CN105447715A - Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party - Google Patents

Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party Download PDF

Info

Publication number
CN105447715A
CN105447715A CN201510737225.XA CN201510737225A CN105447715A CN 105447715 A CN105447715 A CN 105447715A CN 201510737225 A CN201510737225 A CN 201510737225A CN 105447715 A CN105447715 A CN 105447715A
Authority
CN
China
Prior art keywords
request
signature
ciphertext
subscriber equipment
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510737225.XA
Other languages
Chinese (zh)
Inventor
***
廖耀华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201510737225.XA priority Critical patent/CN105447715A/en
Publication of CN105447715A publication Critical patent/CN105447715A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0208Trade or exchange of goods or services in exchange for incentives or rewards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0222During e-commerce, i.e. online transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • G06Q30/0637Approvals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/387Payment using discounts or coupons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Landscapes

  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method for anti-theft electronic coupon sweeping by cooperating with a third party. The method comprises: user equipment provided with a third-party application receives a request of taking an electronic coupon, wherein the request includes a ciphertext and a signature that are generated by the user equipment; decryption is carried out on the ciphertext to obtain a plain text; and whether the plain text matches the signature is verified; if so, normal taking is determined. According to the invention, the behavior of the user is verified at different levels during the whole coupon taking processing and whether the behavior is a malicious coupon taking behavior is determined, thereby achieving an objective of coupon sweeping prevention. In addition, the invention also provides a corresponding apparatus.

