[0049] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.
[0050] The implementation of the present invention will be described in detail below in conjunction with specific embodiments.
[0051] Reference Figure 1~7 , Is a preferred embodiment provided by the present invention.
[0052] Such as figure 1 As shown, the mobile terminal operation method based on security verification provided in this embodiment includes the following steps:
[0053] S1. The server obtains the content of the user's dial-up service operation;
[0054] S2. Perform security verification on the user's information and determine whether the user's information is true;
[0055] S3. If the user's information is true, perform corresponding business operations;
[0056] S4. If the user's information is not true, it will be dealt with if it is not true.
[0057] For the above step S1, the server obtains the content of the user's dial-up service operation. The service operation here includes payment service, securities account opening service, and auto insurance filling service.
[0058] Of course, in other embodiments, the above-mentioned service operations may also be services that can be completed autonomously on the mobile terminal, such as ID card reissue.
[0059] For the above step S2, in the step of performing security verification on the user's information and judging whether the user's information is true, the user's information needs to be obtained, and the following two methods can be used:
[0060] The first type: the app on the user terminal cooperates with the server, that is, the SIM card number is obtained through the user terminal, and the mobile phone number is bound;
[0061] The second type: network side access, such as Figure 7 As shown, the IMSI of the user is obtained through the A interface, and the correspondence between the IMSI and the MSISDN is obtained by combining the signaling of the C interface;
[0062] However, the above is only to obtain the binding relationship between the user's mobile phone number and the device terminal. In the subsequent operation process, it is still necessary to correspond to the individual person, that is, person --> Mobile phone--> The corresponding relationship of the equipment generates the safety authentication relationship of the person; the corresponding relationship between the individual biological characteristics of the person and the mobile phone can be completed during the phone call:
[0063] 1). Face recognition, using image upload, the disadvantage is imitable;
[0064] 2). Fingerprint recognition, data collection, the shortcomings are imitable;
[0065] 3). Voiceprint recognition, voice data upload, the disadvantage is imitation, the advantage is that it can be dynamically switched.
[0066] In summary, in the correspondence between people and mobile phones, the voiceprint recognition method is adopted to form a logical relationship. For example, the system saves the user's voiceprint data from 0 to 9 for backup.
[0067] The real-time verification corresponding to the above-mentioned information acquisition method, users need to handle business operations, such as securities account opening, in addition to using the above mobile phones -> In addition to obtaining user information for the corresponding relationship of the device, a secondary verification of the person is added, such as letting the person read the random number 3891, and then the system identifies whether the person corresponds to the person to prevent security breaches.
[0068] Furthermore, in the above step S2, the step of performing security verification on the user's information and judging whether the user's information is true includes the following specific steps:
[0069] S21: Send the user's mobile terminal SIM card number and phone number to the server;
[0070] S22. The server calls internal associated information for verification;
[0071] S23: Determine whether the SIM card number and the phone number can be associated and matched;
[0072] S24. If the SIM card number and the phone number can be correlated and matched, the user's information is true;
[0073] S25. Or, if the SIM card number and the phone number cannot be associated and matched, the user's information is not true.
[0074] The above S2 step is to verify the authenticity of the user's information to avoid the formation of loopholes and the occurrence of illegal things.
[0075] Specifically, in the above step S21, the user's mobile terminal SIM card number and phone number are sent to the server. The server here specifically refers to the telecommunication server. The telecommunication server generally stores the SIM card number of each mobile terminal and its association For the phone number, the association between the SIM card number and the phone number is unique, that is, a SIM card number is only associated with one phone number.
[0076] The telecommunication server obtains the relevant SIM card number and the phone number associated with it, mainly through the communication network (short message center, USSD, business website, voice platform, etc.) of the communication operator. In addition, you can also use the fixed communication network (including NGN) signaling network, 2G mobile communication network (GSM/CDMA) signaling network, and 3G mobile communication network (TD-CDMA) signaling network to collect.
[0077] The signaling involved in this process includes SS7, SIGTRAN, ISDN, SIP, and H.323 signaling.
[0078] In addition, in step S22, the server invokes internal associated information for verification, where the internal associated information is the SIM card number of each mobile terminal and the phone number associated with it stored in the aforementioned telecommunication server.
[0079] Furthermore, for step S3, since the business operations include payment services, securities account opening services, and auto insurance filling, there are three processing steps corresponding to step S3, as follows:
[0080] The first type: when the business operation is a payment business, in the S3 step, if the user's information is true, perform the corresponding business operation steps, including the following specific steps:
[0081] S31. The user initiates a payment application to the other party;
[0082] S32. The server verifies the other party's information and judges whether the other party's information is true;
[0083] S33. If the information of the other party is true, the server allows the payment application initiated by the user, and the other party charges the user's payment amount;
[0084] S34. If the information of the other party is not true, the server blocks the payment application initiated by the user, and at the same time sends a notification message to inform the user.
[0085] In the above step S32, the server verifies the information of the other party and determines whether the information of the other party is true, specifically according to the steps S21, S22, and S23 described above.
[0086] The security verification of the information of both parties can improve the security of payment and avoid the occurrence of information security loopholes in one party that may cause deception or illegal behavior.
[0087] The second type: when the business operation is a securities account opening business, if the user's information is true, then the corresponding business operation steps include the following specific steps:
[0088] S35. The securities company obtains user information;
[0089] S36. Fill in the user's information correspondingly and perform an account opening operation;
[0090] S37. Feed back the account information to the user.
[0091] The security verification of the user's information here is mainly to inspect the user's creditworthiness and other issues.
[0092] In addition, in step S37, the step of feeding back account information to the user, the account information here generally includes information such as a regular account number and an account opening bank, and may also include the authenticity of the server's verification of the user's information.
[0093] The third type: when the business operation is the auto insurance form filling business, if the user's information is true, the corresponding business operation steps include the following specific steps:
[0094] S38. The auto insurance company obtains the current location of the user and the current condition of the car;
[0095] S39. The server recommends the 4S repair shop closest to the current location to the user;
[0096] S40. The user clicks on the address sent by the server to navigate and perform maintenance.
[0097] The corresponding business operations here are generally in the process of operations such as a car accident or the need to report car insurance for maintenance.
[0098] Specifically, in the above step S38, the auto insurance company obtains the current location of the user and the current condition of the car, here is to let the auto insurance company know exactly the extent of damage to the current user's vehicle, so as to feed back the user's claim amount.
[0099] In step S39, the server recommends the step of the 4S repair shop closest to the current location to the user, specifically for improving the user's experience, shortening the user's repair time, and reducing the time to find a repair shop.
[0100] Furthermore, no matter which of the above-mentioned business operations, in step S4, if the user's information is not true, then the step of handling the false situation, specifically sending the false situation to the alarm center. The false information includes the user’s forged evidence and the user’s real information.
[0101] In the above-mentioned mobile terminal operation method based on security verification, the user uses the mobile terminal to perform business operations when dialing to perform business operations, to perform security verification on the user's information, and perform corresponding operations based on the verification results, so as to realize the combination of business information Security verification, through security verification, you can enter the business management operation, avoid the formation of loopholes, reduce the proliferation of false information and reduce the probability of illegal matters.
[0102] Such as Image 6 Shown is the mobile terminal operating system based on security verification provided by this embodiment, which is characterized by including a dialing unit 10, a verification unit, a service operation unit, and a processing unit 60;
[0103] The dialing unit 10 is used by the server to obtain the content of the service operation performed by the user dialing, and connect with the verification unit;
[0104] The verification unit is configured to perform security verification on the user's information, determine whether the user's information is true, and respectively connect with the business operation unit and the processing unit 60;
[0105] The business operation unit is used to perform corresponding business operations;
[0106] The processing unit 60 is used for processing untrue situations.
[0107] Furthermore, the verification unit includes a sending module 20, an associated verification module 21, and a judgment matching module 22;
[0108] The sending module 20 is used to send the SIM card number and phone number of the user's mobile terminal to the server to connect to the dialing unit 10;
[0109] The correlation verification module 21 is used for the server to call internal correlation information for verification, and is connected to the judgment matching module 22;
[0110] The judgment matching module 22 is used to judge whether the SIM card number and the phone number can be associated and matched, and are respectively connected to the service operation unit and the processing unit 60.
[0111] In the above-mentioned mobile terminal operating system based on security verification, the dialing unit 10 allows the user to use the mobile terminal to perform business operations when dialing for business operations. The verification unit performs security verification on the user’s information, and the business operation unit and the processing unit 60 Perform corresponding operations based on the verification results to achieve security verification combined with business information. After security verification, you can enter business processing operations to avoid the formation of loopholes, reduce the proliferation of false information and reduce the probability of illegal matters.
[0112] In addition, since the business operations include payment business, securities account opening business, and auto insurance filling out three businesses, when the business operation is a payment business, the business operation unit includes a payment application module 30, a counterparty information judgment module 31, and a payment processing module. 32;
[0113] The payment application module 30 is used for the user to initiate a payment application to the counterparty, and respectively connect with the counterparty information judgment module 31 and the judgment matching module 22;
[0114] The counterparty information judgment module 31 is used for the server to verify the counterparty's information, determine whether the counterparty's information is true, and connect with the payment processing module 32;
[0115] The payment processing module 32 is used for the server to allow the payment application initiated by the user, the other party collects the payment amount of the user or the server prevents the payment application initiated by the user, and at the same time sends notification information to notify the user.
[0116] When the business operation is a securities account opening business, the business operation unit includes an acquisition module 40, an account opening module 41, and a feedback module 42;
[0117] The obtaining module 40 is used for the securities company to obtain user information, and is respectively connected with the account opening module 41 and the judgment matching module 22;
[0118] The account opening module 41 is used to fill in the user's information and perform account opening operations, and is connected to the feedback module 42;
[0119] The feedback module 42 is used to feed back account information to the user.
[0120] When the business operation is the auto insurance form filling business, the business operation unit includes an address acquisition module 50, a recommended address module 51, and a navigation module 52;
[0121] The address obtaining module 50 is used by the auto insurance company to obtain the current location of the user and the current condition of the car, and is connected to the recommended address module 51 and the matching judgment module 22;
[0122] Recommend address module 51, the server recommends the 4S repair shop closest to the current location to the user for connection with the navigation module 52;
[0123] The navigation module 52 is used for the user to click the address sent by the server to navigate and perform maintenance.
[0124] The above are only the preferred embodiments of the present invention and are not intended to limit the present invention. Any modification, equivalent replacement and improvement made within the spirit and principle of the present invention shall be included in the protection of the present invention. Within range.