CN113222685B - Order verification method, device, equipment and storage medium - Google Patents

Order verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN113222685B
CN113222685B CN202110370977.2A CN202110370977A CN113222685B CN 113222685 B CN113222685 B CN 113222685B CN 202110370977 A CN202110370977 A CN 202110370977A CN 113222685 B CN113222685 B CN 113222685B
Authority
CN
China
Prior art keywords
order
verification
mobile terminal
verifying
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110370977.2A
Other languages
Chinese (zh)
Other versions
CN113222685A (en
Inventor
雷勇
陈宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Multidimensional Network Technology Co ltd
Original Assignee
Shanghai Multidimensional Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Multidimensional Network Technology Co ltd filed Critical Shanghai Multidimensional Network Technology Co ltd
Priority to CN202110370977.2A priority Critical patent/CN113222685B/en
Publication of CN113222685A publication Critical patent/CN113222685A/en
Application granted granted Critical
Publication of CN113222685B publication Critical patent/CN113222685B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • G06Q30/0637Approvals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an order verification method, an order verification device, order verification equipment and a storage medium. An order verification method, comprising: responding to a trigger message of order verification, and acquiring verification information of verification of the order; verifying the order verification according to the order verification information; if the verification is not passed, the order is not validated. According to the technical scheme, verification is carried out on order verification according to verification information of order verification; if the verification is not passed, the order is not validated. The loss caused by leakage of the order two-dimension code is avoided, and the safety of a user is improved.