Description

For the method and apparatus of illegal electronic coupons cooperated with third party
Technical field
The present invention relates to e-commerce field, be specifically related to a kind of method and apparatus of the illegal electronic coupons cooperated with third party.
Background technology
Day by day universal along with mobile Internet, businessman cooperates with third party APP, sends out reward voucher to corresponding A PP user, has become a lot of businessman and has pulled one of important means of new user and promotion.Businessman generally oneself has a set of neck certificate system, the neck certificate page of oneself can be generated, then an entry position is determined with the APP of cooperation, be arranged to the neck certificate page link address of businessman, when user accesses APP, click this neck certificate address, both entered the neck certificate page, then input handset number or allow user log in carry out getting reward voucher.
Get in reward voucher mode at existing hacker's brush, general employing uninterruptedly simulates normal users neck certificate procedure request, and the modes such as Brute Force identifying code reach the object that reward voucher got by brush.Due to reward voucher restricted number, real user is got less than reward voucher, thus businessman is suffered a loss.
Reward voucher is got in order to prevent above-mentioned hackers brush, getting in reward voucher process, general employing allows user input picture validation code, or when user's input handset number, the cell-phone number to correspondence sends the mode of a checking note to carry out illegal reward voucher.
By existing user's input validation information that directly allows to prevent the stolen brush of reward voucher, have following shortcoming:
1, sacrifice Mobile solution APP Consumer's Experience, reduce reward voucher and get rate: in whole neck certificate flow process, increase allows user read identifying code more, and user fills in identifying code two steps, improves user operation complicacy, user can be made to lead certificate desire to lower;
If 2 adopt picture validation code, or short-message verification prevents brush from getting reward voucher as neck certificate system the only resource, and security is not high, and hacker still can utilize the modes such as Brute Force to carry out robber's brush reward voucher;
3, businessman's cost is improved: sending note is not free dispach (FD), needs to pay certain expense cost to operator.
Summary of the invention
In view of this, the present invention proposes a kind of method of the illegal electronic coupons cooperated with third party, comprise: receive the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment; Be decrypted to obtain expressly to described ciphertext; And verify whether described plaintext and signature mate, if coupling, then think normally to get.
The invention allows for a kind of device of the illegal electronic coupons cooperated with third party, comprise: request receiving module, for receiving the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment; Deciphering module, for being decrypted described ciphertext; And authentication module, for verifying whether described plaintext and signature mate, if coupling, then think normally to get.
The invention provides a kind of method and apparatus of the illegal electronic coupons for cooperating with third party.Mainly by the behavior in hierarchical authentication of users whole neck certificate process, determine whether that malice leads certificate, prevent reward voucher by the object of brushing to reach.
Accompanying drawing explanation
Accompanying drawing is used for understanding the present invention better, does not form limitation of the invention, wherein:
Fig. 1 shows the overall flow figure getting electronic coupons cooperated with third party APP according to the embodiment of the present invention.
Fig. 2 shows the schematic block diagram verifying the request of neck certificate according to the use encryption of the embodiment of the present invention and digital signature.
Fig. 3 shows the process flow diagram of the method for the statistical study request according to the embodiment of the present invention.
Fig. 4 shows the method 400 of the illegal electronic coupons cooperated with third party according to the embodiment of the present invention.
Fig. 5 shows the device 500 of the illegal electronic coupons cooperated with third party according to the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, exemplary embodiment of the present invention is explained, comprising the embodiment of the present invention various details with contribute to understand, they should be thought it is only exemplary.Therefore, one of ordinary skill in the art appreciates that and can make various amendment and change to embodiment described herein, and do not depart from the scope of the present invention and spirit.Also for ease of clear and simple and clear, in below describing, eliminate the description to known function and structure.
Fig. 1 shows the overall flow figure getting electronic coupons cooperated with third party APP according to the embodiment of the present invention.Four modules that this flow process relates to, are respectively encrypting module, request statistical analysis module, and deciphering module, gets number of times statistical analysis module, below in conjunction with the detailed description of Fig. 1 to modules:
1, encrypting module: this module is at APP end, is, before asking neck certificate chained address for user, be encrypted and digital signature according to agreement to related clear data, then ciphertext and signature is passed to neck certificate system.Expressly energy unique identification cell phone apparatus or a user, generally can adopt mobile phone IMEI code or APP unique identification.
2, deciphering module: this module is at neck certificate system end, is lead in certificate process for user, to the transmission ciphertext in above-mentioned encrypting module with digital signature is decrypted and signature verification.
3, number of times statistical analysis module is got: this module is that counting user has got reward voucher number of times, if exceeded institute's configured number, then no longer gets at neck certificate system end.Get on to improve hacker's brush from business rule and get reward voucher cost.
4, statistical analysis module is asked: this module is at neck certificate system end, for adding up the frequency of all request IP, if exceed configuration frequency, thinks machine simulation request.Configuration frequency can adopt often asks the such form of how many times to be configured for how many minutes.
Fig. 2 shows the schematic block diagram verifying the request of neck certificate according to the use encryption of the embodiment of the present invention and digital signature.
Encrypting module is encrypted data, is sightless to user simultaneously.Neck certificate system regards as A end, and APP application regards as B end, and wherein A end can provide a pair public and private key, for PKI A and private key A, B end also can provide a pair public and private key, is PKI B and private key B.The concrete grammar performed in APP application end is as follows:
1, determine encrypting plaintext, APP and neck certificate system can be arranged, general employing mobile phone IMEI code, or APP unique identification is as plaintext;
2, APP end uses the PKI A that neck certificate system provides, and to being expressly encrypted, such as, adopts rsa encryption;
3, the plaintext that APP holds the private key B of use oneself and step 1 to determine generates digital signature;
