CN114258022B - User authentication method and device, mobile communication terminal and storage medium - Google Patents

User authentication method and device, mobile communication terminal and storage medium Download PDF

Info

Publication number
CN114258022B
CN114258022B CN202111544984.6A CN202111544984A CN114258022B CN 114258022 B CN114258022 B CN 114258022B CN 202111544984 A CN202111544984 A CN 202111544984A CN 114258022 B CN114258022 B CN 114258022B
Authority
CN
China
Prior art keywords
communication terminal
mobile communication
user
geographic position
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111544984.6A
Other languages
Chinese (zh)
Other versions
CN114258022A (en
Inventor
倪凯骏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen One Account Technology Co ltd
Original Assignee
Shenzhen One Account Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen One Account Technology Co ltd filed Critical Shenzhen One Account Technology Co ltd
Priority to CN202111544984.6A priority Critical patent/CN114258022B/en
Publication of CN114258022A publication Critical patent/CN114258022A/en
Application granted granted Critical
Publication of CN114258022B publication Critical patent/CN114258022B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of artificial intelligence, and discloses a user authentication method, a user authentication device, a mobile communication terminal and a storage medium. The method comprises the following steps: when detecting a verification request of a user, displaying data authority inquiry information to the user through a user verification page; after confirming that a user grants inquiry information of using authority to a geographic position for the mobile communication terminal, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal; detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold; if yes, determining that the verification is passed. The embodiment of the invention can more rapidly and accurately verify the user according to the geographic position of the mobile communication terminal, and improve the user experience.

Description

User authentication method and device, mobile communication terminal and storage medium
Technical Field
The embodiment of the invention relates to the technical field of artificial intelligence, in particular to a user authentication method, a user authentication device, a mobile communication terminal and a storage medium.
Background
The mobile communication terminal confirms that the owner user of the mobile communication terminal performs manual operation on the mobile communication terminal by performing user authentication on the user. In the related art, there are generally two types of authentication rules. The first validation rule is: and displaying a picture containing the verification code which can only be identified by human eyes in an operation page of the mobile communication terminal. The owner user inputs the verification code in the operation page and submits the verification code to the mobile communication terminal for verification. The second validation rule is: when receiving a short message verification code request sent by a mobile communication terminal, the server sends a short message verification code to a mobile phone number of a mobile phone owner bound by the mobile communication terminal. After receiving the short message verification code, the owner user inputs the short message verification code in an operation page of the mobile communication terminal, and submits the short message verification code to the server for verification.
The related art has the following drawbacks: in the first verification rule, some pictures contain verification codes which are difficult to identify, users need to repeatedly refresh the pictures, acquire the pictures which are easy to identify for input, cannot conveniently and rapidly complete verification, and easily cause poor experience for the users. In the second verification rule, when the short message sending speed is slow, the user cannot acquire the short message verification code in time, and may repeatedly acquire a large number of short message verification codes, but cannot distinguish which short message verification code is the really useful short message verification code, so that verification cannot be completed conveniently and rapidly, and poor experience is easily caused to the user.
Disclosure of Invention
The embodiment of the invention provides a user authentication method, a user authentication device, a mobile communication terminal and a storage medium, which can more rapidly and accurately perform user authentication according to the geographic position of the mobile communication terminal, reduce the time of user input and waiting in the authentication process and improve the user experience.
In a first aspect, an embodiment of the present invention provides a user authentication method, including:
when detecting a verification request of a user, displaying data authority inquiry information to the user through a user verification page; wherein the data right inquiry information is inquiry information for inquiring whether the user grants a right of use to a geographical location to a mobile communication terminal;
after confirming that the user grants the mobile communication terminal the use permission for the geographic position according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal;
detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold;
And if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold, determining that verification is passed.
In a second aspect, an embodiment of the present invention further provides a user authentication apparatus, including:
the information display module is used for displaying data authority inquiry information to the user through the user verification page when the verification request of the user is detected; wherein the data right inquiry information is inquiry information for inquiring whether the user grants a right of use to a geographical location to a mobile communication terminal;
the position acquisition module is used for acquiring a first geographic position of the mobile communication terminal through the positioning module of the mobile communication terminal after confirming that the user grants the use authority to the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal;
the position detection module is used for detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold;
And the verification passing module is used for determining that the verification passes if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold.
In a third aspect, an embodiment of the present invention further provides a mobile communication terminal, including:
one or more processors;
storage means for storing one or more computer programs;
the user authentication method according to the embodiment of the present invention is implemented when the one or more computer programs are executed by the one or more processors, so that the one or more processors execute the computer programs.
In a fourth aspect, embodiments of the present invention further provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a user authentication method according to embodiments of the present invention.
According to the technical scheme, when the verification request of the user is detected, the data authority inquiry information is displayed to the user through the user verification page; then after confirming that the user grants the use authority to the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal; detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold; if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold, the verification is determined to pass, whether the user of the mobile communication terminal performs manual operation on the mobile communication terminal or not can be verified according to the geographic position of the mobile communication terminal determined by the positioning module of the mobile communication terminal and the geographic position of the mobile communication terminal acquired from an operator system, the user can confirm the grant permission, the user verification can be performed more quickly and accurately according to the geographic position of the mobile communication terminal, the user input and waiting time in the verification process is reduced, and the user experience is improved.
Drawings
Fig. 1 is a flowchart of a user authentication method according to a first embodiment of the present invention.
Fig. 2 is a flowchart of a user authentication method according to a second embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a user authentication device according to a third embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a mobile communication terminal according to a fourth embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting thereof.
It should be further noted that, for convenience of description, only some, but not all of the matters related to the present invention are shown in the accompanying drawings. Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently, or at the same time. Furthermore, the order of the operations may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Example 1
Fig. 1 is a flowchart of a user authentication method according to a first embodiment of the present invention. The embodiment of the invention can be suitable for user authentication of a user, and confirms that the user of the mobile communication terminal is manually operated on the mobile communication terminal. Mobile communication terminals include, but are not limited to, cell phones or smart phones with various application functions, and tablet computers.
As shown in fig. 1, the method in the embodiment of the present invention specifically includes:
step 101, when a verification request of a user is detected, the data authority inquiry information is displayed to the user through a user verification page.
Wherein the data right inquiry information is inquiry information for inquiring whether the user grants a mobile communication terminal a right to use a geographical location.
Alternatively, the authentication request may be some preset operation of the mobile communication terminal by the user to trigger the mobile communication terminal to perform user authentication on the user. The preset operation can be that the user controls the mobile communication terminal to start, the user controls the mobile communication terminal to restart or the user controls the mobile communication terminal to unlock, and can also be that the user accesses an application program or a system in the mobile communication terminal which needs access authority.
Alternatively, the geographic location may be latitude and longitude coordinates.
Optionally, when detecting the authentication request of the user, the mobile communication terminal displays the data authority inquiry information to the user through the user authentication page. The user authentication page is a page for presenting various kinds of information related to the user authentication process to the user.
Optionally, a confirm authorization control and a reject authorization control are set in the user verification page. The user can confirm that the mobile communication terminal is granted the right to use the geographical location by clicking the confirm authorization control. The user can also confirm that the mobile communication terminal is refused to grant the use authority to the geographic position by clicking the refusal authorization control.
Optionally, when the user clicks the confirm authorization control, the mobile communication terminal confirms that the user grants the mobile communication terminal use permission to the geographic location. When the user clicks the refusal authorization control, the mobile communication terminal confirms that the user refuses to grant the use authority of the geographic position to the mobile communication terminal.
Optionally, after the user is presented with the data authority query information through the user verification page, the method further comprises: after confirming that the user refuses to grant the use authority of the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, providing at least one alternative verification rule for the user through the user verification page; wherein the alternative validation rules include, but are not limited to: short message verification rules, picture verification rules and voice verification rules; and according to the interactive operation of the user and the user verification page, confirming the target alternative verification rule selected by the user, and using the target alternative verification rule to verify.
Alternatively, the alternative authentication rules are other user authentication rules provided by the mobile terminal device in case the user refuses to grant the mobile communication terminal access rights to the geographical location. The short message verification rule is a rule for user verification through a short message verification code and can be: when receiving a short message verification code request sent by a mobile communication terminal, a preset server sends a short message verification code to a target mobile phone number bound by the mobile communication terminal. After receiving the short message verification code, the user inputs the short message verification code in a user verification page of the mobile communication terminal, and submits the short message verification code to a preset server for verification. The rule of verifying the picture is a rule of verifying the user through the picture containing the verification code which can only be identified by human eyes, and can be as follows: and displaying a picture containing the verification code which can only be identified by human eyes in a user verification page of the mobile communication terminal. And the user inputs the verification code in the user verification page, and submits the verification code to the mobile communication terminal for verification. The voice verification rule is a rule for user verification through voice broadcasting of a verification code and can be: the mobile communication terminal broadcasts the verification code to the user in a voice broadcasting mode, the user inputs the verification code in the user verification page after obtaining the verification code, and the verification code is submitted to the mobile communication terminal for verification.
Optionally, a selection control corresponding to each alternative verification rule is set in the user verification page. The user can confirm to select a certain alternative verification rule for verification by clicking a selection control corresponding to the alternative verification rule. When a user clicks a selection control corresponding to a certain alternative verification rule, the mobile communication terminal confirms that the alternative verification rule is a target alternative verification rule selected by the user, and uses the target alternative verification rule to verify.
Therefore, the embodiment of the invention can use the alternative verification rule to verify under the condition that the user refuses to use the geographic position of the mobile communication terminal to verify.
Optionally, after the user is presented with the data authority query information through the user verification page, the method further comprises: if the interaction operation of the user and the user verification page is not detected within the preset time period, whether the user grants the use permission to the geographic position to the mobile communication terminal or not cannot be confirmed, and the verification is determined to be failed. The preset duration can be set according to the service requirement. For example, the preset time period is 90 seconds.
Step 102, after confirming that the user grants permission to the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal.
Optionally, the positioning module of the mobile communication terminal is a software module and/or a hardware module, which are arranged inside the mobile communication terminal and are used for acquiring the geographic position of the mobile communication terminal.
Optionally, the obtaining, by the positioning module of the mobile communication terminal, the first geographic location of the mobile communication terminal includes: and acquiring longitude and latitude coordinates of the mobile communication terminal at the current moment by a positioning module of the mobile communication terminal as a first geographic position of the mobile communication terminal.
Optionally, the positioning module of the mobile communication terminal may be a global positioning system (Global Positioning System) positioning module disposed inside the mobile communication terminal, and the longitude and latitude coordinates of the mobile communication terminal at the current moment may be obtained by using a GPS positioning technology as the first geographic location of the mobile communication terminal.
Optionally, the positioning module of the mobile communication terminal may also be a beidou satellite navigation system (BeiDou Navigation Satellite System, BDS) positioning module disposed inside the mobile communication terminal, and the longitude and latitude coordinates of the mobile communication terminal at the current moment may be obtained by using a BDS positioning technology to serve as the first geographic location of the mobile communication terminal.
Optionally, the obtaining, by the positioning module of the mobile communication terminal, the first geographic location of the mobile communication terminal further includes: if the longitude and latitude coordinates of the mobile communication terminal at the current moment are not obtained through the positioning module of the mobile communication terminal within the preset time, determining the estimated longitude and latitude coordinates of the mobile communication terminal at the current moment according to the longitude and latitude coordinates, the moving direction and the moving speed of the mobile communication terminal at the previous moment; and determining the estimated longitude and latitude coordinates as a first geographic position of the mobile communication terminal.
Optionally, the longitude and latitude coordinates of the mobile communication terminal at the previous moment are longitude and latitude coordinates of the mobile communication terminal acquired by the positioning module of the mobile communication terminal at the previous moment. The moving direction and moving speed of the mobile communication terminal are obtained at the previous moment through a speed sensor, a direction sensor or other sensors arranged inside the mobile communication terminal.
Optionally, determining the estimated longitude and latitude coordinates of the mobile communication terminal at the current moment according to the longitude and latitude coordinates, the moving direction and the moving speed of the mobile communication terminal at the previous moment includes: determining the movement displacement of the mobile communication terminal between the previous moment and the current moment according to the movement direction and the movement speed of the mobile communication terminal at the previous moment and the duration between the previous moment and the current moment; and determining the longitude and latitude coordinates of the mobile communication terminal from the previous moment, moving the longitude and latitude coordinates reached after the movement, and determining the reached longitude and latitude coordinates as the estimated longitude and latitude coordinates of the mobile communication terminal at the current moment. The estimated longitude and latitude coordinates are estimated longitude and latitude coordinates of the mobile communication terminal at the current moment according to longitude and latitude coordinates, a moving direction and a moving speed of the mobile communication terminal at the previous moment.
Therefore, in the embodiment of the invention, when the positioning module of the mobile communication terminal does not acquire the longitude and latitude coordinates of the mobile communication terminal at the current moment within the preset time period due to special conditions such as poor signals, the first geographic position of the mobile communication terminal is estimated, and verification is performed according to the estimated first geographic position.
Optionally, the obtaining, from an operator system, the second geographic location of the mobile communication terminal according to the target mobile phone number bound to the mobile communication terminal includes: and acquiring longitude and latitude coordinates of the mobile communication terminal corresponding to the target mobile phone number at the current moment from longitude and latitude coordinates of the mobile communication terminal corresponding to each mobile phone number at different moments stored in an operator system, and taking the longitude and latitude coordinates as a second geographic position of the mobile communication terminal.
Optionally, the target mobile phone number bound to the mobile communication terminal is a mobile phone number of a user of the mobile communication terminal.
Optionally, the mobile communication terminal corresponding to each mobile phone number is a mobile communication terminal where a communication card of each mobile phone number is located. The operator system can collect longitude and latitude coordinates of the mobile communication terminals corresponding to the mobile phone numbers at different moments according to the base station positioning technology, and store the mobile phone numbers and the longitude and latitude coordinates of the mobile communication terminals corresponding to the mobile phone numbers at different moments.
Optionally, the mobile communication terminal queries the mobile phone number which is the same as the target mobile phone number in the mobile phone numbers stored in the operator system; the mobile communication terminal obtains longitude and latitude coordinates of the mobile communication terminal corresponding to the queried mobile phone number at the current moment from longitude and latitude coordinates of the mobile communication terminal corresponding to each mobile phone number at different moments stored in an operator system, and the longitude and latitude coordinates are used as a second geographic position of the mobile communication terminal.
Step 103, detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold.
Optionally, detecting whether the first geographic location is the same as the second geographic location or the distance between the first geographic location and the second geographic location is less than a preset distance threshold includes: detecting whether the first geographic location is the same as the second geographic location; if the first geographic position is different from the second geographic position, determining a distance between the first geographic position and the second geographic position; and detecting whether the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold.
Optionally, the preset distance threshold may be set according to service requirements. For example, the preset distance threshold may be 100 meters.
Step 104, if the first geographic location is the same as the second geographic location or the distance between the first geographic location and the second geographic location is smaller than a preset distance threshold, determining that the verification is passed.
Optionally, in the case that the owner user normally operates the mobile communication terminal, a communication card of a mobile phone number bound to the mobile communication terminal is provided in the mobile communication terminal. The geographical location of the mobile communication terminal, which is determined by the location module of the mobile communication terminal, should be the same as or less than a preset distance threshold from the geographical location of the mobile communication terminal acquired from the operator system. I.e. the first geographical position should be the same as the second geographical position or the distance between the first geographical position and the second geographical position should be smaller than a preset distance threshold.
Optionally, the fact that the distance between the first geographic location and the second geographic location is greater than the preset distance threshold indicates that the communication card corresponding to the mobile phone number bound to the mobile communication terminal may not be set in the mobile communication terminal, the mobile communication terminal may be in abnormal situations such as loss, and the user in operation is not necessarily a owner user of the mobile communication terminal.
Optionally, if the first geographic location is the same as the second geographic location or the distance between the first geographic location and the second geographic location is smaller than a preset distance threshold, the communication card of the mobile phone number bound with the mobile communication terminal is set in the mobile communication terminal, and the mobile communication terminal is normally operated by the owner user at the current moment, and verification is determined to pass.
Optionally, if the first geographic location is different from the second geographic location, and the distance between the first geographic location and the second geographic location is greater than or equal to a preset distance threshold, which indicates that the communication card corresponding to the mobile phone number bound to the mobile communication terminal may not be set in the mobile communication terminal, the mobile communication terminal may be in abnormal situations such as loss, and the user in operation is not necessarily the owner user of the mobile communication terminal, and it is determined that verification is not passed.
Optionally, before the user is presented with the data permission query information through the user verification page, the method further comprises: providing at least two verification rules for a user of a mobile communication terminal through a verification setting page; wherein the validation rules include, but are not limited to: position verification rules, short message verification rules, picture verification rules and voice verification rules; obtaining a scoring value of each verification rule input by the owner user; and sequencing the verification rules according to the high-to-low grading values, and determining the verification rule positioned at the first position of the sequencing result as the verification rule corresponding to the mobile communication terminal.
Optionally, the authentication setting page is a page for setting an authentication rule corresponding to the mobile communication terminal through an interactive operation with the owner user.
Optionally, the location verification rule is a rule for user verification through a geographic location, and may include: when detecting a verification request of a user, displaying data authority inquiry information to the user through a user verification page; wherein the data right inquiry information is inquiry information for inquiring whether the user grants a right of use to a geographical location to a mobile communication terminal; after confirming that the user grants the mobile communication terminal the use permission for the geographic position according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal; detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold; and if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold, determining that verification is passed.
Optionally, a scoring value filling area corresponding to each verification rule is set in the verification setting page. The owner user may fill in the score value filling area corresponding to each verification rule with the score value of each verification rule. The more satisfied the owner user's validation rules, the higher the scoring value. The mobile communication terminal obtains the grading value of each verification rule input by the owner user, sorts the verification rules according to the grading value from high to low, and determines the verification rule positioned at the first position of the sorting result as the verification rule corresponding to the mobile communication terminal, so that when the verification request is detected, the security verification rule corresponding to the mobile communication terminal is used for verification.
Therefore, the embodiment of the invention can set the user authentication rules according to the preference of the user of the machine owner, so that when the authentication request is detected, the user authentication is performed by using the authentication rules set according to the preference of the user of the machine owner.
The embodiment of the invention provides a user verification method, which comprises the steps of displaying data authority inquiry information to a user through a user verification page when a verification request of the user is detected; then after confirming that the user grants the use authority to the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal; detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold; if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold, the verification is determined to pass, whether the user of the mobile communication terminal performs manual operation on the mobile communication terminal or not can be verified according to the geographic position of the mobile communication terminal determined by the positioning module of the mobile communication terminal and the geographic position of the mobile communication terminal acquired from an operator system, the user can confirm the grant permission, the user verification can be performed more quickly and accurately according to the geographic position of the mobile communication terminal, the user input and waiting time in the verification process is reduced, and the user experience is improved.
The embodiment of the invention can acquire and process various information in the user verification process based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like.
Example two
Fig. 2 is a flowchart of a user authentication method according to a second embodiment of the present invention. Embodiments of the invention may be combined with each of the alternatives of one or more of the embodiments described above. As shown in fig. 2, the method in the embodiment of the present invention specifically includes:
step 201, when detecting a verification request of a user, displaying data authority inquiry information to the user through a user verification page.
Wherein the data right inquiry information is inquiry information for inquiring whether the user grants a mobile communication terminal a right to use a geographical location.
Step 202, after confirming that the user grants permission to the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal.
Step 203, detecting whether the first geographic location is the same as the second geographic location or the distance between the first geographic location and the second geographic location is smaller than a preset distance threshold: if the first geographic location is the same as the second geographic location or the distance between the first geographic location and the second geographic location is less than a preset distance threshold, step 204 is performed; if the first geographic location is different from the second geographic location, and the distance between the first geographic location and the second geographic location is greater than or equal to a preset distance threshold, step 205 is performed.
Step 204, determining that the verification is passed.
Step 205, determining that the verification is not passed, and sending alarm information to a preset alarm mobile phone number corresponding to the mobile communication terminal.
Wherein, the alarm information carries the first geographic position of the mobile communication terminal.
Optionally, the alarm information is used to prompt that the communication card corresponding to the mobile phone number bound to the mobile communication terminal may not be set in the mobile communication terminal, the mobile communication terminal may be in abnormal situations such as loss, and the user in operation is not necessarily the owner user of the mobile communication terminal. The preset alarm mobile phone number is a preset mobile phone number capable of receiving alarm information of the mobile communication terminal. The mobile communication terminal determines that verification is not passed, and sends alarm information to a preset alarm mobile phone number corresponding to the mobile communication terminal, so that the possibility of back-up after the mobile communication terminal is lost is increased.
The embodiment of the invention provides a user verification method, which can verify whether a user of a mobile communication terminal performs manual operation on the mobile communication terminal according to the geographic position of the mobile communication terminal determined by a positioning module of the mobile communication terminal and the geographic position of the mobile communication terminal acquired from an operator system, and can ensure that the user can confirm the grant authority, so that the user verification can be performed more quickly and accurately according to the geographic position of the mobile communication terminal, the user input and waiting time in the verification process is reduced, the user experience is improved, and alarm information can be sent to a preset alarm mobile phone number corresponding to the mobile communication terminal under the condition that the verification is not passed, thereby increasing the possibility of the mobile communication terminal returning after losing.
Example III
Fig. 3 is a schematic structural diagram of a user authentication device according to a third embodiment of the present invention. As shown in fig. 3, the apparatus includes: an information presentation module 301, a location acquisition module 302, a location detection module 303, and a verification pass module 304.
The information display module 301 is configured to display, when detecting a verification request of a user, data permission query information to the user through a user verification page; wherein the data right inquiry information is inquiry information for inquiring whether the user grants a right of use to a geographical location to a mobile communication terminal; a location obtaining module 302, configured to obtain, through a location module of the mobile communication terminal, a first geographic location of the mobile communication terminal after confirming that the user grants permission to use the geographic location to the mobile communication terminal according to an interaction operation between the user and the user verification page, and obtain, from an operator system, a second geographic location of the mobile communication terminal according to a target mobile phone number bound to the mobile communication terminal; a position detection module 303, configured to detect whether the first geographic position is the same as the second geographic position or a distance between the first geographic position and the second geographic position is less than a preset distance threshold; and the verification passing module 304 is configured to determine that the verification passes if the first geographic location is the same as the second geographic location or the distance between the first geographic location and the second geographic location is less than a preset distance threshold.
The embodiment of the invention provides a user verification device, which displays data authority inquiry information to a user through a user verification page when a verification request of the user is detected; then after confirming that the user grants the use authority to the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal; detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold; if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold, the verification is determined to pass, whether the user of the mobile communication terminal performs manual operation on the mobile communication terminal or not can be verified according to the geographic position of the mobile communication terminal determined by the positioning module of the mobile communication terminal and the geographic position of the mobile communication terminal acquired from an operator system, the user can confirm the grant permission, the user verification can be performed more quickly and accurately according to the geographic position of the mobile communication terminal, the user input and waiting time in the verification process is reduced, and the user experience is improved.
In an optional implementation manner of the embodiment of the present invention, optionally, when the location obtaining module 302 performs an operation of obtaining, by using the positioning module of the mobile communication terminal, a first geographic location of the mobile communication terminal, the location obtaining module is specifically configured to: and acquiring longitude and latitude coordinates of the mobile communication terminal at the current moment by a positioning module of the mobile communication terminal as a first geographic position of the mobile communication terminal.
In an optional implementation manner of the embodiment of the present invention, optionally, when executing the operation of acquiring, by the positioning module of the mobile communication terminal, the first geographic location of the mobile communication terminal, the location acquisition module 302 is further configured to: if the longitude and latitude coordinates of the mobile communication terminal at the current moment are not obtained through the positioning module of the mobile communication terminal within the preset time, determining the estimated longitude and latitude coordinates of the mobile communication terminal at the current moment according to the longitude and latitude coordinates, the moving direction and the moving speed of the mobile communication terminal at the previous moment; and determining the estimated longitude and latitude coordinates as a first geographic position of the mobile communication terminal.
In an optional implementation manner of the embodiment of the present invention, optionally, when performing the operation of acquiring the second geographic location of the mobile communication terminal from the operator system according to the target mobile phone number bound to the mobile communication terminal, the location acquisition module 302 is further configured to: and acquiring longitude and latitude coordinates of the mobile communication terminal corresponding to the target mobile phone number at the current moment from longitude and latitude coordinates of the mobile communication terminal corresponding to each mobile phone number at different moments stored in an operator system, and taking the longitude and latitude coordinates as a second geographic position of the mobile communication terminal.
In an optional implementation manner of the embodiment of the present invention, optionally, the user authentication device further includes: the alternative verification rule determining module is used for providing at least one alternative verification rule for the user through the user verification page after confirming that the user refuses to grant the use authority of the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page; wherein the alternative validation rules include, but are not limited to: short message verification rules, picture verification rules and voice verification rules; and the alternative verification rule using module is used for confirming the target alternative verification rule selected by the user according to the interaction operation of the user and the user verification page, and verifying by using the target alternative verification rule.
In an optional implementation manner of the embodiment of the present invention, optionally, the user authentication device further includes: the rule providing module is used for providing at least two verification rules for a user of a mobile communication terminal through the verification setting page; wherein the validation rules include, but are not limited to: position verification rules, short message verification rules, picture verification rules and voice verification rules; the rule scoring value acquisition module is used for acquiring the scoring value of each verification rule input by the owner user; and the rule determining module is used for sequencing the verification rules according to the score value from high to low, and determining the verification rule positioned at the first position of the sequencing result as the verification rule corresponding to the mobile communication terminal.
In an optional implementation manner of the embodiment of the present invention, optionally, the user authentication device further includes: the alarm information sending module is used for determining that verification is not passed if the first geographic position is different from the second geographic position and the distance between the first geographic position and the second geographic position is greater than or equal to a preset distance threshold, and sending alarm information to a preset alarm mobile phone number corresponding to the mobile communication terminal; wherein, the alarm information carries the first geographic position of the mobile communication terminal.
The specific manner in which the modules perform the operations in the apparatus of the above embodiments has been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The user verification device can execute the user verification method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the user verification method.
Example IV
Fig. 4 is a schematic structural diagram of a mobile communication terminal according to a fourth embodiment of the present invention. Fig. 4 shows a block diagram of an exemplary mobile communication terminal 12 suitable for implementing embodiments of the present invention.
The mobile communication terminal 12 shown in fig. 4 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the present invention.
As shown in fig. 4, the mobile communication terminal 12 is embodied in the form of a general purpose computing device. The components of the mobile communication terminal 12 may include, but are not limited to: one or more processors 16, a memory 28, and a bus 18 connecting the different business system components, including the memory 28 and the processors 16.
Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, micro channel architecture (MAC) bus, enhanced ISA bus, video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The mobile communication terminal 12 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by mobile communication terminal 12 and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache memory 32. The mobile communication terminal 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, commonly referred to as a "hard disk drive"). Although not shown in fig. 4, a magnetic disk drive for reading from and writing to a removable non-volatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable non-volatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be coupled to bus 18 through one or more data medium interfaces. Memory 28 may include at least one program device having a set (e.g., at least one) of program modules configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored in, for example, memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules 42 generally perform the functions and/or methods of the embodiments described herein.
The mobile communication terminal 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), one or more devices that enable a user to interact with the mobile communication terminal 12, and/or any devices (e.g., network card, modem, etc.) that enable the mobile communication terminal 12 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 22. Also, the mobile communication terminal 12 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet, through the network adapter 20. As shown, the network adapter 20 communicates with other modules of the mobile communication terminal 12 via the bus 18. It should be appreciated that although not shown in fig. 4, other hardware and/or software modules may be used in connection with the mobile communication terminal 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
The processor 16 executes programs stored in the memory 28 to perform various functional applications and data processing, implementing the user authentication method provided by the embodiment of the present invention: when detecting a verification request of a user, displaying data authority inquiry information to the user through a user verification page; wherein the data right inquiry information is inquiry information for inquiring whether the user grants a right of use to a geographical location to a mobile communication terminal; after confirming that the user grants the mobile communication terminal the use permission for the geographic position according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal; detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold; and if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold, determining that verification is passed.
Example five
A fifth embodiment of the present invention provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the user authentication method provided by the embodiment of the present invention: when detecting a verification request of a user, displaying data authority inquiry information to the user through a user verification page; wherein the data right inquiry information is inquiry information for inquiring whether the user grants a right of use to a geographical location to a mobile communication terminal; after confirming that the user grants the mobile communication terminal the use permission for the geographic position according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal; detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold; and if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold, determining that verification is passed.
Any combination of one or more computer readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present invention may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, while the invention has been described in connection with the above embodiments, the invention is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the invention, which is set forth in the following claims.

Claims (10)

1. A user authentication method, applied to a mobile communication terminal, comprising:
when detecting a verification request of a user, displaying data authority inquiry information to the user through a user verification page; wherein the data right inquiry information is inquiry information for inquiring whether the user grants a right of use to a geographical location to a mobile communication terminal;
after confirming that the user grants the mobile communication terminal the use permission for the geographic position according to the interactive operation of the user and the user verification page, acquiring a first geographic position of the mobile communication terminal through a positioning module of the mobile communication terminal, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal;
detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold;
and if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold, determining that verification is passed.
2. The method according to claim 1, wherein the obtaining, by the positioning module of the mobile communication terminal, the first geographic location of the mobile communication terminal comprises:
and acquiring longitude and latitude coordinates of the mobile communication terminal at the current moment by a positioning module of the mobile communication terminal as a first geographic position of the mobile communication terminal.
3. The method according to claim 2, wherein the obtaining, by the positioning module of the mobile communication terminal, the first geographic location of the mobile communication terminal further comprises:
if the longitude and latitude coordinates of the mobile communication terminal at the current moment are not obtained through the positioning module of the mobile communication terminal within the preset time, determining the estimated longitude and latitude coordinates of the mobile communication terminal at the current moment according to the longitude and latitude coordinates, the moving direction and the moving speed of the mobile communication terminal at the previous moment;
and determining the estimated longitude and latitude coordinates as a first geographic position of the mobile communication terminal.
4. The method according to claim 1, wherein the obtaining the second geographic location of the mobile communication terminal from the carrier system according to the target cell phone number bound to the mobile communication terminal comprises:
And acquiring longitude and latitude coordinates of the mobile communication terminal corresponding to the target mobile phone number at the current moment from longitude and latitude coordinates of the mobile communication terminal corresponding to each mobile phone number at different moments stored in an operator system, and taking the longitude and latitude coordinates as a second geographic position of the mobile communication terminal.
5. The method of claim 1, further comprising, after presenting the data rights inquiry information to the user through the user authentication page:
after confirming that the user refuses to grant the use authority of the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, providing at least one alternative verification rule for the user through the user verification page; wherein the alternative validation rules include, but are not limited to: short message verification rules, picture verification rules and voice verification rules;
and according to the interactive operation of the user and the user verification page, confirming the target alternative verification rule selected by the user, and using the target alternative verification rule to verify.
6. The method of claim 1, further comprising, prior to presenting the data rights query to the user via the user authentication page:
Providing at least two verification rules for a user of a mobile communication terminal through a verification setting page; wherein the validation rules include, but are not limited to: position verification rules, short message verification rules, picture verification rules and voice verification rules;
obtaining a scoring value of each verification rule input by the owner user;
and sequencing the verification rules according to the high-to-low grading values, and determining the verification rule positioned at the first position of the sequencing result as the verification rule corresponding to the mobile communication terminal.
7. The method of claim 1, further comprising, after detecting whether the first geographic location is the same as the second geographic location or a distance between the first geographic location and the second geographic location is less than a preset distance threshold:
if the first geographic position is different from the second geographic position and the distance between the first geographic position and the second geographic position is larger than or equal to a preset distance threshold, determining that verification is not passed, and sending alarm information to a preset alarm mobile phone number corresponding to the mobile communication terminal; wherein, the alarm information carries the first geographic position of the mobile communication terminal.
8. A user authentication apparatus, applied to a mobile communication terminal, comprising:
the information display module is used for displaying data authority inquiry information to the user through the user verification page when the verification request of the user is detected; wherein the data right inquiry information is inquiry information for inquiring whether the user grants a right of use to a geographical location to a mobile communication terminal;
the position acquisition module is used for acquiring a first geographic position of the mobile communication terminal through the positioning module of the mobile communication terminal after confirming that the user grants the use authority to the geographic position to the mobile communication terminal according to the interactive operation of the user and the user verification page, and acquiring a second geographic position of the mobile communication terminal from an operator system according to a target mobile phone number bound with the mobile communication terminal;
the position detection module is used for detecting whether the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold;
and the verification passing module is used for determining that the verification passes if the first geographic position is the same as the second geographic position or the distance between the first geographic position and the second geographic position is smaller than a preset distance threshold.
9. A mobile communication terminal, the mobile communication terminal comprising:
one or more processors;
storage means for storing one or more computer programs;
the user authentication method according to any one of claims 1-7 when the one or more computer programs are executed by the one or more processors, such that the one or more processors execute the computer programs.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements a user authentication method according to any one of claims 1-7.
CN202111544984.6A 2021-12-16 2021-12-16 User authentication method and device, mobile communication terminal and storage medium Active CN114258022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111544984.6A CN114258022B (en) 2021-12-16 2021-12-16 User authentication method and device, mobile communication terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111544984.6A CN114258022B (en) 2021-12-16 2021-12-16 User authentication method and device, mobile communication terminal and storage medium

Publications (2)

Publication Number Publication Date
CN114258022A CN114258022A (en) 2022-03-29
CN114258022B true CN114258022B (en) 2023-05-12

Family

ID=80795351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111544984.6A Active CN114258022B (en) 2021-12-16 2021-12-16 User authentication method and device, mobile communication terminal and storage medium

Country Status (1)

Country Link
CN (1) CN114258022B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103874065A (en) * 2012-12-17 2014-06-18 ***通信集团上海有限公司 Method and device for judging user position abnormity
CN105825377A (en) * 2015-12-22 2016-08-03 广东亿迅科技有限公司 Secure payment verification method, payment verification device, server and system
CN107295073A (en) * 2017-06-13 2017-10-24 腾讯科技(深圳)有限公司 A kind of localization method, positioner and storage medium
CN109194688A (en) * 2018-10-19 2019-01-11 河北中移信诺科技信息有限公司 Community correction personal identity authentication system and method based on hybrid positioning technology
CN109993518A (en) * 2017-12-29 2019-07-09 上海方付通商务服务有限公司 Authentication method and Verification System
CN111582868A (en) * 2020-05-26 2020-08-25 支付宝(杭州)信息技术有限公司 Transaction request processing method, device and equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101835143A (en) * 2010-05-05 2010-09-15 中兴通讯股份有限公司 Mobile terminal location system and method, and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103874065A (en) * 2012-12-17 2014-06-18 ***通信集团上海有限公司 Method and device for judging user position abnormity
CN105825377A (en) * 2015-12-22 2016-08-03 广东亿迅科技有限公司 Secure payment verification method, payment verification device, server and system
CN107295073A (en) * 2017-06-13 2017-10-24 腾讯科技(深圳)有限公司 A kind of localization method, positioner and storage medium
CN109993518A (en) * 2017-12-29 2019-07-09 上海方付通商务服务有限公司 Authentication method and Verification System
CN109194688A (en) * 2018-10-19 2019-01-11 河北中移信诺科技信息有限公司 Community correction personal identity authentication system and method based on hybrid positioning technology
CN111582868A (en) * 2020-05-26 2020-08-25 支付宝(杭州)信息技术有限公司 Transaction request processing method, device and equipment

Also Published As

Publication number Publication date
CN114258022A (en) 2022-03-29

Similar Documents

Publication Publication Date Title
CN107450088B (en) Location-based service LBS augmented reality positioning method and device
CN106959690B (en) Method, device and equipment for searching unmanned vehicle and storage medium
CN107798110A (en) Point of interest address checking method, device, server and storage medium
CN106130998A (en) A kind of identifying code transmission method and device
CN107948274B (en) Transaction authentication method and system, server, and storage medium
CN111507439A (en) User information checking method and system based on information code
CN111401228A (en) Video target labeling method and device and electronic equipment
CN104951933A (en) Security payment method and mobile terminal
CN110413522A (en) A kind of determination method, apparatus, storage medium and the electronic equipment of test database
CN110110236B (en) Information pushing method, device, equipment and storage medium
CN111241043A (en) Multimedia file sharing method, terminal and storage medium
CN108804897B (en) Screen control method and device, computer equipment and storage medium
CN113961836A (en) Page jump method and device, electronic equipment and storage medium
CN114258022B (en) User authentication method and device, mobile communication terminal and storage medium
CN109446433B (en) Method, device, server and storage medium for verifying failure of interest point
CN115808929B (en) Vehicle simulation obstacle avoidance method and device, electronic equipment and computer readable medium
CN109270566B (en) Navigation method, navigation effect testing method, device, equipment and medium
US20200314110A1 (en) Data transmission method, apparatus, terminal device, and medium
CN114660640A (en) Vehicle positioning method, device and equipment
CN114185805A (en) Embedded point verification method, device, equipment and storage medium
CN113656301A (en) Interface testing method, device, equipment and storage medium
CN113947947A (en) Vehicle collision early warning method and device, electronic equipment and storage medium
CN106254955A (en) A kind of method and device showing review information
JP2022003327A (en) Method, device, electronic device, computer readable storage medium, and computer program for positioning terminal
CN112685072A (en) Method, device, equipment and storage medium for generating communication address knowledge base

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant