CN105827577A - Method and device for information verification - Google Patents
Method and device for information verification Download PDFInfo
- Publication number
- CN105827577A CN105827577A CN201510009612.1A CN201510009612A CN105827577A CN 105827577 A CN105827577 A CN 105827577A CN 201510009612 A CN201510009612 A CN 201510009612A CN 105827577 A CN105827577 A CN 105827577A
- Authority
- CN
- China
- Prior art keywords
- terminal
- device identification
- iccid
- business information
- phone number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000012795 verification Methods 0.000 title abstract description 8
- 238000004321 preservation Methods 0.000 claims description 3
- 230000008569 process Effects 0.000 abstract description 17
- 238000004590 computer program Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method and a device for information verification. When a service information request is received, a device identity for a terminal corresponding to the service information request and a user identity are acquired; then, according to a pre-stored corresponding relationship between the device identity and the user identity, whether the acquired device identity is corresponding to the user identity is judged, if yes, the service information is sent to the terminal, or otherwise, the service information is not sent to the terminal, wherein the service information particularly comprises a short message verification code, the device identity particularly comprises an ICCID (Integrated Circuit Card Identity), and the user identity particularly comprises a mobile phone number. Through the above mode, before the server sends the short message verification code to the terminal, the ICCID of the SIM card used by the terminal is verified, and thus, the short message verification code can be ensured to be sent to the correct SIM card rather than to other SIM cards, and the service process safety is improved.
Description
Technical field
The application relates to field of computer technology, particularly relates to a kind of Information Authentication method and device.
Background technology
Along with developing rapidly of Internet technology, increasing business can be carried out on network, such as, and financial business, electronic commerce affair etc..
At present, in order to improve the safety of business procedure, server, when user's register account number, may require that the phone number binding this user for this account, verifies the identity of this user in business procedure afterwards.
Concrete, when user carries out service interaction by registered account and server, server can send specific business information to the phone number of this user bound, and such as, this specific business information can be note check code etc..Accordingly, this user can receive this note check code by the mobile phone of oneself, and on website, input this note check code, server is only after the note check code inputting this user is verified, just determine that the mutual person on opposite is the user registering this account, and then can allow to proceed follow-up business procedure.And for palming off the assailant of this user, then it is difficult to get this note check code, therefore, also cannot be carried out follow-up business procedure.
But, in the prior art, assailant may utilize the certificate that user loses, or directly steal the certificate of user, a new client identification module (SubscriberIdentityModule is handled at the common carrier belonging to the phone number of this user, SIM) card, and by the phone number binding of this new SIM with this user, thus occupy the phone number of this user, in this case, when server sends note check code to the phone number of this user, then can be sent on the mobile phone using this new SIM of assailant, and this user does not receives this note check code on the contrary, reduce the safety of business procedure.
Summary of the invention
The embodiment of the present application provides a kind of Information Authentication method and device, the problem relatively low in order to solve to send in prior art the mode safety of business information.
A kind of Information Authentication method that the embodiment of the present application provides, including:
When receiving business information request, gather device identification and the ID of terminal corresponding to described business information request;
Corresponding relation according to the device identification pre-saved Yu ID, it is judged that the device identification collected is the most corresponding with ID;
The most then send business information to described terminal;
Otherwise, business information is not sent to described terminal.
A kind of Information Authentication device that the embodiment of the present application provides, including:
Acquisition module, for when receiving business information request, gathers device identification and the ID of terminal corresponding to described business information request;
Authentication module, for the corresponding relation according to the device identification pre-saved with ID, it is judged that the device identification that described acquisition module collects is the most corresponding with ID, if, then send business information to described terminal, otherwise, do not send business information to described terminal.
The embodiment of the present application provides a kind of Information Authentication method and device, the method server is when receiving business information request, gather device identification and the ID of terminal corresponding to this business information request, then, corresponding relation according to the device identification pre-saved Yu ID, judge that the device identification collected is the most corresponding with ID, if, then send business information to this terminal, otherwise, business information is not sent to this terminal, wherein, described business information specifically includes note check code, described device identification specifically includes integrated circuit card identification code (IntegrateCircuitCardIdentity, ICCID), described ID specifically includes phone number.By said method, owing to server is before sending note check code to terminal, the ICCID of the SIM that terminal uses is verified, therefore, can ensure that and note check code is sent to correct SIM, without sending to other SIMs, improve the safety of business procedure.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, and the schematic description and description of the application is used for explaining the application, is not intended that the improper restriction to the application.In the accompanying drawings:
The information verification process that Fig. 1 provides for the embodiment of the present application;
Fig. 2 is under actual application scenarios, the Information Authentication method provided according to the embodiment of the present application, and financial institution server gathers the process of ICCID;
The Information Authentication apparatus structure schematic diagram that Fig. 3 provides for the embodiment of the present application.
Detailed description of the invention
For making the purpose of the application, technical scheme and advantage clearer, below in conjunction with the application specific embodiment and corresponding accompanying drawing, technical scheme is clearly and completely described.Obviously, described embodiment is only some embodiments of the present application rather than whole embodiments.Based on the embodiment in the application, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into the scope of the application protection.
The information verification process that Fig. 1 provides for the embodiment of the present application, specifically includes following steps:
S101: server, when receiving business information request, gathers device identification and the ID of terminal corresponding to described business information request.
In the embodiment of the present application, described server can be that every profession and trade is for processing the server of the background server of business, such as financial institution, the server etc. of electricity business.Described business information can be the information such as note check code, correspondingly, described terminal can be the communication terminal that mobile phone, panel computer etc. can use SIM, described device identification can be the ICCID of the SIM that terminal uses, described ID can be the Mobile Directory Number (MobileDirectoryNumber of terminal, MDN), that is, phone number.
For the business carried out on network, general, user is firstly the need of register account number on corresponding website and arranges password, and uses the account Website login of registration, and then, the background server of website and this user carry out business procedure.In order to improve the safety of business procedure, the most a lot of websites are when user's register account number, it can also require that the account for registering binds the phone number of this user, verify the identity of this user in business procedure afterwards.As a example by financial business, modal a kind of application scenarios is: during user's login account, or carry out transferring accounts etc. operation time, website may require that user inputs short message verification code, provide the user with a button simultaneously, user clicks on can be asked to server transmission business information (namely, note check code is asked), after server receives the note check code request that this user sends, then can send note check code to the terminal that the phone number that the account of this user is bound is corresponding, and then, after this user successfully obtains and inputs note check code on website, the note check code that this user can be inputted by server is verified, only when being verified, server just allows to carry out follow-up business procedure.Ask it should be noted that user both can send business information by terminal, it is also possible to send business information by other equipment and ask.
In the embodiment of the present application, server, after receiving the request of note check code, after the ICCID of terminal that can be corresponding to the request of note check code verifies, then determines whether to send business information, such that it is able to improve the safety of business procedure.Concrete, first server can gather device identification and the ID of terminal corresponding to this business information request, wherein, the request of this business information is transmission after user's login account, and the ID of the terminal that the request of this business information is corresponding is: the ID (phone number) bound with the account of user;Accordingly, the device identification of the terminal that the request of this business information is corresponding is: the ICCID of the current SIM bound with this phone number at common carrier;Then, server can perform step S102.
It should be noted that general, user is in register account number and after binding phone number, and server can preserve this phone number, and the corresponding relation of this phone number and this account.Therefore, server is when receiving business information request, it may be determined that send the account of this business information request, and then, in the phone number preserved, determine, by inquiring about this corresponding relation, the phone number bound with this account, so far, collected the phone number that business information request is corresponding.And for the ICCID of this business information request correspondence, then need the terminal to this phone number is corresponding to be acquired.
S102: according to the corresponding relation of the device identification pre-saved Yu ID, it is judged that the device identification collected is the most corresponding with ID, the most then perform step S103, otherwise, perform step S104.
In the embodiment of the present application, server can be in advance when each account be registered and binds phone number, and the ICCID of the terminal corresponding to this phone number once gathers, and preserves this ICCID, and the corresponding relation of this ICCID and this phone number, as the foundation verifying ICCID later.Thus, later when user logs in the account and carries out service interaction with server, the identity of user in time can be verified by checking ICCID by server according to default strategy.
Concrete, for above-mentioned steps S102, after collection of server ICCID and phone number, can be according to the corresponding relation of the ICCID pre-saved Yu phone number, judge that the ICCID collected is the most corresponding with phone number, if, the most provable phone number that user is bound when register account number, the phone number of this binding is identical with the phone number of the terminal that current mutual person uses, and the SIM of terminal corresponding to the phone number of this binding is identical with the SIM of the terminal that current mutual person uses, then server can determine that current mutual person is user, and note check code can be sent to the terminal that current mutual person uses, otherwise, server can determine that current dealer is not for user, the terminal not used to current dealer sends note check code.