4, ciphertext step 2 and step 3 generated and signature, along with user clicks the link of neck certificate, send to neck certificate system, to ask electronic coupons.
Then, deciphering module is decrypted the encrypted content that above-mentioned encrypting module transmits, and verifies digital signature.Deciphering and verification object be judge this request be whether user from APP entrance to getting the behavior of reward voucher normal request, instead of hacker directly goes for and asks neck certificate system to carry out neck certificate.The concrete steps performed in neck certificate system are as follows:
1, ciphertext is decrypted: the private key A using neck certificate system to provide, adopts RSA deciphering to be decrypted ciphertext;
2, decipher unsuccessful, then think malice get, directly get failure; Successful decryption, then continue step 3;
3, do digital signature to verify, use APP to provide PKI B, to expressly and digital signature verify, verify that whether and signatures match this plaintext, if do not mated, then thinks maliciously to get, directly get failure; If coupling, then think normally to get, then can select to continue to get number of times module analysis.
Get number of times module analysis and belong to business rules module, fundamental purpose is got reward voucher get cost to improve hackers brush.Such as: if a setting cell-phone number can only get a reward voucher, hacker thinks to get reward voucher on a large scale, then must need in advance to prepare a lot of cell-phone number.Concrete steps are as follows:
1, buffer memory is used to add up number of times: using the plaintext that decrypts in above-mentioned deciphering module as buffer memory Key, when this user gets successfully, then the Value value corresponding to the plaintext Key after this user being asked entrained deciphering to add 1;
2, after user leads certificate request to come in, inquire about the neck certificate number of times Value value that this user is corresponding in the buffer, if exceed institute's configured threshold, then lead certificate unsuccessful; If do not exceeded, then get successfully or continue to ask statistical analysis module.
Fig. 3 shows the process flow diagram of the method 300 of the statistical study request according to the embodiment of the present invention.The method can be performed by request statistical analysis module.
Request statistical analysis module uses the User IP of buffer memory to all requests to do frequency statistics, and analysis statisticaling data, if exceed configuration frequency, be then judged to be it may is machine simulation access, concrete steps are as follows:
1, at neck certificate system end configuration of IP threshold frequency, as every 5 minutes 30 times;
2, read requests IP, use buffer memory by IP and minute add up IP access times, buffer memory Key is the current the number of minutes of IP+, and Value is number of times; By above-mentioned buffer structure, same IP accessed in same minute, then Key is the same, just on corresponding Value, added 1.
3, the number of times occurred in first 5 minutes of analyzing IP; By the Key value described by step 3 from buffer memory, read the value corresponding to 5 Key in first 5 minutes of this IP, then sue for peace, if exceed institute's configured threshold, because Agent IP or the same situation of same gateway outlet IP can be there is, then think and for machine is in analog access, may needs to do further verification process, enter step 4; If do not exceeded, then current for IP minute access times are added 1, and terminate;
4, return client, allow user input picture validation code, or send checking note, do further checking;
5, terminate.
Although in the further verification step 4 of this module, also adopting allows user have input picture validation code, or send the mode of checking note, but when being through this step, by above-mentioned decryption verification with get number of times authentication module and tackle most of malicious requests, just further confirmation is done to the doubtful malice request of getting, reduce reward voucher by brush risk.
Fig. 4 shows the method 400 of the illegal electronic coupons cooperated with third party according to the embodiment of the present invention.
In step 410, receive the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment.
In step 420, be decrypted to obtain expressly, if decipher unsuccessfully, getting failure to described ciphertext;
In step 430, verify whether described plaintext and signature mate, if do not mated, get failure, if coupling, then think normally to get.
Preferably, described ciphertext and signature are generated by the unique identifier of the mobile phone IMEI code of arranging and/or third-party application in advance.
Preferably, described ciphertext and signature are generated by RSA Algorithm.
Preferably, step 440 and step 450 can also optionally be performed to verify request further.In step 440, inquire about and corresponding with described plaintext get number of times, if more than the first predetermined threshold, then get failure, if do not exceeded, number of times will be got and increase progressively and advance to step 450.
In step 450, the IP address adding up described subscriber equipment sends the number of times getting coupon-request in the given time, if more than the second predetermined threshold, sends picture validation code or verify that note is to verify further to subscriber equipment.
Fig. 5 shows the device 500 of illegal electronic coupons for cooperating with third party according to the embodiment of the present invention.
Described device 500 comprises: request receiving module 510, and for receiving the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment; Decoder module 520, for being decrypted described ciphertext, if decipher unsuccessfully, gets failure; Authentication module 530, for verifying whether described plaintext and signature mate, if do not mated, get failure.
Preferably, described ciphertext and signature are generated by the unique identifier of the mobile phone IMEI code of arranging and/or third-party application in advance.
Preferably, wherein said ciphertext and signature are generated by RSA Algorithm.
Preferably, described device 500 also comprises gets number of times statistical analysis module 440, corresponding with described plaintext getting number of times, if more than the first predetermined threshold, then get failure, if do not exceeded, will get number of times and increasing progressively for inquiring about.
Preferably you, described device 500 also comprises request statistical analysis module 550, IP address for adding up described subscriber equipment sends the number of times getting coupon-request in the given time, if more than the second predetermined threshold, send picture validation code to subscriber equipment or verify that note is to verify further.
It should be noted that above steps and module hierarchical verify the request of getting electronic coupons.Therefore, it will be appreciated by those skilled in the art that and can therefrom select the step of any appropriate and module to combine, or the adjustment of any appropriate is carried out to execution sequence, to reach getting from third-party application the object that coupon-request verifies.
It should be noted that and these are only preferred embodiment of the present invention and principle.Person of skill in the art will appreciate that, the invention is not restricted to specific embodiment here.Those skilled in the art can make various significant change, adjustment and substitute, and does not depart from protection scope of the present invention.Scope of the present invention is defined by claims.