Description

Order verification method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for order verification.
Background
After the user generates an order by placing an order on line, the user can get products from an online physical store, and when the user gets ordered goods, the user can show the two-dimensional code of the order. After the front end of the merchant scans the two-dimension code, the server at the rear end can verify the order. However, in the prior art, if the two-dimension code of the user order is revealed or stolen by a third party, the third party may use the stolen two-dimension code to impersonate the product of the user order, which causes loss to the user.
Disclosure of Invention
The main object of the present application is to provide a method, an apparatus, a device and a storage medium for order verification, so as to solve the above-mentioned problems.
To achieve the above object, according to one aspect of the present application, there is provided an order verification method, including:
responding to a trigger message of order verification, and acquiring verification information of verification of the order;
verifying the order verification according to the order verification information;
if the verification is not passed, the order is not validated.
In one embodiment, if the verification passes, the order is validated.
In one embodiment, the verification information includes: the method comprises the steps of generating the acceleration state of a mobile terminal of the order, the Bluetooth address of the mobile terminal and the time stamp of the order.
In one embodiment, verifying the order verification based on the order verification information includes:
and if the acceleration state of the mobile terminal is acceleration-free, sending an alarm short message to the mobile terminal so as to inform a user that the order is verified.
In one embodiment, if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address sent by the mobile terminal and subjected to encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
performing encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not verifying the order.
In one embodiment, if so, a timestamp of the order is determined;
recording the time point of receiving the trigger message;
judging the time difference value between the time stamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, wherein the order is not verified.
In one implementation, if yes, determining that the terminal is a legal terminal, and sending a short message confirmation message to the mobile terminal so that the user determines whether to cancel an order;
receiving a short message reply confirmation message sent by the mobile terminal; and verifying the order.
In order to achieve the above object, according to a second aspect of the present application, there is provided an order verification apparatus; the device comprises:
the verification information acquisition module is used for responding to the triggering information of order verification and acquiring verification information of the order;
the verification module is used for verifying the order verification according to the verification information of the order verification;
and the verification module is used for verifying the order if the verification module determines that the verification is not passed.
In one embodiment, the verification module is further configured to verify the order if the verification passes.
In one embodiment, the verification module is further configured to send an alarm short message to the mobile terminal to notify the user that the order is verified if the acceleration state of the mobile terminal is no acceleration.
In one embodiment, the verification module is further configured to receive a first encrypted MAC address that is sent by the mobile terminal and is subjected to encryption operation if the acceleration state of the mobile terminal is acceleration;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
performing encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not verifying the order.
In one embodiment, the verification module is further configured to determine a timestamp of the order if so;
recording the time point of receiving the trigger message;
judging the time difference value between the time stamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, wherein the order is not verified.
In one embodiment, the system further comprises a short message receiving and sending module, configured to send a short message acknowledgement message to the mobile terminal if the verification module determines that the time difference is greater than or equal to a predetermined threshold, so that the user determines whether to cancel an order; receiving a short message reply confirmation message sent by the mobile terminal;
and the verification module is used for verifying the order after the short message receiving and sending module receives the short message reply confirmation message sent by the mobile terminal.
To achieve the above object, according to a third aspect of the present application, there is provided an apparatus; comprising at least one processor and at least one memory; the memory is used for storing one or more program instructions; the processor is configured to execute one or more program instructions to perform the method of any of the above.
According to a fourth aspect of the present application, there is provided a computer readable storage medium having one or more program instructions embodied therein for performing the method of any one of the above.
According to the technical scheme, after the server responds to the triggering message of order verification, verification information of verification of the order is obtained; verifying the order verification according to the order verification information; if the verification is not passed, the order is not validated. The safety of the order is improved, and the risk that the user is imported due to the leakage of the two-dimension code of the order is reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, are included to provide a further understanding of the application and to provide a further understanding of the application with regard to the other features, objects and advantages of the application. The drawings of the illustrative embodiments of the present application and their descriptions are for the purpose of illustrating the present application and are not to be construed as unduly limiting the present application. In the drawings:
FIG. 1 is a flow chart of an order verification method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an order verification device according to an embodiment of the present application;
fig. 3 is a schematic structural view of an order verification apparatus according to an embodiment of the present application.
Detailed Description
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the present application described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
When a user takes an order online, the user can show the two-dimension code of the order, and after the front-end equipment of a merchant scans the two-dimension code, the back-end server can cancel the order. However, in the prior art, if the two-dimension code of the user order is revealed, a third party may use the stolen two-dimension code to impersonate the product of the user order, which causes loss to the user.
Based on this, the application proposes an order verification method, including:
step S101, acquiring verification information of order verification in response to a trigger message of order verification;
specifically, when a user uses the two-dimension code of the order to get goods from an off-line physical store to perform order verification, the user can show the two-dimension code of the order, and after the front end scans the two-dimension code, the front end can send a trigger message of order verification to a server at the rear end so as to verify the order by the server at the rear end.
Step S102, verifying the order verification according to the order verification information;
step S103, if the verification is not passed, the order is not checked out. And if the verification is passed, verifying the order.
According to the method provided by the invention, after the server receives the triggering message of order verification, the order verification is performed, if the verification is not passed, the order verification is not performed, the situation that the product is led and the order is maliciously verified due to leakage of the user order is avoided, and the safety of the user order is improved.