S103: send business information to described terminal.
S104: do not send business information to described terminal.
Pass through said method, even if assailant handles a new SIM at the common carrier belonging to the phone number of user, and by the phone number binding of this new SIM with this user, take the phone number of this user, owing to server is before sending note check code, ICCID can be verified, and the ICCID of the ICCID of this new SIM SIM corresponding with the phone number that user's register account number is bound differs, therefore, server will not send note check code to the terminal of assailant, improves the safety of business procedure.
In the embodiment of the present application, for above-mentioned steps S102, pre-save the corresponding relation of device identification and ID, specifically include: in advance for the terminal that the phone number of each binding is corresponding, gather the ICCID of the SIM that this terminal uses, and preserve this ICCID, and the corresponding relation of this ICCID and this phone number.
Concrete, server can be by the special interface between the common carrier belonging to terminal, ICCID is gathered to this terminal, described special interface can be HTML (Hypertext Markup Language) (Hypertexttransferprotocol, http) interface or Internet service (webservice) interface.Fig. 2 shows under the scene that described server is financial institution server, and financial institution server gathers the process of ICCID, specifically includes following steps:
S201: financial institution server is certain user's register account number, and the account for registering binds the phone number of this user.
S202: financial institution server sends ICCID to communication company server and obtains request, and wherein, described ICCID obtains the phone number of this user carrying binding in request.
Wherein, described common carrier is: the common carrier belonging to terminal that this phone number is corresponding.
S203: communication company server obtains request according to the ICCID received, and the terminal corresponding to this phone number sends over the air (OverTheAir, OTA) note, to obtain the ICCID of the SIM that this terminal uses.
After S204: terminal receives OTA note, return the ICCID of the SIM self used to communication company server.
S205: communication company server sends, to financial institution server, the ICCID that terminal returns.
Additionally, owing to user is likely to actively change the SIM that the terminal of oneself uses, therefore, server can also provide the user with corresponding interface, make the user can be at login account, and through the authentication of some other mode of server (such as real-name authentication, the identification authentication mode such as mailbox certification) after, again by this corresponding interface to server request Resurvey ICCID, then can trigger the ICCID of the currently used SIM of server Resurvey user, and preserve the ICCID that Resurvey arrives, and the corresponding relation of ICCID arrived with Resurvey for the phone number of user's binding, thus, not only ensure that the safety of business procedure, also improve the ease for use of the Information Authentication method that the embodiment of the present application provides.
In the embodiment of the present application, for above-mentioned steps S102, at the corresponding relation according to the ICCID pre-saved with phone number, before judging that the ICCID that collects is the most corresponding with phone number, also can determine whether whether each ICCID preserved exists the device identification collected, if, the most yet further judge that the ICCID collected is the most corresponding with phone number, otherwise, obviously the ICCID collected cannot be by checking, therefore, it can directly determine and do not send business information to the terminal that this phone number is corresponding.Like this, the execution efficiency of the Information Authentication method that the embodiment of the present application provides can be improved.
Further, in actual applications, the Information Authentication method provided based on the embodiment of the present application, server in business procedure except checking ICCID, it is also possible to verify other the customizing messages relevant to terminal, such as, the mobile device international identity code (InternationalMobileEquipmentIdentity of terminal, IMEI) etc., wherein, each IMEI can uniquely identify a mobile terminal.In this case, described device identification is IMEI, then server is when receiving business information request, IMEI and the phone number of terminal corresponding to this business information request can be gathered, then, corresponding relation according to the IMEI pre-saved Yu phone number, judge that the IMEI collected is the most corresponding with phone number, if, then can determine that user is the terminal used during login account binding phone number, the terminal used with current mutual person is same terminal, and then, it is believed that current mutual person is user, and business information can be sent to this terminal, otherwise, it is believed that current mutual person is not user, it is likely assailant, therefore, business information can not be sent to this terminal.
The Information Authentication method provided for the embodiment of the present application above, based on same thinking, the embodiment of the present application also provides for corresponding Information Authentication device, as shown in Figure 3.
The Information Authentication apparatus structure schematic diagram that Fig. 3 provides for the embodiment of the present application, specifically includes:
Acquisition module 301, for when receiving business information request, gathers device identification and the ID of terminal corresponding to described business information request;
Authentication module 302, for the corresponding relation according to the device identification pre-saved with ID, it is judged that the device identification that described acquisition module 301 collects is the most corresponding with ID, if, then send business information to described terminal, otherwise, do not send business information to described terminal.
Described authentication module 302 specifically for, in advance for the ID of each terminal of registration, gather the device identification of this terminal, and preserve this device identification, and the corresponding relation of this device identification and this ID.
Described device also includes:
Determine module 303, at described authentication module according to the corresponding relation of the device identification pre-saved Yu ID, it is judged that before the device identification that collects is the most corresponding with ID, determines in each device identification of preservation and there is the device identification collected.
Described business information specifically includes note check code, and described device identification specifically includes integrated circuit card identification code ICCID, and described ID specifically includes phone number.
Described authentication module 302 specifically for, send ICCID to the common carrier belonging to this terminal and gather request, make described common carrier by sending over the air OTA note to this terminal, gather the ICCID of this terminal, receive the ICCID of this terminal that described common carrier returns, that collect.
Concrete above-mentioned device as shown in Figure 3 may be located on server.
The embodiment of the present application provides a kind of Information Authentication method and device, the method server is when receiving business information request, gather device identification and the ID of terminal corresponding to this business information request, then, corresponding relation according to the device identification pre-saved Yu ID, judge that the device identification collected is the most corresponding with ID, if, then send business information to this terminal, otherwise, business information is not sent to this terminal, wherein, described business information specifically includes note check code, described device identification specifically includes ICCID, described ID specifically includes phone number.By said method, owing to server is before sending note check code to terminal, the ICCID of the SIM that terminal uses is verified, therefore, can ensure that and note check code is sent to correct SIM, without sending to other SIMs, improve the safety of business procedure.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or computer program.Therefore, the form of the embodiment in terms of the present invention can use complete hardware embodiment, complete software implementation or combine software and hardware.And, the present invention can use the form at one or more upper computer programs implemented of computer-usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) wherein including computer usable program code.
The present invention is to describe with reference to method, equipment (system) and the flow chart of computer program according to embodiments of the present invention and/or block diagram.It should be understood that can be by the flow process in each flow process in computer program instructions flowchart and/or block diagram and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer program instructions can be provided to produce a machine to the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device so that the instruction performed by the processor of computer or other programmable data processing device is produced for realizing the device of function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and can guide in the computer-readable memory that computer or other programmable data processing device work in a specific way, the instruction making to be stored in this computer-readable memory produces the manufacture including command device, and this command device realizes the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make to perform sequence of operations step on computer or other programmable devices to produce computer implemented process, thus the instruction performed on computer or other programmable devices provides the step of the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame for realization.
In a typical configuration, calculating equipment includes one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory potentially includes the forms such as the volatile memory in computer-readable medium, random access memory (RAM) and/or Nonvolatile memory, such as read only memory (ROM) or flash memory (flashRAM).Internal memory is the example of computer-readable medium.
Computer-readable medium includes that removable media permanent and non-permanent, removable and non-can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computer includes, but it is not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus or any other non-transmission medium, can be used for the information that storage can be accessed by a computing device.According to defining herein, computer-readable medium does not include temporary computer readable media (transitorymedia), such as data signal and the carrier wave of modulation.
It can further be stated that, term " includes ", " comprising " or its any other variant are intended to comprising of nonexcludability, so that include that the process of a series of key element, method, commodity or equipment not only include those key elements, but also include other key elements being not expressly set out, or also include the key element intrinsic for this process, method, commodity or equipment.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that there is also other identical element in including the process of described key element, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program.Therefore, the form of the embodiment in terms of the application can use complete hardware embodiment, complete software implementation or combine software and hardware.And, the application can use the form at one or more upper computer programs implemented of computer-usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) wherein including computer usable program code.
The foregoing is only embodiments herein, be not limited to the application.To those skilled in the art, the application can have various modifications and variations.All any modification, equivalent substitution and improvement etc. made within spirit herein and principle, within the scope of should be included in claims hereof.
Claims (10)
1. an Information Authentication method, it is characterised in that including:
When receiving business information request, gather device identification and the ID of terminal corresponding to described business information request;
Corresponding relation according to the device identification pre-saved Yu ID, it is judged that the device identification collected is the most corresponding with ID;
The most then send business information to described terminal;
Otherwise, business information is not sent to described terminal.
2. the method for claim 1, it is characterised in that pre-save the corresponding relation of device identification and ID, specifically include:
In advance for the ID of each terminal of registration, gather the device identification of this terminal, and preserve this device identification, and the corresponding relation of this device identification and this ID.
3. method as claimed in claim 2, it is characterised in that according to the corresponding relation of the device identification pre-saved Yu ID, it is judged that before the device identification that collects is the most corresponding with ID, described method also includes:
Determine in each device identification of preservation and there is the device identification collected.
4. the method as described in claims 1 to 3 is arbitrary, it is characterised in that described business information specifically includes note check code, described device identification specifically includes integrated circuit card identification code ICCID, and described ID specifically includes phone number.
5. method as claimed in claim 4, it is characterised in that gather the device identification of this terminal, specifically include:
Send ICCID to the common carrier belonging to this terminal and gather request so that described common carrier, by sending over the air OTA note to this terminal, gathers the ICCID of this terminal;
Receive the ICCID of this terminal that described common carrier returns, that collect.
6. an Information Authentication device, it is characterised in that including:
Acquisition module, for when receiving business information request, gathers device identification and the ID of terminal corresponding to described business information request;
Authentication module, for the corresponding relation according to the device identification pre-saved with ID, it is judged that the device identification that described acquisition module collects is the most corresponding with ID, if, then send business information to described terminal, otherwise, do not send business information to described terminal.
7. device as claimed in claim 6, it is characterised in that described authentication module specifically for, in advance for the ID of each terminal registered, gather the device identification of this terminal, and preserve this device identification, and the corresponding relation of this device identification and this ID.
8. device as claimed in claim 7, it is characterised in that described device also includes:
Determine module, at described authentication module according to the corresponding relation of the device identification pre-saved Yu ID, it is judged that before the device identification that collects is the most corresponding with ID, determines in each device identification of preservation and there is the device identification collected.
9. the device as described in as arbitrary in claim 6~8, it is characterised in that described business information specifically includes note check code, and described device identification specifically includes integrated circuit card identification code ICCID, and described ID specifically includes phone number.
10. device as claimed in claim 9, it is characterized in that, described authentication module specifically for, send ICCID to the common carrier belonging to this terminal and gather request, make described common carrier by sending over the air OTA note to this terminal, gather the ICCID of this terminal, receive the ICCID of this terminal that described common carrier returns, that collect.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510009612.1A CN105827577A (en) | 2015-01-08 | 2015-01-08 | Method and device for information verification |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510009612.1A CN105827577A (en) | 2015-01-08 | 2015-01-08 | Method and device for information verification |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN105827577A true CN105827577A (en) | 2016-08-03 |
Family
ID=56514159
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510009612.1A Pending CN105827577A (en) | 2015-01-08 | 2015-01-08 | Method and device for information verification |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN105827577A (en) |
Cited By (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3324662A1 (en) * | 2016-11-21 | 2018-05-23 | Beijing Xiaomi Mobile Software Co., Ltd. | Identity verification method, apparatus and system, computer program and recording medium |
| CN108134770A (en) * | 2017-10-19 | 2018-06-08 | 黄策 | Verify the application layer theft preventing method of short message |
| CN108933765A (en) * | 2017-05-26 | 2018-12-04 | 武汉斗鱼网络科技有限公司 | It is a kind of to improve the method for device id safety, client and server |
| CN109543462A (en) * | 2018-11-15 | 2019-03-29 | 深圳乐信软件技术有限公司 | Device identification determines method, apparatus, server and storage medium |
| CN109699015A (en) * | 2017-10-23 | 2019-04-30 | 中国电信股份有限公司 | Binding machine and card relationship authentication method, device and communication system |
| CN109754505A (en) * | 2018-12-19 | 2019-05-14 | 广州羊城通有限公司 | A kind of method for unlocking and device based on IC card |
| CN110266642A (en) * | 2019-05-15 | 2019-09-20 | 网宿科技股份有限公司 | Identity authentication method, server and electronic device |
| CN110958598A (en) * | 2018-09-26 | 2020-04-03 | 中国移动通信有限公司研究院 | Binding authentication method and device for mobile terminal and SIM card |
| CN111488253A (en) * | 2019-01-25 | 2020-08-04 | 沃尔缇夫能源系统公司 | Configuration method, device and system of monitoring equipment and intelligent terminal |
| CN111866846A (en) * | 2019-04-26 | 2020-10-30 | 华为技术有限公司 | Data identification method and related device |
| CN114222288A (en) * | 2021-11-30 | 2022-03-22 | 中国建设银行股份有限公司 | Equipment identifier generation method, equipment identifier verification method and device |
| CN114745172A (en) * | 2022-04-08 | 2022-07-12 | 中国银行股份有限公司 | APP login information processing method and device |
| CN114969212A (en) * | 2021-02-19 | 2022-08-30 | 华为技术有限公司 | Data verification method and device |
| CN114973471A (en) * | 2021-05-12 | 2022-08-30 | 中移互联网有限公司 | Access control authentication method and device, electronic equipment and storage medium |
| CN116781298A (en) * | 2022-03-10 | 2023-09-19 | 中国移动通信集团江西有限公司 | Identity verification method, server and storage medium |
| CN117376903A (en) * | 2023-09-28 | 2024-01-09 | 中移互联网有限公司 | Information processing methods, devices, systems and electronic equipment |
| CN118827132A (en) * | 2024-04-19 | 2024-10-22 | 中移物联网有限公司 | Internet of Things device management method, device, equipment, medium and program product |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120300927A1 (en) * | 2011-05-25 | 2012-11-29 | Yeon Gil Choi | Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone |
| US20130005300A1 (en) * | 2011-06-30 | 2013-01-03 | Hon Hai Precision Industry Co., Ltd. | Device and method for recharging sim card |
| CN103428699A (en) * | 2013-07-16 | 2013-12-04 | 李锦风 | Registration binding and identity authentication method based on mobile phone hardware feature information |
| CN103781064A (en) * | 2014-01-02 | 2014-05-07 | 张鹏 | Short message verification system and verification method |
| CN104079562A (en) * | 2014-06-09 | 2014-10-01 | 中国建设银行股份有限公司 | Safety authentication method based on payment terminal and related device |
-
2015
- 2015-01-08 CN CN201510009612.1A patent/CN105827577A/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120300927A1 (en) * | 2011-05-25 | 2012-11-29 | Yeon Gil Choi | Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone |
| US20130005300A1 (en) * | 2011-06-30 | 2013-01-03 | Hon Hai Precision Industry Co., Ltd. | Device and method for recharging sim card |
| CN103428699A (en) * | 2013-07-16 | 2013-12-04 | 李锦风 | Registration binding and identity authentication method based on mobile phone hardware feature information |
| CN103781064A (en) * | 2014-01-02 | 2014-05-07 | 张鹏 | Short message verification system and verification method |
| CN104079562A (en) * | 2014-06-09 | 2014-10-01 | 中国建设银行股份有限公司 | Safety authentication method based on payment terminal and related device |
Cited By (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106454800B (en) * | 2016-11-21 | 2018-07-27 | 北京小米移动软件有限公司 | Auth method, apparatus and system |
| EP3324662A1 (en) * | 2016-11-21 | 2018-05-23 | Beijing Xiaomi Mobile Software Co., Ltd. | Identity verification method, apparatus and system, computer program and recording medium |
| US10313870B2 (en) | 2016-11-21 | 2019-06-04 | Beijing Xiaomi Mobile Software Co., Ltd. | Identity verification method and apparatus, and storage medium |
| CN108933765A (en) * | 2017-05-26 | 2018-12-04 | 武汉斗鱼网络科技有限公司 | It is a kind of to improve the method for device id safety, client and server |
| CN108134770A (en) * | 2017-10-19 | 2018-06-08 | 黄策 | Verify the application layer theft preventing method of short message |
| CN109699015A (en) * | 2017-10-23 | 2019-04-30 | 中国电信股份有限公司 | Binding machine and card relationship authentication method, device and communication system |
| CN109699015B (en) * | 2017-10-23 | 2022-04-19 | 中国电信股份有限公司 | Machine-card binding relationship authentication method and device and communication system |
| CN110958598B (en) * | 2018-09-26 | 2022-05-06 | 中国移动通信有限公司研究院 | A binding authentication method and device for a mobile terminal and a SIM card |
| CN110958598A (en) * | 2018-09-26 | 2020-04-03 | 中国移动通信有限公司研究院 | Binding authentication method and device for mobile terminal and SIM card |
| CN109543462B (en) * | 2018-11-15 | 2020-12-04 | 深圳乐信软件技术有限公司 | Device identification determination method, device, server and storage medium |
| CN109543462A (en) * | 2018-11-15 | 2019-03-29 | 深圳乐信软件技术有限公司 | Device identification determines method, apparatus, server and storage medium |
| CN109754505A (en) * | 2018-12-19 | 2019-05-14 | 广州羊城通有限公司 | A kind of method for unlocking and device based on IC card |
| CN109754505B (en) * | 2018-12-19 | 2022-07-12 | 广州羊城通有限公司 | Unlocking method and device based on IC card |
| CN111488253A (en) * | 2019-01-25 | 2020-08-04 | 沃尔缇夫能源系统公司 | Configuration method, device and system of monitoring equipment and intelligent terminal |
| CN111866846A (en) * | 2019-04-26 | 2020-10-30 | 华为技术有限公司 | Data identification method and related device |
| CN110266642A (en) * | 2019-05-15 | 2019-09-20 | 网宿科技股份有限公司 | Identity authentication method, server and electronic device |
| CN114969212A (en) * | 2021-02-19 | 2022-08-30 | 华为技术有限公司 | Data verification method and device |
| CN114973471A (en) * | 2021-05-12 | 2022-08-30 | 中移互联网有限公司 | Access control authentication method and device, electronic equipment and storage medium |
| CN114222288A (en) * | 2021-11-30 | 2022-03-22 | 中国建设银行股份有限公司 | Equipment identifier generation method, equipment identifier verification method and device |
| CN114222288B (en) * | 2021-11-30 | 2024-04-30 | 中国建设银行股份有限公司 | Equipment identifier generation method, equipment identifier verification method and device |
| CN116781298A (en) * | 2022-03-10 | 2023-09-19 | 中国移动通信集团江西有限公司 | Identity verification method, server and storage medium |
| CN114745172A (en) * | 2022-04-08 | 2022-07-12 | 中国银行股份有限公司 | APP login information processing method and device |
| CN117376903A (en) * | 2023-09-28 | 2024-01-09 | 中移互联网有限公司 | Information processing methods, devices, systems and electronic equipment |
| CN118827132A (en) * | 2024-04-19 | 2024-10-22 | 中移物联网有限公司 | Internet of Things device management method, device, equipment, medium and program product |
| CN118827132B (en) * | 2024-04-19 | 2025-11-18 | 中移物联网有限公司 | IoT device management methods, devices, equipment, media and software products |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN105827577A (en) | Method and device for information verification | |
| US12141265B2 (en) | Method and apparatus for facilitating the login of an account | |
| CN104580074B (en) | The login method of client application and its corresponding server | |
| CN103856446B (en) | A kind of login method, device and open platform system | |
| CN105554037B (en) | Authentication processing method and service platform | |
| EP3337219B1 (en) | Carrier configuration processing method, device and system, and computer storage medium | |
| CN105306490B (en) | Payment verifying system, method and device | |
| CN107682336B (en) | Geographic position-based identity authentication method and device | |
| WO2017079795A1 (en) | A distributed user profile identity verification system for e-commerce transaction security | |
| US9397999B2 (en) | Methods, devices, and computer readable storage devices for sharing sensitive content securely | |
| CN111262865B (en) | Method, device and system for making access control strategy | |
| CN105871864B (en) | Mobile terminal identity authentication method and device | |
| CN107623907B (en) | eSIM card network locking method, terminal and network locking authentication server | |
| CN104468637A (en) | Method and equipment for downloading and installing client | |
| US20140019957A1 (en) | Method, apparatus, and system for sharing software among terminals | |
| CN108076056A (en) | Cloud server login method and device | |
| CN106713242B (en) | Data request processing method and processing device | |
| CN111885043B (en) | Internet account login method, system, device and storage medium | |
| US20200110868A1 (en) | Augmented push authentication | |
| CN104869135A (en) | The method and terminal of data interaction | |
| CN105187399A (en) | Resource processing method and device | |
| CN105554136A (en) | Backup data restoration method, device and system | |
| CN110248356A (en) | Information acquisition method and device | |
| CN111859320B (en) | Cross-system login-free methods, devices, equipment and readable storage media | |
| CN114430551A (en) | A device credit authentication method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160803 |