Claims (10)

1. a method for the illegal electronic coupons cooperated with third party, comprising:
Receive the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment;
Be decrypted to obtain expressly to described ciphertext; And
Verify whether described plaintext and signature mate, if coupling, then think normally to get.
2. method according to claim 1, wherein said ciphertext and signature are generated by the unique identifier of the mobile phone IMEI code of arranging and/or third-party application in advance.
3. method according to claim 1 and 2, wherein said ciphertext and signature are generated by RSA Algorithm.
4. method according to claim 1, also comprises
Inquire about and corresponding with described plaintext get number of times, if more than the first predetermined threshold, then get failure, if do not exceeded, number of times will be got and increase progressively.
5. the method according to claim 1 or 4, also comprises
The IP address adding up described subscriber equipment sends the number of times getting coupon-request in the given time, if more than the second predetermined threshold, sends picture validation code or verify that note is to verify further to subscriber equipment.
6. a device for the illegal electronic coupons cooperated with third party, comprising:
Request receiving module, for receiving the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment;
Deciphering module, for being decrypted described ciphertext; And
Authentication module, for verifying whether described plaintext and signature mate, if coupling, then think normally to get.
7. device according to claim 6, wherein said ciphertext and signature are generated by the unique identifier of the mobile phone IMEI code of arranging and/or third-party application in advance.
8. the device according to claim 6 or 7, wherein said ciphertext and signature are generated by RSA Algorithm.
9. device according to claim 6, also comprises
Get number of times statistical analysis module, corresponding with described plaintext getting number of times for inquiring about, if more than the first predetermined threshold, then get failure, if do not exceeded, number of times will be got and increase progressively.
10. the device according to claim 6 or 9, also comprises
Request statistical analysis module, sends for the IP address adding up described subscriber equipment the number of times getting coupon-request in the given time, if more than the second predetermined threshold, sends picture validation code or verify that note is to verify further to subscriber equipment.
CN201510737225.XA 2015-11-03 2015-11-03 Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party Pending CN105447715A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510737225.XA CN105447715A (en) 2015-11-03 2015-11-03 Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510737225.XA CN105447715A (en) 2015-11-03 2015-11-03 Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party

Publications (1)

Publication Number Publication Date
CN105447715A true CN105447715A (en) 2016-03-30

Family

ID=55557852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510737225.XA Pending CN105447715A (en) 2015-11-03 2015-11-03 Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party

Country Status (1)

Country Link
CN (1) CN105447715A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992972A (en) * 2017-03-15 2017-07-28 咪咕数字传媒有限公司 A kind of cut-in method and device
CN107484032A (en) * 2017-09-08 2017-12-15 武汉斗鱼网络科技有限公司 Prevent the verification method and device brushed
CN107529078A (en) * 2017-09-08 2017-12-29 武汉斗鱼网络科技有限公司 Prevent the verification method and device brushed
CN108733728A (en) * 2017-04-25 2018-11-02 北京京东尚科信息技术有限公司 Time series data statistical method, device, computer equipment and readable storage medium storing program for executing
CN109102314A (en) * 2017-06-20 2018-12-28 北京嘀嘀无限科技发展有限公司 Information processing method, system and computer installation
CN109213598A (en) * 2018-07-03 2019-01-15 努比亚技术有限公司 A kind of resource allocation methods, device and computer readable storage medium
CN109509020A (en) * 2018-10-22 2019-03-22 阿里巴巴集团控股有限公司 A kind of discount coupon amount of money checking method and device
CN110580782A (en) * 2019-09-12 2019-12-17 深圳市丰巢科技有限公司 Method, device and equipment for processing electronic ticket of express delivery cabinet and storage medium
CN111865600A (en) * 2019-04-26 2020-10-30 卡西欧计算机株式会社 Server device, recording medium, information processing system, and information processing method
CN111932290A (en) * 2020-06-30 2020-11-13 五八到家有限公司 Request processing method, device, equipment and storage medium
US11341198B2 (en) 2017-06-20 2022-05-24 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for data processing related to an online to offline service

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1746809A (en) * 2004-09-07 2006-03-15 索尼株式会社 Biometric identification system
CN101179374A (en) * 2006-11-09 2008-05-14 日电(中国)有限公司 Communication equipment, communications system and method therefor
CN103093375A (en) * 2012-12-31 2013-05-08 邬国锐 Electronic coupon processing system and method
CN104618226A (en) * 2015-02-16 2015-05-13 腾讯科技(深圳)有限公司 Information processing method, client and server
CN104899747A (en) * 2014-08-28 2015-09-09 腾讯科技(深圳)有限公司 Virtual bill generating and verifying method, apparatus and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1746809A (en) * 2004-09-07 2006-03-15 索尼株式会社 Biometric identification system
CN101179374A (en) * 2006-11-09 2008-05-14 日电(中国)有限公司 Communication equipment, communications system and method therefor
CN103093375A (en) * 2012-12-31 2013-05-08 邬国锐 Electronic coupon processing system and method
CN104899747A (en) * 2014-08-28 2015-09-09 腾讯科技(深圳)有限公司 Virtual bill generating and verifying method, apparatus and system
CN104618226A (en) * 2015-02-16 2015-05-13 腾讯科技(深圳)有限公司 Information processing method, client and server

