Verification method, device and equipment

A verification method and mobile device technology, applied in the computer field, can solve problems such as fund loss, OTP timeout failure, poor mobile phone signal, etc., and achieve the effect of increasing the verification success rate, eliminating the need for manual participation, and reducing verification failures

Active Publication Date: 2020-06-16
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In less developed countries, on the one hand, due to the low education level of users, they do not understand or know how to use OTP, and users cannot even read the text contained in OTP. If OTP is used for verification, a large number of USSD users will be deceived and leaked OTP, the thief logs in to the A

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, device and equipment
  • Verification method, device and equipment
  • Verification method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] In order to enable those skilled in the art to better understand the technical solutions in this specification, the following will clearly and completely describe the technical solutions in the embodiments of this specification in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments of this specification, all other embodiments obtained by those of ordinary skill in the art without creative work should fall within the protection scope of this application.

[0032] In underdeveloped areas, the migration of USSD users to e-wallet APP users requires user verification. In risk control scenarios, e-wallet APP users often need to pass OTP verification to achieve user verification. OTP refers to a password that can only be used once. The password is based on a special algorithm that generates an unpred...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a verification method, device and equipment. The method comprises the steps that when a client APP needs to be verified, mobile equipment where a mobile number bound with the client APP is located automatically receives information of an OTP character string code sent based on an exclusive number; the client APP automatically reads the information of the OTP character string code on the mobile equipment where the client APP is located to obtain a reading result; and if the reading result is consistent with the OTP character string code which is automatically received by the mobile device where the mobile number bound with the client APP is located and sent based on the exclusive number, the verification is passed. By adopting the method provided bythe embodiment of the invention, the non-perception verification of the client APP can be realized, the user experience is improved, manual participation is not needed, the verification failure caused by GSM network signals can be reduced, the verification success rate and the payment success rate are increased, and the security of the client APP is ensured.

Description

technical field [0001] This description relates to the field of computer technology, in particular to a verification method, device and equipment. Background technique [0002] In some underdeveloped countries, due to the relatively low education level of users and the lack of popularization of smart phones, the operation of e-wallets is mainly based on the e-wallets in the USSD (Unstructured Supplementary Service Data) model, that is, all e-wallets The operation is based on the data interaction of the GSM network. For example, in Pakistan, about 60% to 70% of users are USSD users, and their demand for electronic wallets is mainly for transfer and remittance, mobile phone recharge, etc. With the popularization of the mobile Internet, smart phone-based e-wallet APPs gradually enter the market. At this time, the migration of USSD users to e-wallet APP users is bound to be involved. [0003] In the USSD era, since the e-wallet business is strongly bound based on the mobile ph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/40G06Q20/38G06Q20/32
CPCG06Q20/325G06Q20/382G06Q20/4014
Inventor 杜荣军
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products