Safe region recognition method and device, and user terminal

A technology for user terminals and security areas, which is applied in the field of identification equipment, user terminals, and security area identification methods. It can solve the problems of increasing user operation complexity, time limit, and keeping the power on, so as to reduce the chance of password leakage or being deciphered. Prevent and be deciphered, enhance the effect of user experience

Inactive Publication Date: 2014-06-18
YINLIAN FINANCIAL INFORMATION SERVICE BEIJING CO LTD
View PDF5 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the direct result of this is that every transaction requires the customer to request a verification code and enter the verification code to trade, and the time for entering the verification code is also limited, and it will become invalid when it expires, which increases the cumbersomeness of user operations. At the same time, the user's mobile phone must be kept Power on and cannot be in arrears;
[0006] 3. Reminders for large consumption amounts. Some financial institutions will send SMS reminders to consumers for each purchase, telling consumers the transaction amount and transaction location. If there is any transaction abnormality, consumers will take the initiative to call the police or perform other operations. However, this setting is still unable to avoid fraudulent brushing after the occurrence of fraudulent brushing, and cannot increase the security of mobile payment;
However, this kind of security reply technology is not suitable for the field of mobile security because of its large calculation and storage overhead, and its real-time performance is not strong.
[0010] To sum up, the security measures for mobile applications of user terminals in the prior art are not perfect enough, either the security effect is poor, or the operation is too complicated, which affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe region recognition method and device, and user terminal
  • Safe region recognition method and device, and user terminal
  • Safe region recognition method and device, and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Such as figure 1 As shown, an embodiment of the present invention provides a security area identification method, wherein the method includes:

[0048] 101. Acquire first location parameter information of the user terminal, and set a security area threshold condition of the user terminal according to the first location parameter information;

[0049] Wherein, the first location parameter information is the location parameter information of the user terminal in the security area. Specifically, when the user terminal needs to set the current area as a security area, the user terminal reports the location parameter information of the current area to the server, and the location of the current area The information is the first location parameter information of the user terminal.

[0050] 103. Acquire second location parameter information of the user terminal, and when the second location parameter information of the user terminal satisfies the safety area threshold conditi...

Embodiment 2

[0088] as attached figure 2 As shown, the embodiment of the present invention also provides a method for identifying a security area. In this embodiment, the mobile application service takes the online payment service as an example, and the location coordinate information of the user terminal is described by taking the GNSS information of the user terminal as an example. The method includes:

[0089] 200. When it is necessary to set the trusted area as a safe area, if it is necessary to set the office, home and other places as a safe area, the user terminal can process online payment business in this safe area, and can pay directly without password or dynamic password.

[0090] 201. The user terminal starts an operation of setting a security area, for example, sends a request message to a server, and starts a program for setting a security area.

[0091] Wherein, in this step, the server or other third-party equipment may also initiate the setting procedure of the security z...

Embodiment 3

[0101] Refer to attached image 3 , the embodiment of the present invention also provides a safe area identification method. In this embodiment, the mobile application business takes the online payment service as an example, and the location coordinate information of the user terminal is described by taking the GNSS information of the user terminal as an example. The method include:

[0102] 300. Set home and office as safe areas respectively, and the corresponding safe area threshold conditions are S1 and S2 respectively,

[0103] 301. When the user terminal calls the online payment service in the office, the server obtains the location parameter information of the user terminal in the office, and compares the obtained location parameter information with the stored security area threshold condition, specifically:

[0104] 3011. The server finds, according to the obtained location parameter information, that the GNSS information contained in the location parameter information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a safe region recognition method and device, and a user terminal. The method includes the steps of firstly, obtaining first position parameter information of the user terminal, and setting the safe region threshold value condition of the user terminal according to the first position parameter information; secondly, obtaining second position parameter information of the user terminal, and when the second position parameter information of the user terminal meets the safe region threshold value condition, determining that the user terminal is located in a safe region, wherein the first position parameter information and the second position parameter information respectively include at least one of position coordinate information, access base station information, access wireless hot point information, Bluetooth beacon information and RFID information of the user terminal. According to the safe region recognition method and device, and the user terminal, the safe region can be set for the user terminal, and the user terminal can rapidly and conveniently execute mobile application services in the safe region.

Description

technical field [0001] The present invention relates to the field of mobile Internet, in particular to a security area identification method, identification equipment and a user terminal. Background technique [0002] With the rapid development of the mobile Internet, for example, the current 3G and 4G networks have covered most areas, and the popularity of smart terminals is getting higher and higher. More and more people use smart terminals to handle daily mobile application services, such as Office, shopping, remittance, payment of public utilities, etc. Among them, the fastest-growing online payment business brought by online shopping, such as WeChat payment, mobile phone Taobao, etc. [0003] The use of smart terminals for mobile applications, such as online payment services, is convenient and fast, but security has always attracted attention. Not only users are concerned about the security of mobile payments, but operators, banks, and merchants are also very concerned...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/02H04W12/06
Inventor 程明强张佳益耿志贤孙大勇
Owner YINLIAN FINANCIAL INFORMATION SERVICE BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products