In one embodiment, the verification information includes: whether the acceleration of the mobile terminal generating the order, the Bluetooth address of the mobile terminal and the starting time of the mobile terminal exist or not.
In one embodiment, verifying the order verification based on the order verification information includes:
and if the acceleration state of the mobile terminal is acceleration-free, sending an alarm short message to the mobile terminal so as to inform a user that the order is verified.
Specifically, the method comprises the following steps: recording a time point T1 of the generation of the acceleration of the mobile terminal;
after the two-dimension code of the order is recorded and obtained, a time point T2 for triggering a trigger message for verifying and verifying the order is sent to a back-end server;
calculating a difference value T between a time point T1 and a time point T2;
if T is less than a predetermined time threshold, determining that an acceleration associated with the verification action has occurred;
if T is greater than or equal to a predetermined time threshold, it is determined that no acceleration associated with the verification action has occurred.
For example, after an order is generated on line by using the mobile terminal, and then the user A needs to draw out a mobile phone first and then open an application program App when the user A arrives at an entity store to pick up the product related to the order, and then the user A presents the two-dimension code of the order to pick up the product and cancel the order. The above actions necessarily generate acceleration of the mobile phone. And there is a time difference, the difference is generally within 5 minutes, and the time threshold can be flexibly set, which is not limited in this application. If the time difference is greater than the time threshold, it is determined that the mobile terminal making the order for verification is not the mobile terminal that generated the order, i.e., the illegitimate terminal.
If the two-dimensional code leakage of the user A is obtained by the user C. User a is not at home to the store. No cell phone is used and no acceleration information is generated, but a trigger message for order approval is received. And sending a short message to the mobile phone of the user A to inform someone to take the order product, thereby playing an alarm role.
In one embodiment, if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address sent by the mobile terminal and subjected to encryption operation;
the mobile terminal carries out hash encryption signature operation on the Bluetooth MAC address, and a character string is obtained after encryption. And the character string is sent to the server, so that the concealment of the Bluetooth MAC address of the mobile terminal is enhanced, and the safety is improved.
The encryption algorithm can also adopt an encryption algorithm which can not be reversely decrypted.
Determining the MAC address of the mobile terminal corresponding to the order according to the order;
specifically, the order includes MAC address information of the mobile terminal that generated the order. The background server may determine the MAC address of the mobile terminal that produced the order based on the order information.
The server performs encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if the order is different, determining that the mobile terminal is an illegal terminal, and not verifying the order.
In one embodiment, if the first encrypted MAC address and the second encrypted MAC address are the same; determining a timestamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the time stamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
the predetermined threshold may be 24 hours or 48 hours, and specifically may be flexibly set, which is not limited in this application.
If not, determining that the mobile terminal is an illegal terminal, wherein the order is not verified.
In one implementation, if the time difference is less than a predetermined threshold, determining that the terminal is a legal terminal, and sending a short message confirmation message to the mobile terminal, so that the user determines whether to cancel an order;
receiving a short message reply confirmation message sent by the mobile terminal; and verifying the order.
In order to achieve the above object, according to a second aspect of the present application, there is provided an order verification apparatus; referring to FIG. 2, a schematic diagram of an order verification device is shown; the device comprises:
an acquisition verification information module 21, configured to respond to a trigger message of order verification, and acquire verification information of verification of the order;
a verification module 22, configured to verify the order verification according to verification information of the order;
and the verification module 23 is configured to not verify the order if the verification module determines that the verification is not passed.
In one embodiment, the verification module 23 is further configured to verify the order if the verification passes.
In one embodiment, the verification module 22 is further configured to send an alarm message to the mobile terminal to notify the user that the order is verified if the acceleration state of the mobile terminal is no acceleration.
In one embodiment, the verification module 22 is further configured to receive the first encrypted MAC address after the encryption operation sent by the mobile terminal if the acceleration state of the mobile terminal is acceleration;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
performing encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not verifying the order.
In one embodiment, the verification module 22 is further configured to determine a timestamp of the order if so;
recording the time point of receiving the trigger message;
judging the time difference value between the time stamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, wherein the order is not verified.
In one embodiment, the system further comprises a short message receiving and sending module, configured to send a short message acknowledgement message to the mobile terminal if the verification module determines that the time difference is greater than or equal to a predetermined threshold, so that the user determines whether to cancel an order; receiving a short message reply confirmation message sent by the mobile terminal;
and the verification module 23 is configured to verify the order after the sms receiving and sending module receives the sms reply confirmation message sent by the mobile terminal.
According to a third aspect of the present application, there is provided an order verification apparatus; the device, for being arranged in a back-end server, see fig. 3, comprises at least one processor 31 and at least one memory 32; the memory 32 is for storing one or more program instructions; the processor 31 is configured to execute one or more program instructions for performing the method of any of the above.
In a fourth aspect, the present application also proposes a computer readable storage medium containing one or more program instructions for performing the method of any one of the above.
The disclosed methods, steps, and logic blocks in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The processor reads the information in the storage medium and, in combination with its hardware, performs the steps of the above method.
The storage medium may be memory, for example, may be volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory.
The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an electrically Erasable ROM (Electrically EPROM, EEPROM), or a flash Memory.
The volatile memory may be a random access memory (Random Access Memory, RAM for short) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (Double Data RateSDRAM), enhanced SDRAM (ESDRAM), synchronous DRAM (SLDRAM), and direct memory bus RAM (directracram, DRRAM).
The storage media described in embodiments of the present invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the present invention may be implemented in a combination of hardware and software. When the software is applied, the corresponding functions may be stored in a computer-readable medium or transmitted as one or more instructions or code on the computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the same, but rather, various modifications and variations may be made by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application.