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992972A (en) * 2017-03-15 2017-07-28 咪咕数字传媒有限公司 A kind of cut-in method and device
CN106992972B (en) * 2017-03-15 2018-09-04 咪咕数字传媒有限公司 A kind of cut-in method and device
CN108733728A (en) * 2017-04-25 2018-11-02 北京京东尚科信息技术有限公司 Time series data statistical method, device, computer equipment and readable storage medium storing program for executing
CN108733728B (en) * 2017-04-25 2020-12-22 北京京东尚科信息技术有限公司 Time sequence data statistical method and device, computer equipment and readable storage medium
CN112862531A (en) * 2017-06-20 2021-05-28 北京嘀嘀无限科技发展有限公司 Information processing method, apparatus and computer readable storage medium
CN109102314A (en) * 2017-06-20 2018-12-28 北京嘀嘀无限科技发展有限公司 Information processing method, system and computer installation
US11341198B2 (en) 2017-06-20 2022-05-24 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for data processing related to an online to offline service
CN107529078A (en) * 2017-09-08 2017-12-29 武汉斗鱼网络科技有限公司 Prevent the verification method and device brushed
WO2019047375A1 (en) * 2017-09-08 2019-03-14 武汉斗鱼网络科技有限公司 Authentication method, device, server and storage medium for preventing automated gift farming
CN107529078B (en) * 2017-09-08 2019-08-02 武汉斗鱼网络科技有限公司 Prevent the verification method brushed and device
WO2019047511A1 (en) * 2017-09-08 2019-03-14 武汉斗鱼网络科技有限公司 Method, device, and live broadcast system for preventing automated farming
CN107484032A (en) * 2017-09-08 2017-12-15 武汉斗鱼网络科技有限公司 Prevent the verification method and device brushed
CN109213598A (en) * 2018-07-03 2019-01-15 努比亚技术有限公司 A kind of resource allocation methods, device and computer readable storage medium
CN109509020A (en) * 2018-10-22 2019-03-22 阿里巴巴集团控股有限公司 A kind of discount coupon amount of money checking method and device
CN109509020B (en) * 2018-10-22 2023-10-17 创新先进技术有限公司 Coupon amount checking method and device
CN111865600A (en) * 2019-04-26 2020-10-30 卡西欧计算机株式会社 Server device, recording medium, information processing system, and information processing method
CN111865600B (en) * 2019-04-26 2024-03-15 卡西欧计算机株式会社 Coupon providing system and coupon providing method
CN110580782A (en) * 2019-09-12 2019-12-17 深圳市丰巢科技有限公司 Method, device and equipment for processing electronic ticket of express delivery cabinet and storage medium
CN110580782B (en) * 2019-09-12 2022-01-07 深圳市丰巢科技有限公司 Method, device and equipment for processing electronic ticket of express delivery cabinet and storage medium
CN111932290A (en) * 2020-06-30 2020-11-13 五八到家有限公司 Request processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN103685282B (en) A kind of identity identifying method based on single-sign-on
WO2018050081A1 (en) Device identity authentication method and apparatus, electric device, and storage medium
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
CN102378170B (en) Method, device and system of authentication and service calling
CN107295011B (en) Webpage security authentication method and device
CN101860540B (en) Method and device for identifying legality of website service
US20170208049A1 (en) Key agreement method and device for verification information
CN111615105B (en) Information providing and acquiring method, device and terminal
CN108243176B (en) Data transmission method and device
CN108322416B (en) Security authentication implementation method, device and system
CN105814837B (en) Method, equipment and system for directionally counting flow
CN110690956B (en) Bidirectional authentication method and system, server and terminal
WO2015003503A1 (en) Network device, terminal device and information security improving method
CN112823503B (en) Data access method, data access device and mobile terminal
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN109309566B (en) Authentication method, device, system, equipment and storage medium
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
CN104243452B (en) A kind of cloud computing access control method and system
KR20150135032A (en) System and method for updating secret key using physical unclonable function
CN104463584A (en) Method for achieving mobile terminal App safety payment
CN105024813A (en) Server, user equipment and interactive method of the user equipment and the server
KR101358375B1 (en) Prevention security system and method for smishing
CN109740319B (en) Digital identity verification method and server
CN103368918A (en) Method, device and system for dynamic password authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160330

RJ01 Rejection of invention patent application after publication