Account information acquisition method for WeChat members

A technology of account information and collection method, which is applied in the directions of multiplexing communication, record carrier used by machines, user identity/authority verification, etc., can solve problems such as legality verification of difficult-to-scan parties, and achieve the effect of avoiding verification failures

Inactive Publication Date: 2018-02-06
知而行(上海)企业发展有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although some unilateral communication is also provided, this kind of communication is mostly used in the scenario where some client (benefit payer) acts as the scanner,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Account information acquisition method for WeChat members

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0031] A method for collecting account information for WeChat members, by adding a verification character string in a two-dimensional code pattern, can provide security verification under the condition that there is only a data connection between the collection terminal and the verification server.

[0032] Such as figure 1 shown, including:

[0033] Step S1: The acquisition terminal scans the QR code pattern displayed on the user terminal, and records the scanned time stamp information;

[0034] The authentication string is generated according to a function based on the generation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an account information acquisition method for WeChat members. The method comprises steps that step S1, a two-dimensional code pattern displayed on a user terminal MT is scanned by an acquisition terminal, and the scanning time stamp information is further recorded; step S2, a user identifier code and a verification string are acquired through analysis by the acquisition terminal according to the two-dimensional code pattern; step S3, the user identifier code and the verification string are sent by the acquisition terminal to a verification server; and step S4, authorization validity of a user for the two-dimensional code pattern is verified by the verification server according to the verification string and the scanning time stamp information, if authorization is verified to be valid, a corresponding member account is acquired according to the user identifier code and is sent to the acquisition terminal. Compared with the prior art, the method is advantaged inthat through adding the verification string to the two-dimensional code pattern, safety verification can be provided on the condition that data connection only exists between the acquisition terminaland the verification server.

Description

technical field [0001] The present invention relates to an account acquisition technology, in particular to an account information acquisition method for WeChat member communication. Background technique [0002] With the evolution of Internet technology, two-dimensional codes are now playing a huge role, whether the user terminal is used as a displayer or a scanner of the two-dimensional code pattern. [0003] However, the current two-dimensional code verification technology generally requires two terminals to be connected to the Internet at the same time, such as scanning code login technology, both the target login terminal and the authorization terminal need to connect to the verification server, and the verification server will send the two-dimensional code pattern data to the target login terminal so that it can be displayed, and the authentication server will also accept the request data sent by the authorizer. [0004] Although some unilateral communication is also ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08G06K7/14G06K19/06H04J3/06
CPCG06K7/1417G06K19/06037H04J3/0638H04L9/0872H04L9/3297H04L63/08
Inventor 尹晓峰
Owner 知而行(上海)企业发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products