Claims (4)

1. A method of order verification, comprising:
responding to a trigger message of order verification, and acquiring verification information of verification of the order;
verifying the order verification according to the order verification information;
if the verification is not passed, not verifying the order;
if the verification is passed, verifying and approving the order;
the verifying the order verification according to the order verification information comprises the following steps:
recording a time point T1 of the generation of the acceleration of the mobile terminal;
after the two-dimension code of the order is obtained, a time point T2 for triggering a trigger message for verifying the order is sent to a back-end server;
calculating a difference value T between a time point T1 and a time point T2;
if T is less than a predetermined time threshold, determining that an acceleration associated with the verification action is generated;
if T is greater than or equal to a predetermined time threshold, determining that no acceleration associated with the verification action has occurred;
the verification information includes: generating the acceleration state of the mobile terminal of the order, the Bluetooth address of the mobile terminal and the time stamp of the order;
verifying the verification of the order according to the order verification information, including:
if the acceleration state of the mobile terminal is acceleration-free, sending an alarm short message to the mobile terminal so as to inform a user that the order is verified;
if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address which is sent by the mobile terminal and is subjected to encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
performing encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not verifying and verifying the order;
if yes, determining a time stamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the time stamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, wherein the order is not verified;
if yes, determining that the terminal is a legal terminal, and sending a short message confirmation message to the mobile terminal so that the user determines whether to cancel the order;
receiving a short message reply confirmation message sent by the mobile terminal; and verifying the order.
2. An order verification device, comprising:
the verification information acquisition module is used for responding to the triggering information of order verification and acquiring verification information of the order;
the verification module is used for verifying the order verification according to the verification information of the order verification;
the verification module is used for verifying the order if the verification module determines that the verification is not passed; if the verification is passed, verifying and approving the order;
the verifying the order verification according to the order verification information comprises the following steps:
recording a time point T1 of the generation of the acceleration of the mobile terminal;
after the two-dimension code of the order is obtained, a time point T2 for triggering a trigger message for verifying the order is sent to a back-end server;
calculating a difference value T between a time point T1 and a time point T2;
if T is less than a predetermined time threshold, determining that an acceleration associated with the verification action is generated;
if T is greater than or equal to a predetermined time threshold, determining that no acceleration associated with the verification action has occurred;
the verification information includes: generating the acceleration state of the mobile terminal of the order, the Bluetooth address of the mobile terminal and the time stamp of the order;
verifying the verification of the order according to the order verification information, including:
if the acceleration state of the mobile terminal is acceleration-free, sending an alarm short message to the mobile terminal so as to inform a user that the order is verified;
if the acceleration state of the mobile terminal is acceleration, receiving a first encrypted MAC address which is sent by the mobile terminal and is subjected to encryption operation;
determining the MAC address of the mobile terminal corresponding to the order according to the order;
performing encryption operation on the MAC address of the mobile terminal corresponding to the order to obtain a second encrypted MAC address;
comparing whether the first encrypted MAC address and the second encrypted MAC address are the same;
if not, determining that the mobile terminal is an illegal terminal, and not verifying and verifying the order;
if yes, determining a time stamp of the order;
recording the time point of receiving the trigger message;
judging the time difference value between the time stamp and the time point;
judging whether the time difference value is smaller than a preset threshold value or not;
if not, determining that the mobile terminal is an illegal terminal, wherein the order is not verified;
if yes, determining that the terminal is a legal terminal, and sending a short message confirmation message to the mobile terminal so that the user determines whether to cancel the order;
receiving a short message reply confirmation message sent by the mobile terminal; and verifying the order.
3. An order verification apparatus, comprising: at least one processor and at least one memory; the memory is used for storing one or more program instructions; the processor is configured to execute one or more program instructions to perform the method of claim 1.
4. A computer readable storage medium having one or more program instructions embodied therein for performing the method of claim 1.
CN202110370977.2A 2021-04-07 2021-04-07 Order verification method, device, equipment and storage medium Active CN113222685B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110370977.2A CN113222685B (en) 2021-04-07 2021-04-07 Order verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110370977.2A CN113222685B (en) 2021-04-07 2021-04-07 Order verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113222685A CN113222685A (en) 2021-08-06
CN113222685B true CN113222685B (en) 2024-02-20

Family

ID=77086474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110370977.2A Active CN113222685B (en) 2021-04-07 2021-04-07 Order verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113222685B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003022255A (en) * 2001-07-06 2003-01-24 Ufj Bank Ltd Personal confirmation method
CN107622293A (en) * 2017-08-21 2018-01-23 厦门壹码通科技有限责任公司 A kind of safe checking method based on Quick Response Code
CN107784554A (en) * 2017-09-28 2018-03-09 深圳乐信软件技术有限公司 Method, apparatus, storage medium, server and the terminal device of order processing
CN109583888A (en) * 2018-11-09 2019-04-05 山西特信环宇信息技术有限公司 A kind of certificate chain campus electronics card system
CN109993524A (en) * 2019-03-29 2019-07-09 深圳前海微众银行股份有限公司 Card certificate management method, device, equipment and computer readable storage medium
CN110245988A (en) * 2019-06-17 2019-09-17 上海华申智能卡应用***有限公司 Two dimensional code certificate checks and writes off method, is written off terminal and checks and writes off terminal
CN110544077A (en) * 2018-05-29 2019-12-06 腾讯科技(深圳)有限公司 method for verifying and selling electronic ticket and related device
CN111292456A (en) * 2019-12-13 2020-06-16 无锡市民卡有限公司 Two-dimensional code verification and sale method
CN111507436A (en) * 2020-04-10 2020-08-07 雁于飞(厦门)科技有限公司 Two-dimensional code verification and cancellation method based on positioning information
CN111582904A (en) * 2020-03-26 2020-08-25 口碑(上海)信息技术有限公司 Information verification and cancellation system and method
CN111599062A (en) * 2019-02-03 2020-08-28 阿里巴巴集团控股有限公司 Ticket information processing method, device and system
CN111709752A (en) * 2020-05-28 2020-09-25 腾讯科技(深圳)有限公司 Virtual resource processing method and device, computer readable medium and electronic equipment
CN111861658A (en) * 2020-07-15 2020-10-30 深圳市爱乐墨科技有限公司 Data management method, terminal and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003022255A (en) * 2001-07-06 2003-01-24 Ufj Bank Ltd Personal confirmation method
CN107622293A (en) * 2017-08-21 2018-01-23 厦门壹码通科技有限责任公司 A kind of safe checking method based on Quick Response Code
CN107784554A (en) * 2017-09-28 2018-03-09 深圳乐信软件技术有限公司 Method, apparatus, storage medium, server and the terminal device of order processing
CN110544077A (en) * 2018-05-29 2019-12-06 腾讯科技(深圳)有限公司 method for verifying and selling electronic ticket and related device
CN109583888A (en) * 2018-11-09 2019-04-05 山西特信环宇信息技术有限公司 A kind of certificate chain campus electronics card system
CN111599062A (en) * 2019-02-03 2020-08-28 阿里巴巴集团控股有限公司 Ticket information processing method, device and system
CN109993524A (en) * 2019-03-29 2019-07-09 深圳前海微众银行股份有限公司 Card certificate management method, device, equipment and computer readable storage medium
CN110245988A (en) * 2019-06-17 2019-09-17 上海华申智能卡应用***有限公司 Two dimensional code certificate checks and writes off method, is written off terminal and checks and writes off terminal
CN111292456A (en) * 2019-12-13 2020-06-16 无锡市民卡有限公司 Two-dimensional code verification and sale method
CN111582904A (en) * 2020-03-26 2020-08-25 口碑(上海)信息技术有限公司 Information verification and cancellation system and method
CN111507436A (en) * 2020-04-10 2020-08-07 雁于飞(厦门)科技有限公司 Two-dimensional code verification and cancellation method based on positioning information
CN111709752A (en) * 2020-05-28 2020-09-25 腾讯科技(深圳)有限公司 Virtual resource processing method and device, computer readable medium and electronic equipment
CN111861658A (en) * 2020-07-15 2020-10-30 深圳市爱乐墨科技有限公司 Data management method, terminal and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
城市轨道交通iAFC方案研究;贾社军等;《铁道通信信号》;第56卷(第2期);第79-82页 *

Also Published As

Publication number Publication date
CN113222685A (en) 2021-08-06

Similar Documents

Publication Publication Date Title
CN104765999B (en) Method, terminal and server for processing user resource information
CN103856640B (en) Method and system for processing user resource information
US9461995B2 (en) Terminal, network locking and network unlocking method for same, and storage medium
US9734091B2 (en) Remote load and update card emulation support
CN111224786A (en) Block chain-based data security sharing method, device and medium
CN106790156A (en) A kind of smart machine binding method and device
CN108683667B (en) Account protection method, device, system and storage medium
US20200104474A1 (en) Systems and methods for cross coupling risk analytics and one-time-passcodes
CN111723383A (en) Data storage and verification method and device
CN111342963A (en) Data uplink method, data storage method and device
CN104579649A (en) Identity recognition method and system
CN113572715A (en) Data transmission method and system based on block chain
CN101771680B (en) Method for writing data to smart card, system and remote writing-card terminal
US20200076592A1 (en) Method for generating seed and device thereof
CN111814132A (en) Security authentication method and device, security authentication chip and storage medium
CN113472716A (en) System access method, gateway device, server, electronic device, and storage medium
CN104125064A (en) Dynamic password authentication method, client and authentication system
CN106559386A (en) A kind of authentication method and device
CN113222685B (en) Order verification method, device, equipment and storage medium
CN110533128B (en) Encryption-based anti-counterfeiting traceability data processing method, device, system and medium
CN105809494A (en) method and system for invoice generation and invoice verification
CN115567200B (en) Http interface anti-brushing method, system and related equipment
CN110175471B (en) File storage method and system
US9853952B2 (en) Apparatus and method for encryption
CN114254342A (en) Communication connection method, system, device, storage medium and processor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant