697117 B CN 114697117B
- Authority
- CN
- China
- Prior art keywords
- verification data
- verification
- position information
- geographic position
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 429
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000006243 chemical reaction Methods 0.000 claims abstract description 62
- 238000012545 processing Methods 0.000 claims description 28
- 238000004891 communication Methods 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 19
- 238000013524 data verification Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 239000000872 buffer Substances 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 101150035983 str1 gene Proteins 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- VUFOSBDICLTFMS-UHFFFAOYSA-M ethyl-hexadecyl-dimethylazanium;bromide Chemical compound [Br-].CCCCCCCCCCCCCCCC[N+](C)(C)CC VUFOSBDICLTFMS-UHFFFAOYSA-M 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S19/00—Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
- G01S19/01—Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
- G01S19/13—Receivers
- G01S19/14—Receivers specially adapted for specific applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
Abstract
The embodiment of the application provides a verification method, a verification device, a cipher device and a verification system based on positioning information, which can be used in the financial field, and the method comprises the following steps: obtaining first verification data according to the current system time and geographic position information obtained by a local Beidou processor through a preset positioning antenna; performing triple data encryption on the first verification data according to unique physical sequence codes stored in a local dynamic link library in advance to obtain second verification data, and performing hash encryption operation on the second verification data to obtain third verification data; performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data; transmitting the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server; the application can accurately and conveniently verify the transaction.
Description
Technical Field
The application relates to the field of transaction security and also can be used in the field of finance, in particular to a verification method, a verification device, a cipher device and a verification system based on positioning information.
Background
Along with the development of science and technology, the living standard of people is higher and higher, the Internet is ubiquitous, and the form of receipt is diversified. Online transactions and mobile banking transfers are also increasing.
In the prior art, in order to secure transaction, the transaction security is often increased by inserting a u-shield or a digital dynamic cipher device during online transaction or transfer, but the u-shield needs to be installed and driven, the digital dynamic cipher device needs to be input in a specified time, and both have inconvenient problems during use, so how to enable transfer to rapidly and safely complete verification of passwords or dynamic codes and improve transaction convenience is a problem to be solved.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a verification method, a verification device, a cipher device and a verification system based on positioning information, which can accurately and conveniently verify transactions.
In order to solve at least one of the problems, the application provides the following technical scheme:
in a first aspect, the present application provides a verification method based on positioning information, including:
obtaining first verification data according to the current system time and geographic position information obtained by a local Beidou processor through a preset positioning antenna;
Performing triple data encryption on the first verification data according to unique physical sequence codes stored in a local dynamic link library in advance to obtain second verification data, and performing hash encryption operation on the second verification data to obtain third verification data;
performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data;
and sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
Further, the current system time and the geographical position information acquired by the local Beidou processor through a preset positioning antenna obtain first verification data, which comprises the following steps:
and converting the geographic position information acquired by the current system time and the local Beidou processor through a preset positioning antenna into binary codes, and splicing to obtain first verification data.
Further, the triple data encryption is performed on the first verification data according to a unique physical sequence code stored in advance in a local dynamic link library to obtain second verification data, including:
the method comprises the steps of carrying out confusion and half-and-half exchange processing on unique physical sequence codes pre-stored in a local dynamic link library to obtain a first encryption key;
performing triple data encryption of a ciphertext block link mode on the first encryption key according to a second encryption key stored in the local dynamic link library in advance to obtain a third encryption key;
and carrying out triple data encryption on the first verification data according to the third encryption key to obtain second verification data.
Further, the performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data includes:
converting the specific character segment in the third verification data into a corresponding digital field according to a preset alphanumeric conversion rule;
and generating a corresponding target verification two-dimensional code according to the digital segment for display, so that a verification server obtains target verification data in the target verification two-dimensional code.
In a second aspect, the present application provides a verification method based on positioning information, including:
Receiving target verification data sent by a cipher device, an identity identifier of the cipher device and geographic position information, wherein the identity identifier of the cipher device corresponds to a unique physical sequence code pre-stored in a local dynamic link library of the cipher device, the geographic position information is obtained by a local Beidou processor of the cipher device through a preset positioning antenna, the target verification data is obtained by the cipher device according to the current system time and the geographic position information, after the first verification data is obtained by the cipher device according to the current system time and the geographic position information, triple data encryption is carried out on the first verification data according to the unique physical sequence code, second verification data is obtained, hash encryption operation is carried out on the second verification data, third verification data is obtained, and digital conversion is carried out on the third verification data according to a preset character digital conversion rule;
and generating reference verification data according to the identity of the cipher device, the geographic position information and the current system time of the server, and returning a verification passing result when the reference verification data is matched with the target verification data.
Further, after receiving the target verification data sent by the cipher device, the identity identifier of the cipher device and the geographic position information, the method further comprises the following steps:
And if the longitude and latitude coordinates in the geographic position information exceed the electronic fence corresponding to the identity of the cipher, returning a transaction error reporting signal to the cipher.
In a third aspect, the present application provides a positioning information based encryptor comprising: the system comprises a central processing unit, a Beidou processor and a clock module;
the Beidou processor is used for acquiring geographic position information through a preset positioning antenna;
the clock module is used for acquiring the current system time;
the central processing unit is used for:
obtaining first verification data according to the current system time and the geographic position information;
performing triple data encryption on the first verification data according to unique physical sequence codes stored in a local dynamic link library in advance to obtain second verification data, and performing hash encryption operation on the second verification data to obtain third verification data;
performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data;
and sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
In a fourth aspect, the present application provides a verification device based on positioning information, including:
the data receiving module is used for receiving target verification data sent by the cipher device, the identity mark of the cipher device and geographic position information, wherein the identity mark of the cipher device corresponds to a unique physical sequence code stored in a local dynamic link library of the cipher device in advance, the geographic position information is obtained by a local Beidou processor of the cipher device through a preset positioning antenna, the target verification data is obtained by the cipher device according to the current system time and the geographic position information, triple data encryption is carried out on the first verification data according to the unique physical sequence code after the first verification data is obtained by the cipher device, second verification data is obtained, hash encryption operation is carried out on the second verification data, third verification data is obtained, and digital conversion is carried out on the third verification data according to a preset character digital conversion rule;
and the data verification module is used for generating reference verification data according to the identity identifier of the cipher device, the geographic position information and the current system time of the server, and returning a verification passing result when the reference verification data is matched with the target verification data.
In a fifth aspect, the present application provides a positioning information-based authentication system, comprising: a encryptor and an authentication server in communication with the encryptor;
the cipher device comprises: the system comprises a central processing unit, a Beidou processor and a clock module;
the Beidou processor is used for acquiring geographic position information through a preset positioning antenna;
the clock module is used for acquiring the current system time;
the central processing unit is used for:
obtaining first verification data according to the current system time and the geographic position information;
performing triple data encryption on the first verification data according to unique physical sequence codes stored in a local dynamic link library in advance to obtain second verification data, and performing hash encryption operation on the second verification data to obtain third verification data;
performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data;
transmitting the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server;
the authentication server includes:
the data receiving module is used for receiving the target verification data sent by the cipher device, the identity mark of the cipher device and the geographic position information;
And the data verification module is used for generating reference verification data according to the identity identifier of the cipher device, the geographic position information and the current system time of the server, and returning a verification passing result when the reference verification data is matched with the target verification data.
In a sixth aspect, the present application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the location information based authentication method when executing the program.
In a seventh aspect, the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the positioning information based authentication method.
In an eighth aspect, the present application provides a computer program product comprising computer programs/instructions which, when executed by a processor, implement the steps of the location information based authentication method.
According to the technical scheme, the verification method, the device, the cipher device and the system based on the positioning information are provided, the cipher device is used for conducting encryption processing based on the current system time, the geographical position information acquired by the Beidou processor and unique physical sequence codes of the geographical position information, target verification data used for verification are obtained through the cipher device and are sent to the verification server side for transaction verification, inconvenient operations such as specific verification U-shields or digital dynamic ciphers limiting effective time in the prior art are not needed, and therefore the transaction can be accurately and conveniently verified.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a verification method based on positioning information according to an embodiment of the application;
FIG. 2 is a second flow chart of a verification method based on location information according to an embodiment of the application;
FIG. 3 is a third flow chart of a verification method based on location information according to an embodiment of the application;
FIG. 4 is a flowchart of a verification method based on positioning information according to an embodiment of the present application;
FIG. 5 is a block diagram of a positioning information based encryptor in accordance with an embodiment of the present application;
FIG. 6 is a block diagram of a verification device based on location information in an embodiment of the present application;
FIG. 7 is a block diagram of a verification system based on location information in an embodiment of the application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In consideration of the problem of inconvenient operation during transaction verification in the prior art, the application provides a verification method, a device, a cipher device and a system based on positioning information, which are used for carrying out encryption processing based on the current system time, geographic position information acquired by a Beidou processor and unique physical sequence codes of the geographic position information through the cipher device, obtaining target verification data for verification and sending the target verification data to a verification server side for transaction verification, and the inconvenient operation such as specific verification U-shield or digital dynamic cipher limiting effective time in the prior art is not needed, so that the transaction can be accurately and conveniently verified.
In order to accurately and conveniently verify a transaction, the application provides an embodiment of a verification method based on positioning information, wherein an execution subject is a cipher, and referring to fig. 1, the verification method based on positioning information specifically comprises the following contents:
step S101: and obtaining first verification data according to the current system time and geographic position information obtained by the local Beidou processor through a preset positioning antenna.
Alternatively, the method of the present application is performed by a cipher device, which can obtain the current system time through the prior art (such as the existing clock module circuit).
Optionally, the cipher device of the present application may be built with a local Beidou processor and a positioning antenna, where the Beidou processor is in the prior art, and may obtain the Beidou satellite broadcast signal of the current time zone through the positioning antenna, so as to analyze the current geographic location information (such as longitude and latitude information) of the cipher device.
Optionally, the current system time and the geographic position information may reflect timeliness of the cipher device when performing transaction verification, so that the present application combines the current system time and the geographic position information to obtain first verification data for calculating target verification data.
Step S102: and carrying out triple data encryption on the first verification data according to a unique physical sequence code stored in the local dynamic link library in advance to obtain second verification data, and carrying out hash encryption operation on the second verification data to obtain third verification data.
Optionally, the unique physical sequence code of the cipher device can be prestored in the local memory of the cipher device in the form of a so file (dynamic link library), and the unique physical sequence code is also stored in the verification server and can be obtained through the inquiry of the identity of the cipher device.
It can be understood that storing the unique physical sequence code in the form of a so file (dynamic link library) can ensure that the code is not decompiled, which is beneficial to the security of data.
Optionally, the unique physical sequence code of the cipher may reflect the uniqueness of the target verification data, so the present application may perform triple data encryption (3 DES encryption) on the first verification data according to the unique physical sequence code to obtain the second verification data.
Optionally, in order to further confuse the data and enhance the data security, the application may further perform hash encryption operation on the second verification data to obtain third verification data, that is, calculate the digest of the second verification data and use the digest as the third verification data.
Step S103: and performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data.
Optionally, since letters exist in the third verification data, which is not beneficial to subsequent calculation, the application can convert specific character segments in the third verification data into corresponding digital fields according to a preset alphanumeric conversion rule, for example, conversion from a to 1, conversion from b to 2, conversion from c to 3, conversion from d to 4, conversion from e to 5, and conversion from f to 6.
Meanwhile, the application can only intercept a specific character segment in the third verification data for conversion, for example, the first six bits of 1fa73c are converted into 161733, and finally, the 6-bit dynamic number (namely, the final target verification data) is obtained as 161733.
Step S104: and sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
As can be seen from the above description, the verification method based on positioning information provided by the embodiment of the present application can obtain the target verification data for verification by encrypting the current system time, the geographical location information obtained by the beidou processor and the unique physical sequence code thereof through the encryptor, and send the target verification data to the verification server side for transaction verification, without adopting inconvenient operations such as specific verification U-shield or digital dynamic password limiting effective time in the prior art, thereby being capable of accurately and conveniently verifying the transaction.
In order to ensure the authenticity of the target verification data, in an embodiment of the verification method based on positioning information of the present application, the step S101 may further specifically include the following:
and converting the geographic position information acquired by the current system time and the local Beidou processor through a preset positioning antenna into binary codes, and splicing to obtain first verification data.
Optionally, for the current system time, the present application may perform decimal-to-binary code conversion on the current system time in a time-of-year format, for example, obtain the current system time from a clock module circuit: 202109291603, binary encoding (i.e., BCD encoding) is performed to obtain: 323032313039323931363033.
optionally, for geographic location information, such as latitude and longitude: 213.338784 and 33.13376, the application can complement the space to 10 bits (the purpose is to convert the space to BCD code and splice the space to 64 bits, which is convenient for 3DES encryption operation), and then binary coding (namely BCD coding) is carried out to obtain the binary code: 3231332E333338373834 and 33332E31333337362020.
Then, the time BCD code and the geographic position BCD code are spliced to obtain first verification data, for example:
3230323130393239313630333231332E33333837383433332E31333337362020。
It will be appreciated that binary encoding of the current system time and geographic location information is used to facilitate subsequent data encryption operations.
In order to ensure the uniqueness of the target verification data, in an embodiment of the verification method based on positioning information of the present application, referring to fig. 2, the step S102 may further specifically include the following:
step S201: and carrying out confusion and half-exchange processing on unique physical sequence codes stored in advance in a local dynamic link library to obtain a first encryption key.
Step S202: and carrying out triple data encryption of the ciphertext block link mode on the first encryption key according to a second encryption key stored in the local dynamic link library in advance to obtain a third encryption key.
Step S203: and carrying out triple data encryption on the first verification data according to the third encryption key to obtain second verification data.
Alternatively, first, a unique physical sequence code (e.g., 16 bits) pre-stored in the local dynamic link library is obtained, and the sequence number is unique, such as ABCDEF0000000001. Then, the sequence number ABCDEF0000000001 is subjected to aliasing processing, and then str1 (CDAB 00EF 00000100) is generated by the 1 st and 3 rd bits, 2 nd and 4 th bits, 5 th and 7 th bits, 6 th and 8 th bits, 9 th and 11 th bits, 10 th and 12 th bits, 13 th and 15 th bits, 14 th and 16 th bit exchange positions, and then half-exchange processing is performed, and str2 (00000100) and str3 (CDAB 00 EF) are taken as the last 8 bits of str1, respectively, so that str3+str2+str1 is spliced to obtain a first encryption key1 (00000100 CDAB00EFCDAB00EF 00000100).
Then, the third encryption key3 (065319 DA9A450FD22C71DD5A452A8D 0A) is obtained by performing 3DES CBC mode encryption on key1 according to a second encryption key (for example, a so built-in 32-bit key2: ABCD1234567890EFABCD 12345678890 EF) pre-stored in the local dynamic link library.
Finally, the third encryption key3 is used as a key to perform 3DES CBC mode operation on the first verification data to obtain ciphertext of the second verification data:
546C0CC84831A9FF2ACF5987BFF3A0BF95E29BF03EED98C40EA98735E6039846。
in a possible embodiment of the present application, in order to further obfuscate data and enhance data security, the present application may further perform hash encryption operation on the second verification data to obtain third verification data, that is, calculate a digest of the second verification data and use the digest as the third verification data.
Specifically, the hash operation of SHA256 is performed on the second verification data to obtain a digest of the second verification data, i.e. third verification data:
1fa73c1969ae0584297530e7ad6d8195d262a53af0eecd7623a5f23c7e90ad03。
in order to facilitate the transmission of the target verification data, in an embodiment of the verification method based on positioning information of the present application, referring to fig. 3, the step S103 may further specifically include the following:
step S301: and converting the specific character segment in the third verification data into a corresponding digital field according to a preset alphanumeric conversion rule.
Step S302: and generating a corresponding target verification two-dimensional code according to the digital segment for display, so that a verification server obtains target verification data in the target verification two-dimensional code.
Optionally, since letters exist in the third verification data, which is not beneficial to subsequent calculation, the application can convert specific character segments in the third verification data into corresponding digital fields according to a preset alphanumeric conversion rule, for example, conversion from a to 1, conversion from b to 2, conversion from c to 3, conversion from d to 4, conversion from e to 5, and conversion from f to 6.
Meanwhile, the application can only intercept specific character segments in the third verification data for conversion, such as the first six bits, so that the 1fa73c conversion is 161733, and finally, the 6-bit dynamic number (namely, the final target verification data) is 161733.
Optionally, the display can be set to convert the target verification data into the two-dimensional code for display, so that other devices can scan the two-dimensional code and send the target verification data contained in the two-dimensional code to the verification server.
In order to accurately and conveniently verify a transaction, the application provides an embodiment of a verification method based on positioning information, wherein an execution subject is a verification server, and referring to fig. 4, the verification method based on positioning information specifically comprises the following contents:
Step S401: the method comprises the steps of receiving target verification data sent by a cipher device, an identity identifier of the cipher device and geographic position information, wherein the identity identifier of the cipher device corresponds to a unique physical sequence code stored in a local dynamic link library of the cipher device in advance, the geographic position information is obtained by a local Beidou processor of the cipher device through a preset positioning antenna, the target verification data is obtained by the cipher device according to the current system time and the geographic position information, triple data encryption is conducted on the first verification data according to the unique physical sequence code after the first verification data is obtained by the cipher device, second verification data is obtained, hash encryption operation is conducted on the second verification data, third verification data is obtained, and digital conversion is conducted on the third verification data according to a preset character digital conversion rule.
Step S402: and generating reference verification data according to the identity of the cipher device, the geographic position information and the current system time of the server, and returning a verification passing result when the reference verification data is matched with the target verification data.
As can be seen from the above description, the verification method based on positioning information provided by the embodiment of the present application can obtain the target verification data for verification by encrypting the current system time, the geographical location information obtained by the beidou processor and the unique physical sequence code thereof through the encryptor, and send the target verification data to the verification server side for transaction verification, without adopting inconvenient operations such as specific verification U-shield or digital dynamic password limiting effective time in the prior art, thereby being capable of accurately and conveniently verifying the transaction.
In order to flexibly perform verification based on geographic location information, in an embodiment of the verification method based on positioning information of the present application, the following may be further specifically included:
and if the longitude and latitude coordinates in the geographic position information exceed the electronic fence corresponding to the identity of the cipher, returning a transaction error reporting signal to the cipher.
Optionally, the verification server of the present application may set a corresponding electronic fence for each cipher, determine the electronic fence according to the identity identifier sent by the cipher, and determine whether the geographic location sent by the verification server exceeds the electronic fence, if so, return a transaction error reporting signal and refuse to execute the transaction.
In order to accurately and conveniently verify a transaction, the present application provides an embodiment of a cipher device for implementing all or part of the content of the verification method based on location information, referring to fig. 5, the cipher device 10 based on location information specifically includes the following contents:
a central processing unit 12, a Beidou processor 11 and a clock module 13.
The Beidou processor 11 is used for acquiring geographic position information through a preset positioning antenna.
The clock module 13 is configured to obtain a current system time.
The central processing unit 12 is configured to:
and obtaining first verification data according to the current system time and the geographic position information.
And carrying out triple data encryption on the first verification data according to a unique physical sequence code stored in the local dynamic link library in advance to obtain second verification data, and carrying out hash encryption operation on the second verification data to obtain third verification data.
And performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data.
And sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
As can be seen from the above description, the positioning information-based encryptor provided by the embodiment of the present application can obtain the target verification data for verification by encrypting the encryptor based on the current system time, the geographical position information obtained by the beidou processor and the unique physical sequence code thereof, and send the target verification data to the verification server for transaction verification, without inconvenient operations such as specific verification U-shield or digital dynamic password limiting effective time in the prior art, so that the transaction can be accurately and conveniently verified.
In order to accurately and conveniently verify a transaction, the present application provides an embodiment of an apparatus for implementing all or part of the content of the verification method based on location information, for example, a verification server, referring to fig. 6, the verification server 20 based on location information specifically includes the following contents:
the data receiving module 21 is configured to receive target verification data sent by a cipher, an identity identifier of the cipher, and geographic location information, where the identity identifier of the cipher corresponds to a unique physical sequence code stored in advance in a local dynamic link library of the cipher, the geographic location information is obtained by a local beidou processor of the cipher through a preset positioning antenna, the target verification data is obtained by the cipher obtaining first verification data according to a current system time and the geographic location information, then performing triple data encryption on the first verification data according to the unique physical sequence code to obtain second verification data, performing hash encryption operation on the second verification data to obtain third verification data, and performing digital conversion on the third verification data according to a preset character-to-digital conversion rule.
The data verification module 22 is configured to generate reference verification data according to the identity of the cryptographic engine, the geographical location information, and the current system time of the server, and return a verification passing result when the reference verification data matches the target verification data.
As can be seen from the above description, the verification device based on positioning information provided by the embodiment of the present application can obtain the target verification data for verification by encrypting the current system time, the geographical location information obtained by the beidou processor and the unique physical sequence code thereof through the encryptor, and send the target verification data to the verification server side for transaction verification, without adopting inconvenient operations such as specific verification U-shield or digital dynamic password limiting effective time in the prior art, thereby being capable of accurately and conveniently verifying the transaction.
In order to accurately and conveniently verify a transaction, the present application provides an embodiment of a verification system for implementing all or part of the content of the verification method based on location information, referring to fig. 7, the verification system based on location information specifically includes the following contents: a cryptographic device 10 and an authentication server 20 in communication with said cryptographic device 10.
The cipher 10 includes: a central processing unit 12, a Beidou processor 11 and a clock module 13.
The Beidou processor 11 is used for acquiring geographic position information through a preset positioning antenna.
The clock module 13 is configured to obtain a current system time.
The central processing unit 12 is configured to:
and obtaining first verification data according to the current system time and the geographic position information.
And carrying out triple data encryption on the first verification data according to a unique physical sequence code stored in the local dynamic link library in advance to obtain second verification data, and carrying out hash encryption operation on the second verification data to obtain third verification data.
And performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data.
And sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server.
The authentication server 20 includes:
the data receiving module 21 is configured to receive the target verification data sent by the encryptor, the identity of the encryptor, and the geographic location information.
The data verification module 22 is configured to generate reference verification data according to the identity of the cryptographic engine, the geographical location information, and the current system time of the server, and return a verification passing result when the reference verification data matches the target verification data.
As can be seen from the above description, the verification system based on positioning information provided by the embodiment of the present application can obtain the target verification data for verification by encrypting the current system time, the geographical location information obtained by the beidou processor and the unique physical sequence code thereof through the encryptor, and send the target verification data to the verification server side for transaction verification, without adopting inconvenient operations such as specific verification U-shield or digital dynamic password limiting effective time in the prior art, thereby being capable of accurately and conveniently verifying the transaction.
In order to accurately and conveniently verify a transaction from a hardware level, the application provides an embodiment of an electronic device for implementing all or part of contents in the verification method based on positioning information, wherein the electronic device specifically comprises the following contents:
a processor (processor), a memory (memory), a communication interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete communication with each other through the bus; the communication interface is used for realizing information transmission between the positioning information-based cipher device and related equipment such as a core service system, a user terminal, a related database and the like; the logic controller may be a desktop computer, a tablet computer, a mobile terminal, etc., and the embodiment is not limited thereto. In this embodiment, the logic controller may refer to the embodiment of the verification method based on the positioning information and the embodiment of the cipher device based on the positioning information, and the contents thereof are incorporated herein, and the repetition is omitted.
It is understood that the user terminal may include a smart phone, a tablet electronic device, a network set top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), a vehicle-mounted device, a smart wearable device, etc. Wherein, intelligent wearing equipment can include intelligent glasses, intelligent wrist-watch, intelligent bracelet etc..
In practical applications, part of the verification method based on the positioning information may be performed on the electronic device side as described above, or all operations may be performed in the client device. Specifically, the selection may be made according to the processing capability of the client device, and restrictions of the use scenario of the user. The application is not limited in this regard. If all operations are performed in the client device, the client device may further include a processor.
The client device may have a communication module (i.e. a communication unit) and may be connected to a remote server in a communication manner, so as to implement data transmission with the server. The server may include a server on the side of the task scheduling center, and in other implementations may include a server of an intermediate platform, such as a server of a third party server platform having a communication link with the task scheduling center server. The server may include a single computer device, a server cluster formed by a plurality of servers, or a server structure of a distributed device.
Fig. 8 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present application. As shown in fig. 8, the electronic device 9600 may include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this fig. 8 is exemplary; other types of structures may also be used in addition to or in place of the structures to implement telecommunications functions or other functions.
In one embodiment, the location information based authentication method functionality may be integrated into the central processor 9100. The central processor 9100 may be configured to perform the following control:
step S101: and obtaining first verification data according to the current system time and geographic position information obtained by the local Beidou processor through a preset positioning antenna.
Step S102: and carrying out triple data encryption on the first verification data according to a unique physical sequence code stored in the local dynamic link library in advance to obtain second verification data, and carrying out hash encryption operation on the second verification data to obtain third verification data.
Step S103: and performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data.
Step S104: and sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
As can be seen from the above description, the electronic device provided by the embodiment of the present application performs encryption processing based on the current system time, the geographical location information acquired by the beidou processor, and the unique physical sequence code thereof by using the encryptor, obtains the target verification data for verification, and sends the target verification data to the verification server for transaction verification, without inconvenient operations such as specific verification U-shields or digital dynamic passwords defining effective time in the prior art, so that the transaction can be accurately and conveniently verified.
In another embodiment, the positioning information-based encryptor may be configured separately from the central processor 9100, for example, the positioning information-based encryptor may be configured as a chip connected to the central processor 9100, and the positioning information-based authentication method function is implemented by control of the central processor.
As shown in fig. 8, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 need not include all of the components shown in fig. 8; in addition, the electronic device 9600 may further include components not shown in fig. 8, and reference may be made to the related art.
As shown in fig. 8, the central processor 9100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, which central processor 9100 receives inputs and controls the operation of the various components of the electronic device 9600.
The memory 9140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information about failure may be stored, and a program for executing the information may be stored. And the central processor 9100 can execute the program stored in the memory 9140 to realize information storage or processing, and the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. The power supply 9170 is used to provide power to the electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, but not limited to, an LCD display.
The memory 9140 may be a solid state memory such as Read Only Memory (ROM), random Access Memory (RAM), SIM card, etc. But also a memory which holds information even when powered down, can be selectively erased and provided with further data, an example of which is sometimes referred to as EPROM or the like. The memory 9140 may also be some other type of device. The memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 storing application programs and function programs or a flow for executing operations of the electronic device 9600 by the central processor 9100.
The memory 9140 may also include a data store 9143, the data store 9143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, address book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. A communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, as in the case of conventional mobile communication terminals.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, etc., may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and to receive audio input from the microphone 9132 to implement usual telecommunications functions. The audio processor 9130 can include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100 so that sound can be recorded locally through the microphone 9132 and sound stored locally can be played through the speaker 9131.
An embodiment of the present application also provides a computer-readable storage medium capable of implementing all steps in the positioning information-based authentication method in which the execution subject is a server or a client, the computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements all steps in the positioning information-based authentication method in which the execution subject is a server or a client, for example, the processor implements the steps of:
Step S101: and obtaining first verification data according to the current system time and geographic position information obtained by the local Beidou processor through a preset positioning antenna.
Step S102: and carrying out triple data encryption on the first verification data according to a unique physical sequence code stored in the local dynamic link library in advance to obtain second verification data, and carrying out hash encryption operation on the second verification data to obtain third verification data.
Step S103: and performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data.
Step S104: and sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
As can be seen from the above description, the computer readable storage medium provided by the embodiment of the present application performs encryption processing based on the current system time, the geographical location information acquired by the beidou processor and the unique physical sequence code thereof by using the encryptor, obtains the target verification data for verification, and sends the target verification data to the verification server side for transaction verification, without adopting inconvenient operations such as specific verification U-shields or digital dynamic passwords defining effective time in the prior art, so that the transaction can be accurately and conveniently verified.
The embodiment of the present application further provides a computer program product capable of implementing all the steps in the positioning information based authentication method in which the execution subject is a server or a client, where the computer program/instructions implement the steps of the positioning information based authentication method when executed by a processor, for example, the computer program/instructions implement the steps of:
step S101: and obtaining first verification data according to the current system time and geographic position information obtained by the local Beidou processor through a preset positioning antenna.
Step S102: and carrying out triple data encryption on the first verification data according to a unique physical sequence code stored in the local dynamic link library in advance to obtain second verification data, and carrying out hash encryption operation on the second verification data to obtain third verification data.
Step S103: and performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data.
Step S104: and sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
As can be seen from the above description, the computer program product provided by the embodiment of the present application performs encryption processing based on the current system time, the geographical location information acquired by the beidou processor and the unique physical sequence code thereof by using the encryptor, obtains the target verification data for verification, and sends the target verification data to the verification server side for transaction verification, without inconvenient operations such as specific verification U-shields or digital dynamic passwords defining effective time in the prior art, so that the transaction can be accurately and conveniently verified.
It will be apparent to those skilled in the art that embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principles and embodiments of the present invention have been described in detail with reference to specific examples, which are provided to facilitate understanding of the method and core ideas of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.
Claims (11)
1. A positioning information-based authentication method, applied to a encryptor, the method comprising:
obtaining first verification data according to the current system time and geographic position information obtained by a local Beidou processor through a preset positioning antenna;
performing triple data encryption on the first verification data according to unique physical sequence codes stored in a local dynamic link library in advance to obtain second verification data, and performing hash encryption operation on the second verification data to obtain third verification data;
performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data;
and sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
2. The positioning information-based verification method according to claim 1, wherein the current system time and the geographical location information acquired by the local beidou processor through a preset positioning antenna obtain first verification data, and the method comprises the steps of:
And converting the geographic position information acquired by the current system time and the local Beidou processor through a preset positioning antenna into binary codes, and splicing to obtain first verification data.
3. The positioning information-based authentication method according to claim 1, wherein the performing triple data encryption on the first authentication data according to a unique physical sequence code stored in advance in a local dynamic link library to obtain second authentication data comprises:
the method comprises the steps of carrying out confusion and half-and-half exchange processing on unique physical sequence codes pre-stored in a local dynamic link library to obtain a first encryption key;
performing triple data encryption of a ciphertext block link mode on the first encryption key according to a second encryption key stored in the local dynamic link library in advance to obtain a third encryption key;
and carrying out triple data encryption on the first verification data according to the third encryption key to obtain second verification data.
4. The positioning information-based verification method according to claim 1, wherein the digitizing the third verification data according to a preset alphanumeric conversion rule to obtain target verification data includes:
Converting English character segments in the third verification data into corresponding digital fields according to a preset alphanumeric conversion rule;
and generating a corresponding target verification two-dimensional code according to the digital segment for display, so that a verification server obtains target verification data in the target verification two-dimensional code.
5. A positioning information-based authentication method, applied to an authentication server, comprising:
receiving target verification data sent by a cipher device, an identity identifier of the cipher device and geographic position information, wherein the identity identifier of the cipher device corresponds to a unique physical sequence code pre-stored in a local dynamic link library of the cipher device, the geographic position information is obtained by a local Beidou processor of the cipher device through a preset positioning antenna, the target verification data is obtained by the cipher device according to the current system time and the geographic position information, after the first verification data is obtained by the cipher device according to the current system time and the geographic position information, triple data encryption is carried out on the first verification data according to the unique physical sequence code, second verification data is obtained, hash encryption operation is carried out on the second verification data, third verification data is obtained, and digital conversion is carried out on the third verification data according to a preset character digital conversion rule;
And generating reference verification data according to the identity of the cipher device, the geographic position information and the current system time of the server, and returning a verification passing result when the reference verification data is matched with the target verification data.
6. The positioning information-based authentication method according to claim 5, further comprising, after receiving the target authentication data sent by the encryptor, the identification of the encryptor, and the geographical location information:
and if the longitude and latitude coordinates in the geographic position information exceed the electronic fence corresponding to the identity of the cipher, returning a transaction error reporting signal to the cipher.
7. A positioning information-based encryptor, comprising: the system comprises a central processing unit, a Beidou processor and a clock module;
the Beidou processor is used for acquiring geographic position information through a preset positioning antenna;
the clock module is used for acquiring the current system time;
the central processing unit is used for:
obtaining first verification data according to the current system time and the geographic position information;
performing triple data encryption on the first verification data according to unique physical sequence codes stored in a local dynamic link library in advance to obtain second verification data, and performing hash encryption operation on the second verification data to obtain third verification data;
Performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data;
and sending the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server, so that the verification server generates reference verification data according to the identification of the cipher device, the geographic position information and the current system time of the server, and returns a verification passing result when the reference verification data is matched with the target verification data.
8. A positioning information-based authentication apparatus, comprising:
the data receiving module is used for receiving target verification data sent by the cipher device, the identity mark of the cipher device and geographic position information, wherein the identity mark of the cipher device corresponds to a unique physical sequence code stored in a local dynamic link library of the cipher device in advance, the geographic position information is obtained by a local Beidou processor of the cipher device through a preset positioning antenna, the target verification data is obtained by the cipher device according to the current system time and the geographic position information, triple data encryption is carried out on the first verification data according to the unique physical sequence code after the first verification data is obtained by the cipher device, second verification data is obtained, hash encryption operation is carried out on the second verification data, third verification data is obtained, and digital conversion is carried out on the third verification data according to a preset character digital conversion rule;
And the data verification module is used for generating reference verification data according to the identity identifier of the cipher device, the geographic position information and the current system time of the server, and returning a verification passing result when the reference verification data is matched with the target verification data.
9. A positioning information based verification system, comprising: a encryptor and an authentication server in communication with the encryptor;
the cipher device comprises: the system comprises a central processing unit, a Beidou processor and a clock module;
the Beidou processor is used for acquiring geographic position information through a preset positioning antenna;
the clock module is used for acquiring the current system time;
the central processing unit is used for:
obtaining first verification data according to the current system time and the geographic position information;
performing triple data encryption on the first verification data according to unique physical sequence codes stored in a local dynamic link library in advance to obtain second verification data, and performing hash encryption operation on the second verification data to obtain third verification data;
performing digital conversion on the third verification data according to a preset alphanumeric conversion rule to obtain target verification data;
Transmitting the target verification data, the identification of the cipher device and the geographic position information to a corresponding verification server;
the authentication server includes:
the data receiving module is used for receiving the target verification data sent by the cipher device, the identity mark of the cipher device and the geographic position information;
and the data verification module is used for generating reference verification data according to the identity identifier of the cipher device, the geographic position information and the current system time of the server, and returning a verification passing result when the reference verification data is matched with the target verification data.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the positioning information based authentication method according to any of claims 1 to 6 when the program is executed.
11. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, carries out the steps of the positioning information based authentication method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210359883.XA CN114697117B (en) | 2022-04-07 | 2022-04-07 | Verification method, device, cipher device and system based on positioning information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210359883.XA CN114697117B (en) | 2022-04-07 | 2022-04-07 | Verification method, device, cipher device and system based on positioning information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114697117A CN114697117A (en) | 2022-07-01 |
CN114697117B true CN114697117B (en) | 2023-11-24 |
Family
ID=82142742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210359883.XA Active CN114697117B (en) | 2022-04-07 | 2022-04-07 | Verification method, device, cipher device and system based on positioning information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114697117B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115471937B (en) * | 2022-09-23 | 2024-04-19 | 广州浩传网络科技有限公司 | File management device and application method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101399666A (en) * | 2007-09-28 | 2009-04-01 | 中国银联股份有限公司 | Safety control method and system for digital certificate of file |
CN103577996A (en) * | 2012-07-25 | 2014-02-12 | 凤凰纳米技术有限公司 | Online verification method and system |
US10673617B1 (en) * | 2018-04-24 | 2020-06-02 | George Antoniou | Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity |
WO2021208037A1 (en) * | 2020-04-16 | 2021-10-21 | 深圳市欢太科技有限公司 | Authentication method and system and storage medium |
CN114124480A (en) * | 2021-11-08 | 2022-03-01 | 闪捷信息科技有限公司 | Communication authentication method, server, client, electronic device and storage medium |
CN114157451A (en) * | 2021-11-11 | 2022-03-08 | 广东石油化工学院 | Internet of things equipment identity authentication method, device and system and storage medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10594484B2 (en) * | 2015-02-13 | 2020-03-17 | Yoti Holding Limited | Digital identity system |
WO2019032834A1 (en) * | 2017-08-11 | 2019-02-14 | Secure Open Systems, Inc. | Hash-based data verification system |
-
2022
- 2022-04-07 CN CN202210359883.XA patent/CN114697117B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101399666A (en) * | 2007-09-28 | 2009-04-01 | 中国银联股份有限公司 | Safety control method and system for digital certificate of file |
CN103577996A (en) * | 2012-07-25 | 2014-02-12 | 凤凰纳米技术有限公司 | Online verification method and system |
US10673617B1 (en) * | 2018-04-24 | 2020-06-02 | George Antoniou | Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity |
WO2021208037A1 (en) * | 2020-04-16 | 2021-10-21 | 深圳市欢太科技有限公司 | Authentication method and system and storage medium |
CN114124480A (en) * | 2021-11-08 | 2022-03-01 | 闪捷信息科技有限公司 | Communication authentication method, server, client, electronic device and storage medium |
CN114157451A (en) * | 2021-11-11 | 2022-03-08 | 广东石油化工学院 | Internet of things equipment identity authentication method, device and system and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114697117A (en) | 2022-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10333721B2 (en) | Secure information transmitting system and method for personal identity authentication | |
CN104065653B (en) | A kind of interactive auth method, device, system and relevant device | |
CN107181714B (en) | Verification method and device based on service code and generation method and device of service code | |
US20150132984A1 (en) | Mobile otp service providing system | |
CN103155513A (en) | Method and apparatus for accelerated authentication | |
CN111464295B (en) | Bank card making method and device | |
CN105099673A (en) | Authorization method, authorization requesting method and devices | |
JP5973808B2 (en) | Information processing device, terminal device, information processing system, information processing method, and computer program | |
CN108463970A (en) | The method and system of protection and retrieval secret information | |
US8032753B2 (en) | Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same | |
CN101010903B (en) | Method for generating and verifying an electronic signature | |
CN110719590A (en) | One-key login method, device, equipment and storage medium based on mobile phone number | |
CN111931209A (en) | Contract information verification method and device based on zero knowledge certification | |
JP2009193272A (en) | Authentication system and portable terminal | |
CN111555884A (en) | System and method for location-aware two-factor authentication | |
CN113704580A (en) | Information security interaction method and device | |
CN114697117B (en) | Verification method, device, cipher device and system based on positioning information | |
CN111259428B (en) | Block chain-based data processing method and device, node equipment and storage medium | |
CN114549206A (en) | Transaction anti-repudiation method, system, electronic equipment and readable storage medium | |
CN105471920A (en) | Identifying code processing method and device | |
CN111130805B (en) | Secure transmission method, electronic device, and computer-readable storage medium | |
JP6518378B1 (en) | Authentication system, authentication method, and authentication program | |
CN111083681A (en) | Near field communication data encryption method, terminal device and vehicle | |
CN108549808B (en) | Password management method and device | |
CN113645239B (en) | Application login method and device, user terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |