Movatterモバイル変換


[0]ホーム

URL:


CN110503756A - A kind of information processing method, device, storage medium and mobile terminal - Google Patents

A kind of information processing method, device, storage medium and mobile terminal
Download PDF

Info

Publication number
CN110503756A
CN110503756ACN201910784880.9ACN201910784880ACN110503756ACN 110503756 ACN110503756 ACN 110503756ACN 201910784880 ACN201910784880 ACN 201910784880ACN 110503756 ACN110503756 ACN 110503756A
Authority
CN
China
Prior art keywords
information
identity
user
registration
background system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910784880.9A
Other languages
Chinese (zh)
Inventor
马文超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing LtdfiledCriticalLenovo Beijing Ltd
Priority to CN201910784880.9ApriorityCriticalpatent/CN110503756A/en
Publication of CN110503756ApublicationCriticalpatent/CN110503756A/en
Pendinglegal-statusCriticalCurrent

Links

Landscapes

Abstract

This application involves a kind of information processing methods, device, storage medium and mobile terminal, first identity information of this method in acquisition user, and it is based on first identity information, after carrying out customer identity registration to the target background system by the registration entrance of target background system, and gate inhibition is opened not directly to user, but further obtain the location information of customer mobile terminal, and the location information target background system is sent to by the registration entrance, in this way, it may make that being based on the location information in target background system verifies user location, and access control is carried out according to verification result.On the basis of user completes identity registration, the application combination customer position information carries out access control, it is clear that can be avoided opening gate in the case where remote login, to improve the safety in unmanned shop etc..

Description

A kind of information processing method, device, storage medium and mobile terminal
Technical field
The application belongs to the super user identity authentication of quotient and rights management techniques field more particularly to a kind of information processing sideMethod, device, storage medium and mobile terminal.
Background technique
With gradualling mature for the emerging technologies such as artificial intelligence, machine vision and mobile payment, with unmanned retail for generationThe new retail of table receives the concern of major electric business platform and famous brand name, this accordingly makes unmanned shop be increasingly becoming the whole world zeroA kind of new trend of industry is sold, unmanned shop has barcode scanning and opens the door, freely chooses, can save the features such as payment queuing time, phaseThan for conventional store more conveniently and quickly.
Unmanned shop is in practical applications, it usually needs client carry out identity registration, in order to the information based on registration intoUser tracking under the certification identification of row client identity and customer action unusual condition.Currently, when carrying out client identity registration,Registration is usually realized by the two dimensional code in customer scans shop, and opens gate inhibition, but the peace of which to client after the registration is finishedFull property is poor, in shop two dimensional code be photographed, remote login in the case where open gate inhibition to registration user and not can guarantee unmanned quotientThe safety in shop.
Summary of the invention
In view of this, the application be designed to provide a kind of information processing method, device, storage medium and it is mobile eventuallyEnd, it is intended to for the application scenarios such as unmanned shop, realize the place of a kind of higher customer identity registration of safety and access controlReason scheme.
For this purpose, the application is disclosed directly below technical solution:
A kind of information processing method is applied to mobile terminal, this method comprises:
Obtain the registration entrance of target background system;
The instruction of the first identity information acquisition is obtained, and acquires the first identity information of user;
Based on first identity information, user identity note is carried out to the target background system by the registration entranceVolume;
After the registration is finished, the location information of the mobile terminal is obtained;
The location information is sent to the target background system by the registration entrance, so that after the targetPlatform system is based on the location information and carries out access control.
The above method, it is preferred that this method is applied in the system of real name terminal applies on the mobile terminal, described to adoptCollect the first identity information of user, comprising:
Acquire at least portion in the system of real name terminal applies of the mobile terminal in registered subscriber identity informationDivide subscriber identity information;
It is described to be based on first identity information, identity note is carried out to the target background system by the registration entranceVolume, comprising:
Generate the first identity for corresponding at least partly user's identity information;
First identity is sent to the target background system by the registration entrance, so that being based on instituteIt states the first identity and carries out identity registration in the target background system.
The above method, it is preferred that this method it is described by the registration entrance location information is sent to it is describedAfter target background system, further includes:
The target background system is obtained to the feedback information of the location information;
If the feedback information indicates that the location information by verifying, is transferred and shows an access control control, and controlIt makes the access control control and is in operable state.
The above method, it is preferred that this method is after the control access control control is in operable state, alsoInclude:
An open command is generated if receiving to the operation information of the access control control, and sends the unlatching and refers toIt enables to the target background system, so that the target background system access control is opened;
If not receiving the operation information to the access control control beyond the first scheduled duration, the gate inhibition is controlledControl control is in non-operable state.
The above method, it is preferred that this method further include:
The number of operations of the access control control of the detection in operable state, if the number of operations reaches predeterminedNumber then controls the access control control and is in non-operable state;
And/or
In the case where the access control control is in non-operable state, if in the second scheduled duration again byThe access control control is transferred and shown to the registration entrance of the target background system, then controls at the access control controlIn non-operable state, the access control control is controlled when until reaching second scheduled duration and is in operable state.
The above method, it is preferred that this method instructs and acquire the first of user in the first identity information acquisition of the acquisitionBefore identity information, further includes:
It generates and shows an authority request for being used to request to obtain subscriber identity information acquisition permission;
The response message for corresponding to the authority request is obtained, if response message characterization allows to obtain user identity letterThe step of breath acquisition permission, triggering the first identity information acquisition of the acquisition instructs and acquires the first identity information of user.
The above method, it is preferred that first identity information is non-biometric information;
This method is after the registration entrance for obtaining target background system, further includes:
Display one includes at least the prompting interface of the first acquisition mode, the second acquisition mode;
If detecting the operation information for selecting first acquisition mode, the first identity information acquisition of the acquisition is triggeredThe step of instructing and acquiring the first identity information of user;
If detecting the operation information for selecting second acquisition mode, the instruction of the second identity information acquisition is obtained, andThe second identity information of user is acquired, second identity information includes the biological information of user;It generates described in corresponding toSecond identity and the biological information are sent to the target by the second identity of the second identity informationBackground system, so that carrying out body in the target background system based on second identity and the biological informationPart registration.
A kind of information processing unit, is applied to mobile terminal, which includes:
First acquisition unit, for obtaining the registration entrance of target background system;
Acquisition unit for obtaining the instruction of the first identity information acquisition, and acquires the first identity information of user;
Registering unit, for being based on first identity information, by the registration entrance to the target background systemCarry out customer identity registration;
Second acquisition unit, for after the registration is finished, obtaining the location information of the mobile terminal;
Transmission unit, for the location information to be sent to the target background system by the registration entrance, withSo that the target background system is based on the location information and carries out access control.
A kind of storage medium is at least stored with one group of instruction set in the storage medium;The instruction set is being called and is executingWhen, it can be used to execute method as described above.
A kind of mobile terminal, comprising:
Memory, at least storing one group of instruction set;
Processor is executed for calling and executing the described instruction collection in the memory by executing described instruction collectionMethod as described above.
As it can be seen from the above scheme information processing method provided by the present application, device, storage medium and mobile terminal, are being adoptedCollect the first identity information of user, and be based on first identity information, by the registration entrance of target background system to describedAfter target background system carries out customer identity registration, and not directly to the open gate inhibition of user, but further obtain userThe location information of mobile terminal, and the location information has been sent to target background system by the registration entrance, in this way, canUser location is verified so that being based on the location information in target background system, and gate inhibition's control is carried out according to verification resultSystem.On the basis of user completes identity registration, the application combination customer position information carries out access control, it is clear that can be avoidedOpening gate in the case where remote login, to improve the safety in unmanned shop etc..
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show belowThere is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only thisThe embodiment of application for those of ordinary skill in the art without creative efforts, can also basisThe attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 2 be one alternative embodiment of the application provide based on interacting progress between mobile terminal and target background systemA kind of processing logical schematic of customer identity registration and access control;
Fig. 3 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 4 be one alternative embodiment of the application provide based on interacting progress between mobile terminal and target background systemAnother processing logical schematic of customer identity registration and access control;
Fig. 5 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 6 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 7 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 8 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Fig. 9 is another flow diagram for the information processing method that one alternative embodiment of the application provides;
Figure 10 be one alternative embodiment of the application provide based on the interaction between mobile terminal and target background system intoAnother of row customer identity registration and access control handle logical schematic;
Figure 11 is a kind of structural schematic diagram for the information processing unit that one alternative embodiment of the application provides;
Figure 12 is another structural schematic diagram for the information processing unit that one alternative embodiment of the application provides;
Figure 13 is another structural schematic diagram for the information processing unit that one alternative embodiment of the application provides;
Figure 14 is the yet another construction schematic diagram for the information processing unit that one alternative embodiment of the application provides;
Figure 15 is a kind of structural schematic diagram for the mobile terminal that one alternative embodiment of the application provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, completeSite preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based onEmbodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every otherEmbodiment shall fall in the protection scope of this application.
This application provides a kind of information processing method, device, storage medium and mobile terminals, for being directed to unmanned quotientThe application scenarios such as shop realize the processing scheme of a kind of higher customer identity registration of safety and access control.It will pass through belowThe information processing method of the application, device, storage medium and mobile terminal is described in detail in multiple embodiments.
In one alternative embodiment of the application, a kind of information processing method is disclosed, which can applyIn mobile terminal, the mobile terminal that this method is applicable in can include but is not limited to smart phone, tablet computer, Intelligent wearableThe terminal devices such as equipment (such as Intelligent bracelet/foot ring), number assistant.More specifically, can using terminal applies,Any one form such as web application, applet/application plug-in or terminal local function, on mobile terminals to the applicationThe information processing method carry out function realization.
The flow diagram of the information processing method shown refering to fig. 1, the information processing method may include following placeReason process:
Step 101, the registration entrance for obtaining target background system.
The scene that the application is faced is mainly the customer identity registration and access control field of unmanned shop, unmanned supermarket etc.Scape, the target background system are then unmanned shop, unmanned supermarket etc. at least providing customer identity registration function and doorProhibit the background system of control function, in addition to these functions, usually, which can also provide user information and testCard (user information verifying when such as progress commodity payment and settlement), merchandise news record are (such as record type of merchandize, quantity, quotientProduct state (for sale/to have sold), commodity transaction information), the functions such as payment and settlement.The system can be by unmanned shop, nobody surpassesThe system that city is safeguarded in local server, be also possible to by unmanned shop, unmanned supermarket's trustship beyond the clouds for providingThe service system of above-mentioned function.
The registration entrance, usually, what can be provided for the target background system has customer identity registration functionThe register interface of energy, the registration entrance can specifically be transferred by accordingly registering access information provided by target background system.The registration access information, illustratively, such as can be but not limited to the offer of target background system for connecting or recall instituteState a URL (Uniform Resource Locator, the uniform resource locator) network address or two dimension of customer identity registration functionCode etc., versatility in view of two dimensional code and operation convenience feature, in the present embodiment, it is preferable that it is described register access information asFor recalling the two dimensional code of the customer identity registration function provided by the target background system.
To which its movement can be utilized when user has for a certain unmanned shop/unmanned supermarket identity registration demandTerminal is scanned for recalling the two dimensional code of information registering function provided by unmanned shop/unmanned supermarket, and mobile terminal is obtainingAfter code scaning information, the information can be parsed, accordingly obtains the address information of unmanned shop/unmanned supermarket registration entrance, Jin ErjiCustomer identity registration function interface provided by unmanned shop/unmanned supermarket background system is recalled in the address information.
It should be noted that user can scan displaying in unmanned shop/unmanned supermarket doorway two dimension in practical applicationCode carries out identity registration, it is of course also possible to first pass through the two dimensional code photo for taking pictures or receiving forwarding or reception flyer in advanceEtc. forms, obtain unmanned shop/unmanned supermarket two-dimensional barcode information, it is subsequent then can be using remote mode by scanning unmanned quotientShop/unmanned supermarket two dimensional code photo or leaflet carry out customer identity registration to recall the customer identity registration function interface.
Step 102 obtains the instruction of the first identity information acquisition, and acquires the first identity information of user.
In the registration entrance for obtaining target background system, unmanned shop/unmanned supermarket customer identity registration function is such as recalledBehind energy interface, registration entrance acquisition subscriber identity information (i.e. described first identity of such as interface form can be based further onInformation), in order to carry out customer identity registration.
Wherein, acquire the first identity information of user specific implementation form can be it is diversified, as a kind of possibilityImplementation, can by user manually mobile terminal present customer identity registration function interface on input its user's surnameThe personal information such as name, contact method, the means of payment and/or payment account, and further interface behaviour is carried out after completing inputMake, such as press " registration " or " confirmation " function button on interface, mobile terminal is after detecting the operation information of the operationThe first identity information acquisition instruction, and the every terms of information based on instruction acquisition user input can be triggered.
It, can also be automatic to touch by mobile terminal when recalling the registration entrance as alternatively possible implementationInstruction of sending out the first identity information acquisition described, and in response to the instruction, automatic collection user for carrying out the phase of identity registrationInformation is closed, which will be described in detail below.
Step 103 is based on first identity information, is used by the registration entrance to the target background systemFamily identity registration.
After collecting the first identity information of user, be based further on first identity information, by it is described register intoMouth carries out customer identity registration to the target background system.More specifically, for example, referring to Fig.2, can be entered by the registrationMouthful, the personal information such as the address name of acquisition, contact method, the means of payment and/or payment account are sent to by institute based on networkTarget background system is stated, the customer identity registration in target background system is realized with this.
Step 104, after the registration is finished, obtains the location information of the mobile terminal.
In the present embodiment, " registration should be completed " and refer to the customer identity registration success on the target background system.
In being different from the prior art, unmanned shop/unmanned supermarket background system is just straight after user completes identity registrationConnect this implementation that gate inhibition's (directly automatically controlling unmanned shop/unmanned supermarket gate inhibition to open) is opened to user, this ShenPlease in, after the registration is finished, and opened not directly to the open gate inhibition of user, access control, but it is mobile further to obtain userThe location information of terminal, and accordingly carry out the access control on the basis of location information verification.
Correspondingly, for the mobile terminal of user, after the registration is finished, can further acquisition terminal it is currentLocation information can such as use but be not limited to GPS (Global Positioning System, global positioning system) positioning skillArt or base station location technology etc. carry out the current location information of acquisition terminal, higher in view of current GPS positioning technology precision, can be excellentFirst use the position acquisition based on GPS.
Certainly, if registration failure, such as required registration information is not collected, then will not trigger the acquisition mobile terminalLocation information the step of.
The location information is sent to the target background system by the registration entrance by step 105, so that instituteIt states target background system and is based on location information progress access control.
After acquisition obtains the current location information of the mobile terminal, as shown in Fig. 2, can continue through it is described register intoThe location information is sent to the target background system by mouth, so that the target background system is based on the location informationCarry out access control.
The position of customer mobile terminal is equivalent to be position that user is presently in, and target background system is obtaining the positionConfidence breath after, can the location information based on acquisition to user carry out location verification, wherein can specifically will acquire the position letterBreath be compared with location information (unmanned shop/unmanned supermarket position) preset in system, if the two unanimously or two kinds of positionsConfidence ceases the deviation of characterized position in permitted deviation range, then determines that the location information of user passes through verifying,That is, can show that user does not carry out remote login, it is thus possible to open gate inhibition to user, such as by the target background systemThe unmanned shop corresponding to it/nobody gate inhibition for exceeding the time limit is directly controlled to open etc..
Conversely, if the deviation for the position that the two is inconsistent or two kinds of location informations are characterized is beyond permitted deviation modelIt encloses, then determines that the location information of user is unverified, caused by which has usually carried out remote login because of user, thisKind in the case of, then not to user open gate inhibition, do not control unmanned shop/nobody exceed the time limit gate inhibition unlatching, unmanned quotient is ensured with thisThe safety of shop/unmanned supermarket.
As it can be seen from the above scheme information processing method provided by the present application, in the first identity information of acquisition user, and baseIn first identity information, user identity note is carried out to the target background system by the registration entrance of target background systemAfter volume, and not directly to the open gate inhibition of user, but the location information of customer mobile terminal is further obtained, and by the positionConfidence breath has been sent to target background system by the registration entrance, is based on the position in target background system in this way, may makeConfidence breath verifies user location, and carries out access control according to verification result.The basis of identity registration is completed in userOn, the application combination customer position information carries out access control, it is clear that it can be avoided opening gate in the case where remote login,To improve the safety in unmanned shop etc..
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 3, at the informationReason method can be realized further by following treatment process:
Step 301, the registration entrance for obtaining target background system.
As described above, the registration entrance of the target background system, can be in unmanned public safety, and unmanned shop/With the register interface of customer identity registration function provided by the background system of unmanned supermarket.Wherein it is possible to using but it is unlimitedIn the address the URL instruction for requesting the interface content of pages or scan the side of its two dimensional code (such as short range scanning or remote scanning)Formula, to recall the interface.
Step 302 obtains the instruction of the first identity information acquisition, acquires in the system of real name terminal applies of the mobile terminalAt least partly user identity information in the subscriber identity information of registration.
Based on user's right, transaction security, management all various aspects such as convenience consideration, currently, having been introduced moreThe system of real name terminal applies of kind facing moving terminal (certain end PC also can be used), such as wechat, Alipay, these applications are logicalThe real name identity information for often acquiring and storing user when user carries out identity registration or in use process, as system of real name is answeredWith account, address name, user mobile phone number, and/or associated bank card account number etc..
In consideration of it, for the convenience used, when the application is embodied, it is preferable that applet, application can be usedThe processing function of the application method is embodied as one in the systems of real name terminal applies such as wechat, Alipay by the form of plug-in unitA small routine or plug-in unit thus can carry out nothing by the subscriber identity information acquired in these system of real name terminal appliesRelevant treatment needed for the scenes such as people's retail, such as backstage identity registration, authentication, automatic payment.Certain practical applicationIn, unmanned shop/unmanned supermarket side and corresponding system of real name may be related to using the agreement and cooperation between operator, hereNo longer this is described in detail.
For the implementation, substantially, mobile terminal is by the application platform by corresponding system of real name terminal applies(such as wechat platform, Alipay platform) is interacted with unmanned shop/unmanned supermarket background system, Lai Shixian user identityThe relevant treatments such as registration.Wherein, user can be first in the small routine of corresponding system of real name terminal applies by scanning unmanned quotientShop/unmanned supermarket two dimensional code recalls it and registers entrance (function interface for being provided with registering functional), due to the real name at placeUsually there is subscriber identity information in terminal applies processed, it, can be first described in automatic trigger thus after recalling the registration entranceIdentity information acquisition instruction, and the instruction is responded, the relative users body having had in system of real name terminal applies described in automatic collectionPart information is as first identity information, without being manually entered one by one by user again, to promote the convenience of user's operationAnd the information collection efficiency of terminal.
First identity information of the automatic collection can be the user identity having had in the system of real name terminal applies of userAt least part of the information in information can specifically include but be not limited to system of real name terminal applies account, user mobile phone number and/or instituteAssociated bank card account etc., certainly, if the subscriber identity information acquired from system of real name terminal applies is not comprehensive enough or is not inconsistentIt closes and requires (not collecting any effective payment account such as), this can also be not added by the manual amended record of user, the present embodimentIt limits.
Step 303 generates the first identity for corresponding at least partly user's identity information.
In system of real name application account, user mobile phone number and/or the associated bank card account etc. for collecting userAfter first identity information, as a kind of possible embodiment, directly these information can be sent to by the registration entranceThe target background system of current unmanned shop/unmanned supermarket, to carry out subscriber identity information registration.
In practical application, certain unmanned shops/unmanned supermarket may be not fully credible, for a user, if userIdentity information is obtained by various unmanned shop/unmanned supermarket background system, and if lacking effectively supervision, user identityThere is the risk being compromised in information, be based on this consideration, and the present embodiment provides be on unmanned shop/unmanned supermarket target backstageSystem carries out another implementation of customer identity registration, which believes specific to first identity collectedBreath generates unique first identity for it, which can be User ID, subscriber-coded,Or first identity information is carried out using corresponding message digest algorithm (Message-Digest Algorithm, MDA)Calculate a resulting digest value.By generating corresponding first identity for the subscriber identity information of acquisition, comeHide user sensitive information.It is subsequent based on first identity rather than actual subscriber identity information is on the target backstageSystem carries out customer identity registration.
First identity is sent to the target background system by the registration entrance by step 304, so thatIt obtains and identity registration is carried out in the target background system based on first identity.
It, can be by the first body of user of acquisition after the first identity corresponding to its first identity information is generated for userPart information and the first identity of generation are bound, and refering to Fig. 4, by the registration entrance by the first identity markKnowledge is sent to the target background system, in this manner it is possible to be based on the first identity (such as User ID, user identityThe digest value etc. of information), user identity is carried out in unmanned shop/unmanned supermarket background system namely the target background systemRegistration, thus, for the target background system, first identity of only user is visible, and userSystem of real name application account, contact method, the actual identities information such as payment account, rdativery sensitive is then invisible, accordingly also just advisesIt has kept away and has been compromised risk.
But, it should be noted that the system of real name application end due to first identity in mobile terminal is and userWhat these true subscriber identity informations such as system of real name application account, contact method, payment account were mutually bound, hence for subsequentPayment and settlement, user's connection is (such as to some favor informations in limited time of user's push, when settling accounts abnormal to user feedback exceptionInformation or user tracking) etc., unmanned shop/unmanned supermarket background system still is able to by the system of real name terminal appliesApplication platform (the application backstage of these terminal applies is comparatively more credible) obtains effective connection with user and can carry out justThe processing such as normal payment and settlement, user tracking.
Step 305, after the registration is finished, obtains the location information of the mobile terminal.
As described above, after customer identity registration success, the directly not open gate inhibition of the target background system, controlGate inhibition opens, but further obtains the location information of customer mobile terminal, and carry out the gate inhibition on the basis of location information verificationControl.
Correspondingly, for the mobile terminal of user, after the registration is finished, can further acquisition terminal it is currentLocation information.Certainly, if registration failure, such as required registration information is not collected, then it is mobile eventually will not to trigger the acquisitionThe step of location information at end.
The location information is sent to the target background system by the registration entrance by step 306.
After acquisition obtains the current location information of the mobile terminal, the registration entrance can be continued through by institute's rhemeConfidence breath is sent to the target background system so that the target background system based on the location information of acquisition to user intoRow location verification.
Wherein, as described above, target background system can pass through the location information for transmitting mobile terminal and preset positionConfidence breath (unmanned shop/unmanned supermarket position) is compared, and verifies to realize to user location, wherein if the twoThe deviation for the position that consistent or two kinds of location informations are characterized then determines the location information of user in permitted deviation rangeBy verifying, that is, can show that user does not carry out remote login, it is thus possible to gate inhibition be opened to user, conversely, then determiningThe location information of user is unverified, and such situation is often as caused by user carried out remote login, in order to trueThe safety of unmanned shop/unmanned supermarket is protected, accordingly access control is not opened.
Step 307 obtains the target background system to the feedback information of the location information.
After the location information of user passes through verifying, as a kind of possible implementation, can be by the target backstageSystem directly controls unmanned shop/unmanned supermarket gate inhibition unlatching, to allow user to enter in shop.
It, can also be from the target background system to user's in the present embodiment as alternatively possible implementationMobile terminal sends one for characterizing user location by the feedback information of verifying, which can be form of message or refer toEnable form.
If step 308, the feedback information indicate that the location information by verifying, is transferred and shows an access control controlPart, and control the access control control and be in operable state.
Mobile terminal is receiving the described anti-of the target background system such as the system of real name terminal applies of mobile terminalAfter feedforward information, transfers and show an access control control (control such as specifically can be a virtual door open button), and controlThe access control control is in operable state, is supported by user with this by operating the control come opening gate, that is, willThe trigger action that gate inhibition opens is arranged in user terminal.
Step 309 generates an open command if receiving to the operation information of the access control control, and sends instituteOpen command is stated to the target background system, so that the target background system access control is opened.
If mobile terminal receives user to the operation information of the access control control, it is such as clicking or press on the gate inhibitionThe operation information etc. for controlling control, then generate an open command, and sends the instruction to the target background system, target backstageSystem can trigger the control to gate inhibition because responding the instruction, and control unmanned shop/unmanned supermarket gate inhibition unlatching, to allowUser enters.
It should be noted that in user into behind shop, generally automatically controlling gate inhibition's closing by target background system, it is exemplaryGround, target background system can specifically be carried out based on timing (timing duration reaches the setting duration for being sufficient to make user to enter in shop)Gate inhibition closes control, or is also based on monitoring (detect user into shop behavior) and carries out gate inhibition and close to control etc..
The present embodiment carries out access control on the basis of completing customer identity registration, in conjunction with customer position information, canOpening gate in the case where remote login is avoided, the safety in unmanned shop is improved.In addition, the present embodiment is by mobile wholeSystem of real name terminal applies on end are implemented the application method, improve the application method application when convenience, andIdentity note is carried out with the user real identification information of the identification informations replacement acquisition such as User ID in system of real name terminal appliesVolume, can effectively hide user sensitive information, avoid user sensitive information after the low unmanned shop of trusting degree/unmanned supermarketLeakage of information risk in platform system.
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 5, at the informationReason method can also include following processing:
If step 310 does not receive the operation information to the access control control beyond the first scheduled duration, controlThe access control control is in non-operable state.
In the present embodiment, if exceeding the first scheduled duration, such as 30s or 60s, user is not received to the access controlThe operation information of control then controls the access control control and is in non-operable state, that is, controls the access control controlFailure.
User can be effectively prevented in this way due to offhand decision does not enter shop/supermarket far from the case where, to gate inhibition'sIt opens by mistake and opens, further ensure the safety of unmanned shop/unmanned supermarket.It is subsequent, if user determines into unmanned shop/nothing againPeople supermarket does shopping, then the access control control of operable state can be recalled again by the registration entrance, that is, quiteThe access control control is activated in the two dimensional code by scanning target background system again.
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 6, at the informationReason method can also include following processing:
The number of operations of the access control control of step 311, detection in operable state, if the number of operationsReach pre-determined number, then controls the access control control and be in non-operable state.
For in principle, unmanned shop/unmanned supermarket is people registration, a people into shop, it is contemplated that in practical application,Often there is kinsfolk or companion together into the situation in shop, can also suitably relax the limitation, for example, people registration, a few people intoShop etc., but in order to avoid people registration, excessive people are chaotic into personnel caused by shop, are difficult to manage (this also just further increasingAdd security risk) the case where, in specific implementation, the maximum of the access control control in operable state can be limitedNumber of operations, wherein if the number of operations of access control control reaches preset maximum number of operations, such as 3 times, then described in controlAccess control control is in non-operable state, that is, the activation each time of access control control is all to have number of operations limitation, access control control fails if the maximum number of operations for reaching preset.
The numerical value of the maximum number of operations can according to demand be configured it by the administrative staff of target background system.
Through this process, it can effectively prevent the phenomenon that people registration, excessive people are into shop generation, e.g., avoid people noteAfter volume success, the operation access control control (operating outdoors or in door) of no maximum carrys out continuous opening gate, allow it is excessive notAccredited personnel can accordingly reduce unmanned shop/unmanned supermarket security risk into shop etc..
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 7, at the informationReason method can also include following processing:
Step 312, in the case where the access control control is in non-operable state, if in the second scheduled durationThe access control control is transferred and shown again by the registration entrance of the target background system, then controls gate inhibition's controlControl processed is in non-operable state, and the access control control is controlled when until reaching second scheduled duration and is in and can graspMake state.
As described above, in the failure of access control control, (such as user does not operate access control control because temporarily busy, causesIts time-out failure) after, it, can be again by the registration entrance if user still has into unmanned shop/unmanned supermarket demandThe access control control of operable state is recalled, that is, can be by being scanned described in the two dimensional code activation of target background system againAccess control control.Wherein, which may is that scan the two-dimensional code after, when will be registered by mobile terminalGenerated first identity and terminal positional information are sent to target background system, after the location information is by targetAfter the verifying of platform system, mobile terminal can receive the feedback information that the expression of target background system transmission is verified, in turnThe access control control can be activated again, controlled it and be in operable state.
For this function of activating access control control again, multiple barcode scanning in people's short time, is let off in order to preventThe phenomenon that more people are into shop occurs and (and then causes personnel chaotic, it is difficult to manage, accordingly also increase security risk), and the present embodiment isThe function is provided with minimum interval when access control control repeatedly activates, such as 5 minutes, 10 minutes, thus, describedAccess control control is in non-operable state namely failed situation, if in the corresponding second pre- timing of the time intervalRegistration entrance in long again by the target background system is transferred and shows the access control control, that is, leading to againIt crosses barcode scanning and activates the access control control, then control the access control control and be in non-operable state, until reaching instituteThe access control control is just controlled when stating the second scheduled duration is in operable state.It can avoid a people to a certain extent in this wayMultiple barcode scanning in short time, the phenomenon that letting off more people into shop generation.
In specific implementation, duration, base are effectively operated based on control in combination with using above-mentioned provided by the embodiment of the present applicationIn number, the control strategy based on the time interval etc. between adjacent activation twice, unmanned shop/unmanned supermarket gate inhibition is controlledControl processed carries out state control, on the basis of ensuring user's legitimate rights and interests, while guaranteeing unmanned shop/nobody is super as far as possibleThe operation security in city.
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 8, at the informationReason method can also include following processing between the step 101 and the step 102:
Step 801 generates and shows an authority request for being used to request to obtain subscriber identity information acquisition permission.
Step 802 obtains the response message for corresponding to the authority request, if response message characterization allows to be usedFamily identity information acquisition permission triggers first identity information acquisition that obtains and instructs and the first identity information for acquiring userStep.
In specific implementation, after the registration entrance for obtaining target background system, and the system of real name for acquiring user is answeredBefore first identity informations such as account, contact method and/or associated bank card account, user can also be requested to weigh firstLimit, and specifically on customer mobile terminal, show that one is used on such as small routine interface of the system of real name terminal appliesThe solicited message of family permission, later, can by detection user response corresponding operating performed by the request (such as user presses" permission " button, or press " refusal " button) operation information, to determine whether to get the power of acquisition subscriber identity informationLimit just continues to acquire subscriber identity information, and execute use only in the case where getting the permission of acquisition subscriber identity informationOtherwise family identity registration process then terminates user identity in the register flow path of target background system.
The present embodiment requests user right before acquiring subscriber identity information first, it is ensured that under the premise of user's authorizationThe acquisition for carrying out user's related identification information, can further promote the safety of user information, in addition, also improving user's participationDegree, can at least improve the use feeling to the more sensitive user of self-identity information.
In one alternative embodiment of the application, refering to the flow diagram of the information processing method shown in Fig. 9, at the informationReason method can also include following processing after the registration entrance that the step 101 obtains target background system:
Step 901, display one include at least the prompting interface of the first acquisition mode, the second acquisition mode.
The unmanned public safety of unmanned shop/unmanned supermarket etc., will necessarily be related to the payment and settlement of commodity, tie in paymentIn calculation field, effective, the convenient and fast means of payment of one kind is the payment and settlement based on biological information (face, fingerprint), such as brush face branchPay etc..Which is associated with payment account by user biological information in advance, such as by user's human face data and Alipay account orBank card account is associated etc., subsequent to trigger payment and settlement process by biological informations such as acquisition faces, has convenient, fastPrompt advantage.
The payment and settlement based on biological information, need on it is registered in advance have the biological information of user premised on, this is just neededUser biological information is acquired in advance when user carries out identity registration to target background system.In practical application, it is contemplated that oneThe quick payment demand of certain customers and another part user, can be in unmanned shop/nothings to the sensitive feature of its biological informationOn the registration entrance of the background system of people supermarket, while providing and corresponding to conventional payment clearing form (payment of brush bank card, scanningTwo dimensional code payment) the first acquisition mode, and corresponding to the of the above-mentioned quick payment clearing form based on biological informationTwo acquisition modes, for selection by the user.
Wherein, first acquisition mode, it is only necessary to acquire system of real name terminal applies account, contact method and/or the pass of userThe non-biometrics information such as bank card account of connection, and these the abiotic spies of second acquisition mode in addition to user need to be acquiredReference breath, it is also necessary at least one of user of acquisition biological information, such as face information, finger print information.
To after recalling its registration entrance, show first in the unmanned shop of scanning input/unmanned supermarket two dimensional codeOne includes at least the prompting interface of first acquisition mode, the second acquisition mode, to prompt user to select a certain kind thereinMode carries out identity information acquisition.
If step 902 detects the operation information for selecting first acquisition mode, the first identity of the acquisition is triggeredThe step of information collection instructs and acquires the first identity information of user.
Wherein, if detecting, user selects the operation information of first acquisition mode (to correspond to described first as clickedThe operation button of acquisition mode), then mobile terminal is triggered, as triggered the little Cheng in a certain system of real name terminal applies of mobile terminalSequence acquires registered system of real name terminal applies account, contact method and/or associated bank in the system of real name terminal appliesThe non-biometrics information such as card account.
It is subsequent to carry out customer identity registration based on these non-biometric information, it such as generates and corresponds to these abiotic spiesFirst identity is simultaneously registered to target background system etc. by the first identity of reference breath;In this mode, work as userAfter shopping, by brush bank card or it the payment and settlement that modes carry out commodity such as can scan the two-dimensional code.
If step 903 detects the operation information for selecting second acquisition mode, the second identity information acquisition is obtainedInstruction, and the second identity information of user is acquired, second identity information includes the biological information of user;It generates and corresponds toIn the second identity of second identity information, second identity and the biological information are sent to instituteTarget background system is stated, so that based on second identity and the biological information in the target background systemCarry out identity registration.
If detecting, user selects the operation information of second acquisition mode (to correspond to the second acquisition side as clickedThe operation button of formula), then as shown in Figure 10, in addition to triggering mobile terminal acquires registered reality in the system of real name terminal appliesThe non-biometrics information such as name terminal applies account, contact method and/or associated bank card account processed, while also triggering shiftingThe physical characteristics collectings devices such as the camera or fingerprint sensor of dynamic terminal are opened, and face or fingerprint for acquiring user etc. is rawObject characteristic information.
After acquisition obtains these non-biometrics and biological information, to hide user sensitive information, mobile terminalThe second identity corresponding to these information can be generated, which equally can be User ID, a userCoding calculates resulting digest value to the identity information of acquisition based on corresponding message digest algorithm, and refering to fig. 10, and can willSecond identity generated and the biological information are transmitted to target background system together, thus, in this case,Specifically customer identity registration can be carried out based on the biological information of second identity and user.In the base for completing registrationIt is subsequent to trigger the payment and settlement process to purchased commodity by acquiring the biological information of user on plinth, specifically, thanSuch as, can be in the one or more settlement systems with camera of payment region setting in shop, or can also only be arranged oneOr multiple cameras, and these cameras are connected with backstage settlement system, so as to trigger payment by acquisition faceSettlement information (such as payment amount) is transmitted to pair by settlement process, settlement system after collecting the biological informations such as faceIt should be in the system of real name terminal applies of the mobile terminal of the human face data, in this way, can be in the system of real name terminal applies of mobile terminalIn (being substantially to be executed the processing by means of the application platform of system of real name terminal applies), the biological characteristic that gets and specifyThe payment account of information binding, and then payment and settlement is carried out based on the payment account.Compared to brush bank card or scan the two-dimensional codeEqual payment and settlements mode, which are apparently more convenient, fast.
In addition, it is necessary to explanation, if user, which has been based on above-mentioned first acquisition mode, has registered it to target background systemNon-biometric information, at subsequent any moment, if user is based on the considerations of convenient payment, (such as user continually accesses a certain nothingPeople does shopping in shop or user is after accessing a certain unfamiliar shop, generates interest to it, consequently, it is possible to consider toThe background system renewal of registration in the shop its biological information), it needs further register its biological information to target background system, then usesFamily (can scan the two-dimensional code such as in shop or outside shop by entering the registration entrance of the target background system and transfer target background systemRegistration entrance etc.), to biological informations such as target background system amended record its human face datas, in order to support its subsequent baseIt is settled accounts in the quick payment of biological information.
The present embodiment is provided simultaneously by the registration entrance in target background system and is only used for acquisition user's non-biometricSecond acquisition side of the first acquisition mode of information and non-biometric information and biological information for acquiring userFormula, not only can satisfy the identity registration demand of the acquisition more user of sensitivity to its biological information, but also can satisfy toolThere is the identity registration demand of the user of quick payment demand, may make user that there is preferably experience.
Corresponding to above-mentioned information processing method, the embodiment of the present application also discloses a kind of information processing unit, refering to figureThe structural schematic diagram of information processing unit shown in 11, in one alternative embodiment of the application, the apparatus may include:
First acquisition unit 1101, for obtaining the registration entrance of target background system.
The registration entrance, usually, what can be provided for the target background system has customer identity registration functionThe register interface of energy, the registration entrance can specifically be transferred by accordingly registering access information provided by target background system.The registration access information, illustratively, such as can be but not limited to the offer of target background system for connecting or recall instituteA URL network address or the two dimensional code etc. for stating customer identity registration function, versatility and operation convenience feature in view of two dimensional code, thisIn embodiment, it is preferable that described to register access information to be used to recall user's body provided by the target background systemThe two dimensional code of part registering functional.
To which its movement can be utilized when user has for a certain unmanned shop/unmanned supermarket identity registration demandTerminal is scanned for recalling the two dimensional code of information registering function provided by unmanned shop/unmanned supermarket, and mobile terminal is obtainingAfter code scaning information, the information can be parsed, accordingly obtains the address information of unmanned shop/unmanned supermarket registration entrance, Jin ErjiCustomer identity registration function interface provided by unmanned shop/unmanned supermarket background system is recalled in the address information.
Acquisition unit 1102 for obtaining the instruction of the first identity information acquisition, and acquires the first identity information of user.
In the registration entrance for obtaining target background system, unmanned shop/unmanned supermarket customer identity registration function is such as recalledBehind energy interface, registration entrance acquisition subscriber identity information (i.e. described first identity of such as interface form can be based further onInformation), in order to carry out customer identity registration.
Wherein, acquire the first identity information of user specific implementation form can be it is diversified, as a kind of possibilityImplementation, can by user manually mobile terminal present customer identity registration function interface on input its user's surnameThe personal information such as name, contact method, the means of payment and/or payment account, and further interface behaviour is carried out after completing inputMake, such as press " registration " or " confirmation " function button on interface, mobile terminal is after detecting the operation information of the operationThe first identity information acquisition instruction, and the every terms of information based on instruction acquisition user input can be triggered.
It, can also be automatic to touch by mobile terminal when recalling the registration entrance as alternatively possible implementationInstruction of sending out the first identity information acquisition described, and in response to the instruction, automatic collection user for carrying out the phase of identity registrationInformation is closed, which will be described in detail below.
Registering unit 1103, for being based on first identity information, by the registration entrance to the target from the backgroundSystem carries out customer identity registration.
After collecting the first identity information of user, be based further on first identity information, by it is described register intoMouth carries out customer identity registration to the target background system.More specifically, for example, referring to Fig.2, can be entered by the registrationMouthful, the personal information such as the address name of acquisition, contact method, the means of payment and/or payment account are sent to by institute based on networkTarget background system is stated, the customer identity registration in target background system is realized with this.
Second acquisition unit 1104, for after the registration is finished, obtaining the location information of the mobile terminal.
In the application, after the registration is finished, and opened not directly to the open gate inhibition of user, access control, but furtherThe location information of customer mobile terminal is obtained, and accordingly carries out the access control on the basis of location information verification.
Correspondingly, for the mobile terminal of user, after the registration is finished, can further acquisition terminal it is currentLocation information, such as GPS positioning technology or base station location technology can be used but be not limited to, carry out the current position letter of acquisition terminalBreath, it is higher in view of current GPS positioning technology precision, it can preferentially use the position acquisition based on GPS.
Certainly, if registration failure, such as required registration information is not collected, then will not trigger the acquisition mobile terminalLocation information treatment process.
Transmission unit 1105, for the location information to be sent to the target backstage system by the registration entranceSystem, so that the target background system, which is based on the location information, carries out access control.
After acquisition obtains the current location information of the mobile terminal, as shown in Fig. 2, can continue through it is described register intoThe location information is sent to the target background system by mouth, so that the target background system is based on the location informationCarry out access control.
The position of customer mobile terminal is equivalent to be position that user is presently in, and target background system is obtaining the positionConfidence breath after, can the location information based on acquisition to user carry out location verification, wherein can specifically will acquire the position letterBreath be compared with location information (unmanned shop/unmanned supermarket position) preset in system, if the two unanimously or two kinds of positionsConfidence ceases the deviation of characterized position in permitted deviation range, then determines that the location information of user passes through verifying,That is, can show that user does not carry out remote login, it is thus possible to open gate inhibition to user, such as by the target background systemThe unmanned shop corresponding to it/nobody gate inhibition for exceeding the time limit is directly controlled to open etc..
Conversely, if the deviation for the position that the two is inconsistent or two kinds of location informations are characterized is beyond permitted deviation modelIt encloses, then determines that the location information of user is unverified, caused by which has usually carried out remote login because of user, thisKind in the case of, then not to user open gate inhibition, do not control unmanned shop/nobody exceed the time limit gate inhibition unlatching, unmanned quotient is ensured with thisThe safety of shop/unmanned supermarket.
As it can be seen from the above scheme information processing unit provided by the present application, in the first identity information of acquisition user, and baseIn first identity information, user identity note is carried out to the target background system by the registration entrance of target background systemAfter volume, and not directly to the open gate inhibition of user, but the location information of customer mobile terminal is further obtained, and by the positionConfidence breath has been sent to target background system by the registration entrance, is based on the position in target background system in this way, may makeConfidence breath verifies user location, and carries out access control according to verification result.The basis of identity registration is completed in userOn, the application combination customer position information carries out access control, it is clear that it can be avoided opening gate in the case where remote login,To improve the safety in unmanned shop etc..
The function of respective handling unit realizes process in the information processing unit elaborated further below, in this ShenPlease be in an optional embodiment of embodiment, the acquisition unit 1102 is specifically used for: acquiring the reality of the mobile terminalAt least partly user identity information in name terminal applies processed in registered subscriber identity information.
For the convenience used, when the application is embodied, it is preferable that applet, application plug-in can be usedForm, the little Cheng processing function of the application method being embodied as in the systems of real name terminal applies such as wechat, AlipaySequence or plug-in unit thus can carry out unmanned retail by the subscriber identity information acquired in these system of real name terminal appliesEtc. relevant treatment needed for scenes, such as backstage identity registration, authentication, automatic payment.It, may in certain practical applicationIt can be related to unmanned shop/unmanned supermarket side and corresponding system of real name using the agreement and cooperation between operator, it is no longer right hereThis is described in detail.
For the implementation, substantially, mobile terminal is by the application platform by corresponding system of real name terminal applies(such as wechat platform, Alipay platform) is interacted with unmanned shop/unmanned supermarket background system, Lai Shixian user identityThe relevant treatments such as registration.Wherein, user can be first in the small routine of corresponding system of real name terminal applies by scanning unmanned quotientShop/unmanned supermarket two dimensional code recalls it and registers entrance (function interface for being provided with registering functional), due to the real name at placeUsually there is subscriber identity information in terminal applies processed, it, can be first described in automatic trigger thus after recalling the registration entranceIdentity information acquisition instruction, and the instruction is responded, the relative users body having had in system of real name terminal applies described in automatic collectionPart information is as first identity information, without being manually entered one by one by user again, to promote the convenience of user's operationAnd the information collection efficiency of terminal.
First identity information of the automatic collection can be the user identity having had in the system of real name terminal applies of userAt least part of the information in information can specifically include but be not limited to system of real name terminal applies account, user mobile phone number and/or instituteAssociated bank card account etc., certainly, if the subscriber identity information acquired from system of real name terminal applies is not comprehensive enough or is not inconsistentIt closes and requires (not collecting any effective payment account such as), this can also be not added by the manual amended record of user, the present embodimentIt limits.
The registering unit 1103, is specifically used for: generating the first body for corresponding at least partly user's identity informationPart mark;First identity is sent to the target background system by the registration entrance, so that being based on instituteIt states the first identity and carries out identity registration in the target background system.
In practical application, certain unmanned shops/unmanned supermarket may be not fully credible, for a user, if userIdentity information is obtained by various unmanned shop/unmanned supermarket background system, and if lacking effectively supervision, user identityThere is the risk being compromised in information, be based on this consideration, and the present embodiment provides be on unmanned shop/unmanned supermarket target backstageSystem carries out another implementation of customer identity registration, which believes specific to first identity collectedBreath generates unique first identity for it, which can be User ID, subscriber-coded,Or first identity information is carried out using corresponding message digest algorithm to calculate a resulting digest value.By for acquisitionSubscriber identity information generate corresponding first identity, Lai Yinzang user sensitive information.It is subsequent based on thisOne identity rather than actual subscriber identity information carry out customer identity registration in the target background system.
It, can be by the first body of user of acquisition after the first identity corresponding to its first identity information is generated for userPart information and the first identity of generation are bound, and refering to Fig. 4, by the registration entrance by the first identity markKnowledge is sent to the target background system, in this manner it is possible to be based on the first identity (such as User ID, user identityThe digest value etc. of information), user identity is carried out in unmanned shop/unmanned supermarket background system namely the target background systemRegistration, thus, for the target background system, first identity of only user is visible, and userSystem of real name application account, contact method, the actual identities information such as payment account, rdativery sensitive is then invisible, accordingly also just advisesIt has kept away and has been compromised risk.
But, it should be noted that the system of real name application end due to first identity in mobile terminal is and userWhat these true subscriber identity informations such as system of real name application account, contact method, payment account were mutually bound, hence for subsequentPayment and settlement, user's connection is (such as to some favor informations in limited time of user's push, when settling accounts abnormal to user feedback exceptionInformation or user tracking) etc., unmanned shop/unmanned supermarket background system still is able to by the system of real name terminal appliesApplication platform (the application backstage of these terminal applies is comparatively more credible) obtains effective connection with user and can carry out justThe processing such as normal payment and settlement, user tracking.
On this basis, as shown in figure 12, the information processing unit can also include:
Third acquiring unit 1106, for obtaining the target background system to the feedback information of the location information.
Movement after the location information of user passes through verifying, in the present embodiment, from from the target background system to userTerminal sends one for characterizing user location by the feedback information of verifying, which can be form of message or instruction shapeFormula.
Control control unit 1107, if indicating that the location information by verifying, is transferred and shown for the feedback informationShow an access control control, and controls the access control control and be in operable state.
Mobile terminal is receiving the described anti-of the target background system such as the system of real name terminal applies of mobile terminalAfter feedforward information, transfers and show an access control control (control such as specifically can be a virtual door open button), and controlThe access control control is in operable state, is supported by user with this by operating the control come opening gate, that is, willThe trigger action that gate inhibition opens is arranged in user terminal.
The transmission unit 1105 can be also used for the case where receiving the operation information to the access control controlUnder, an open command is generated, and send the open command to the target background system, so that the target background systemAccess control is opened.
If mobile terminal receives user to the operation information of the access control control, it is such as clicking or press on the gate inhibitionThe operation information etc. for controlling control, then generate an open command, and sends the instruction to the target background system, target backstageSystem can trigger the control to gate inhibition because responding the instruction, and control unmanned shop/unmanned supermarket gate inhibition unlatching, to allowUser enters.
It should be noted that in user into behind shop, generally automatically controlling gate inhibition's closing by target background system, it is exemplaryGround, target background system can specifically be carried out based on timing (timing duration reaches the setting duration for being sufficient to make user to enter in shop)Gate inhibition closes control, or is also based on monitoring (detect user into shop behavior) and carries out gate inhibition and close to control etc..
The present embodiment carries out access control on the basis of completing customer identity registration, in conjunction with customer position information, canOpening gate in the case where remote login is avoided, the safety in unmanned shop is improved.In addition, the present embodiment is by mobile wholeSystem of real name terminal applies on end are implemented the application method, improve the application method application when convenience, andIdentity note is carried out with the user real identification information of the identification informations replacement acquisition such as User ID in system of real name terminal appliesVolume, can effectively hide user sensitive information, avoid user sensitive information after the low unmanned shop of trusting degree/unmanned supermarketLeakage of information risk in platform system.
In one alternative embodiment of the application, the control control unit 1107 be can be also used for: predetermined beyond firstIn the case that duration does not receive the operation information to the access control control, control the access control control be in it is non-canMode of operation.
In the present embodiment, if exceeding the first scheduled duration, such as 30s or 60s, user is not received to the access controlThe operation information of control then controls the access control control and is in non-operable state, that is, controls the access control controlFailure.
User can be effectively prevented in this way due to offhand decision does not enter shop/supermarket far from the case where, to gate inhibition'sIt opens by mistake and opens, further ensure the safety of unmanned shop/unmanned supermarket.It is subsequent, if user determines into unmanned shop/nothing againPeople supermarket does shopping, then the access control control of operable state can be recalled again by the registration entrance, that is, quiteThe access control control is activated in the two dimensional code by scanning target background system again.
In one alternative embodiment of the application, the control control unit 1107 be can be also used for:
The number of operations of the access control control of the detection in operable state, if the number of operations reaches predeterminedNumber then controls the access control control and is in non-operable state.
For in principle, unmanned shop/unmanned supermarket is people registration, a people into shop, it is contemplated that in practical application,Often there is kinsfolk or companion together into the situation in shop, can also suitably relax the limitation, for example, people registration, a few people intoShop etc., but in order to avoid people registration, excessive people are chaotic into personnel caused by shop, are difficult to manage (this also just further increasingAdd security risk) the case where, in specific implementation, the maximum of the access control control in operable state can be limitedNumber of operations, wherein if the number of operations of access control control reaches preset maximum number of operations, such as 3 times, then described in controlAccess control control is in non-operable state, that is, the activation each time of access control control is all to have number of operations limitation, access control control fails if the maximum number of operations for reaching preset.
The numerical value of the maximum number of operations can according to demand be configured it by the administrative staff of target background system.
Through this process, it can effectively prevent the phenomenon that people registration, excessive people are into shop generation, e.g., avoid people noteAfter volume success, the operation access control control (operating outdoors or in door) of no maximum carrys out continuous opening gate, allow it is excessive notAccredited personnel can accordingly reduce unmanned shop/unmanned supermarket security risk into shop etc..
In one alternative embodiment of the application, the control control unit 1107 be can be also used for:
In the case where the access control control is in non-operable state, if in the second scheduled duration again byThe access control control is transferred and shown to the registration entrance of the target background system, then controls at the access control controlIn non-operable state, the access control control is controlled when until reaching second scheduled duration and is in operable state.
As described above, in the failure of access control control, (such as user does not operate access control control because temporarily busy, causesIts time-out failure) after, it, can be again by the registration entrance if user still has into unmanned shop/unmanned supermarket demandThe access control control of operable state is recalled, that is, can be by being scanned described in the two dimensional code activation of target background system againAccess control control.Wherein, which may is that scan the two-dimensional code after, when will be registered by mobile terminalGenerated first identity and terminal positional information are sent to target background system, after the location information is by targetAfter the verifying of platform system, mobile terminal can receive the feedback information that the expression of target background system transmission is verified, in turnThe access control control can be activated again, controlled it and be in operable state.
For this function of activating access control control again, multiple barcode scanning in people's short time, is let off in order to preventThe phenomenon that more people are into shop occurs and (and then causes personnel chaotic, it is difficult to manage, accordingly also increase security risk), and the present embodiment isThe function is provided with minimum interval when access control control repeatedly activates, such as 5 minutes, 10 minutes, thus, describedAccess control control is in non-operable state namely failed situation, if in the corresponding second pre- timing of the time intervalRegistration entrance in long again by the target background system is transferred and shows the access control control, that is, leading to againIt crosses barcode scanning and activates the access control control, then control the access control control and be in non-operable state, until reaching instituteThe access control control is just controlled when stating the second scheduled duration is in operable state.It can avoid a people to a certain extent in this wayMultiple barcode scanning in short time, the phenomenon that letting off more people into shop generation.
In specific implementation, duration, base are effectively operated based on control in combination with using above-mentioned provided by the embodiment of the present applicationIn number, the control strategy based on the time interval etc. between adjacent activation twice, unmanned shop/unmanned supermarket gate inhibition is controlledControl processed carries out state control, on the basis of ensuring user's legitimate rights and interests, while guaranteeing unmanned shop/nobody is super as far as possibleThe operation security in city.
In one alternative embodiment of the application, refering to fig. 1 shown in 3, which can also include:
Authority request unit 1108, is used for: generating and shows that one obtains subscriber identity information acquisition permission for requestingAuthority request;The response message for corresponding to the authority request is obtained, if response message characterization allows to obtain user identityThe step of information collection permission, triggering the first identity information acquisition of the acquisition instructs and acquires the first identity information of user.
In specific implementation, after the registration entrance for obtaining target background system, and the system of real name for acquiring user is answeredBefore first identity informations such as account, contact method and/or associated bank card account, user can also be requested to weigh firstLimit, and specifically on customer mobile terminal, show that one is used on such as small routine interface of the system of real name terminal appliesThe solicited message of family permission, later, can by detection user response corresponding operating performed by the request (such as user presses" permission " button, or press " refusal " button) operation information, to determine whether to get the power of acquisition subscriber identity informationLimit just continues to acquire subscriber identity information, and execute use only in the case where getting the permission of acquisition subscriber identity informationOtherwise family identity registration process then terminates user identity in the register flow path of target background system.
The present embodiment requests user right before acquiring subscriber identity information first, it is ensured that under the premise of user's authorizationThe acquisition for carrying out user's related identification information, can further promote the safety of user information, in addition, also improving user's participationDegree, can at least improve the use feeling to the more sensitive user of self-identity information.
In one alternative embodiment of the application, refering to fig. 1 shown in 4, which can also include:
Acquisition mode selecting unit 1109, is used for: display one includes at least the first acquisition mode, second acquisition mode mentionsShow interface;If detecting the operation information for selecting first acquisition mode, the first identity information acquisition of the acquisition is triggeredInstruct and acquire the treatment process of the first identity information of user;If detecting, the operation for selecting second acquisition mode is believedBreath then obtains the instruction of the second identity information acquisition, and acquires the second identity information of user, and second identity information includes usingThe biological information at family;The second identity for corresponding to second identity information is generated, by second identityIt is sent to the target background system with the biological information, so that based on second identity and the biologyCharacteristic information carries out identity registration in the target background system.
The unmanned public safety of unmanned shop/unmanned supermarket etc., will necessarily be related to the payment and settlement of commodity, tie in paymentIn calculation field, effective, the convenient and fast means of payment of one kind is the payment and settlement based on biological information (face, fingerprint), such as brush face branchPay etc..Which is associated with payment account by user biological information in advance, such as by user's human face data and Alipay account orBank card account is associated etc., subsequent to trigger payment and settlement process by biological informations such as acquisition faces, has convenient, fastPrompt advantage.
The payment and settlement based on biological information, need on it is registered in advance have the biological information of user premised on, this is just neededUser biological information is acquired in advance when user carries out identity registration to target background system.In practical application, it is contemplated that oneThe quick payment demand of certain customers and another part user, can be in unmanned shop/nothings to the sensitive feature of its biological informationOn the registration entrance of the background system of people supermarket, while providing and corresponding to conventional payment clearing form (payment of brush bank card, scanningTwo dimensional code payment) the first acquisition mode, and corresponding to the of the above-mentioned quick payment clearing form based on biological informationTwo acquisition modes, for selection by the user.
Wherein, first acquisition mode, it is only necessary to acquire system of real name terminal applies account, contact method and/or the pass of userThe non-biometrics information such as bank card account of connection, and these the abiotic spies of second acquisition mode in addition to user need to be acquiredReference breath, it is also necessary at least one of user of acquisition biological information, such as face information, finger print information.
To after recalling its registration entrance, show first in the unmanned shop of scanning input/unmanned supermarket two dimensional codeOne includes at least the prompting interface of first acquisition mode, the second acquisition mode, to prompt user to select a certain kind thereinMode carries out identity information acquisition.
Wherein, if detecting, user selects the operation information of first acquisition mode (to correspond to described first as clickedThe operation button of acquisition mode), then mobile terminal is triggered, as triggered the little Cheng in a certain system of real name terminal applies of mobile terminalSequence acquires registered system of real name terminal applies account, contact method and/or associated bank in the system of real name terminal appliesThe non-biometrics information such as card account.
It is subsequent to carry out customer identity registration based on these non-biometric information, it such as generates and corresponds to these abiotic spiesFirst identity is simultaneously registered to target background system etc. by the first identity of reference breath;In this mode, work as userAfter shopping, by brush bank card or it the payment and settlement that modes carry out commodity such as can scan the two-dimensional code.
If detecting, user selects the operation information of second acquisition mode (to correspond to the second acquisition side as clickedThe operation button of formula), then it is answered in addition to triggering mobile terminal acquires registered system of real name terminal in the system of real name terminal appliesWith non-biometrics information such as account, contact method and/or associated bank card accounts, while also triggering taking the photograph for mobile terminalThe physical characteristics collectings devices such as picture head or fingerprint sensor are opened, and the biological informations such as face or fingerprint for acquiring user.
After acquisition obtains these non-biometrics and biological information, to hide user sensitive information, mobile terminalThe second identity corresponding to these information can be generated, which equally can be User ID, a userCoding calculates resulting digest value based on identity information of the corresponding message digest algorithm to acquisition, and can be by generated secondIdentity and the biological information are transmitted to target background system together, thus, in this case, it can specifically be based on instituteThe biological information for stating the second identity and user carries out customer identity registration.Complete registration on the basis of, it is subsequent canThe payment and settlement process to purchased commodity is triggered by acquiring the biological information of user, specifically, for example, can be in shopThe one or more settlement systems with camera of payment region setting, or one or more camera shootings can also be only setHead, and these cameras are connected with backstage settlement system, so as to trigger payment and settlement process by acquisition face, tieSettlement information (such as payment amount) is transmitted to corresponding to the face number by calculation system after collecting the biological informations such as faceAccording to mobile terminal system of real name terminal applies in, in this way, can mobile terminal system of real name terminal applies (be substantially byThe processing is executed in the application platform of system of real name terminal applies) in, the branch for the biological information binding for getting and specifyingIt pays a bill family, and then payment and settlement is carried out based on the payment account.Compared to brush bank card or scan the two-dimensional code equal payment and settlements sideFormula, which are apparently more convenient, fast.
In addition, it is necessary to explanation, if user, which has been based on above-mentioned first acquisition mode, has registered it to target background systemNon-biometric information, at subsequent any moment, if user is based on the considerations of convenient payment, (such as user continually accesses a certain nothingPeople does shopping in shop or user is after accessing a certain unfamiliar shop, generates interest to it, consequently, it is possible to consider toThe background system renewal of registration in the shop its biological information), it needs further register its biological information to target background system, then usesFamily (can scan the two-dimensional code such as in shop or outside shop by entering the registration entrance of the target background system and transfer target background systemRegistration entrance etc.), to biological informations such as target background system amended record its human face datas, in order to support its subsequent baseIt is settled accounts in the quick payment of biological information.
The present embodiment is provided simultaneously by the registration entrance in target background system and is only used for acquisition user's non-biometricSecond acquisition side of the first acquisition mode of information and non-biometric information and biological information for acquiring userFormula, not only can satisfy the identity registration demand of the acquisition more user of sensitivity to its biological information, but also can satisfy toolThere is the identity registration demand of the user of quick payment demand, may make user that there is preferably experience.
In one alternative embodiment of the application, a kind of storage medium is also disclosed, is at least stored with one in the storage mediumGroup instruction set;The instruction set can be used to execute information processing side disclosed in any embodiment as above when being called and executingMethod.
The storage medium can be but not limited to ROM (Read-Only Memory, read-only memory), RAM (RandomAccess Memory, random access memory), USB flash disk, magnetic disk, CD etc. is any form of can be used to carry out the hard of information storagePart equipment.
In one alternative embodiment of the application, a kind of mobile terminal is also disclosed, refering to fig. 1 the mobile terminal shown in 5Structural schematic diagram, the mobile terminal include at least:
Memory 1501, at least storing one group of instruction set;
Processor 1502, for calling and executing the described instruction collection in the memory, by executing described instruction collectionExecute information processing method disclosed in any embodiment as above.
The mobile terminal can specifically be but not limited to following any type of terminal device: smart phone, tablet computer,The terminal devices such as intelligent wearable equipment (such as Intelligent bracelet/foot ring), number assistant.More specifically, the movement is wholeIt end can be right using any one forms such as terminal applies, web application, applet/application plug-in or terminal local functionsInformation processing method disclosed in the application any embodiment as above carries out function realization.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weightPoint explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For convenience of description, it describes to be divided into various modules when system above or device with function or unit describes respectively.Certainly, the function of each unit can be realized in the same or multiple software and or hardware when implementing the application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application canIt realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the applicationOn in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software productIt can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment(can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodimentMethod described in part.
Finally, it is to be noted that, herein, such as first, second, third and fourth or the like relational termsIt is only used to distinguish one entity or operation from another entity or operation, without necessarily requiring or implying theseThere are any actual relationship or orders between entity or operation.Moreover, the terms "include", "comprise" or its is anyOther variants are intended to non-exclusive inclusion, so that including the process, method, article or equipment of a series of elementsInclude not only those elements, but also including other elements that are not explicitly listed, or further includes for this process, sideMethod, article or the intrinsic element of equipment.In the absence of more restrictions, limited by sentence "including a ..."Element, it is not excluded that there is also other identical elements in the process, method, article or apparatus that includes the element.
The above is only the preferred embodiment of the application, it is noted that for the ordinary skill people of the artFor member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answeredIt is considered as the protection scope of the application.

Claims (10)

CN201910784880.9A2019-08-232019-08-23A kind of information processing method, device, storage medium and mobile terminalPendingCN110503756A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910784880.9ACN110503756A (en)2019-08-232019-08-23A kind of information processing method, device, storage medium and mobile terminal

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910784880.9ACN110503756A (en)2019-08-232019-08-23A kind of information processing method, device, storage medium and mobile terminal

Publications (1)

Publication NumberPublication Date
CN110503756Atrue CN110503756A (en)2019-11-26

Family

ID=68589195

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910784880.9APendingCN110503756A (en)2019-08-232019-08-23A kind of information processing method, device, storage medium and mobile terminal

Country Status (1)

CountryLink
CN (1)CN110503756A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN117081874A (en)*2023-07-072023-11-17汉斯(上海)智能家居科技股份有限公司Intelligent home personalized data analysis system and method based on big data

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101174948A (en)*2006-11-022008-05-07上海银晨智能识别科技有限公司Network login system and method with face authentication
CN101894404A (en)*2010-07-292010-11-24深圳市戴文科技有限公司Method for realizing access control, terminal, access control device and access control system
EP3200161A1 (en)*2016-01-272017-08-02Honeywell International Inc.Remote application for controlling access
CN108230508A (en)*2018-01-092018-06-29桑田智能技术(上海)有限公司One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method
CN108734828A (en)*2018-04-162018-11-02氪空间(北京)信息技术有限公司Yunmen prohibits Information Authentication method, terminal and server
CN109377623A (en)*2018-11-202019-02-22北京千丁互联科技有限公司Gate inhibition's passing method, device and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101174948A (en)*2006-11-022008-05-07上海银晨智能识别科技有限公司Network login system and method with face authentication
CN101894404A (en)*2010-07-292010-11-24深圳市戴文科技有限公司Method for realizing access control, terminal, access control device and access control system
EP3200161A1 (en)*2016-01-272017-08-02Honeywell International Inc.Remote application for controlling access
CN108230508A (en)*2018-01-092018-06-29桑田智能技术(上海)有限公司One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method
CN108734828A (en)*2018-04-162018-11-02氪空间(北京)信息技术有限公司Yunmen prohibits Information Authentication method, terminal and server
CN109377623A (en)*2018-11-202019-02-22北京千丁互联科技有限公司Gate inhibition's passing method, device and server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN117081874A (en)*2023-07-072023-11-17汉斯(上海)智能家居科技股份有限公司Intelligent home personalized data analysis system and method based on big data
CN117081874B (en)*2023-07-072024-04-30汉斯(上海)智能家居科技股份有限公司Intelligent home personalized data analysis system and method based on big data

Similar Documents

PublicationPublication DateTitle
CN104616132B (en)A kind of logistic information management system and method
KR101441472B1 (en)Access monitoring method, information processing apparatus, and computer-readable medium storing access monitoring program
CA2117440C (en)Integrated point-of-sale multiple application system
JP5867635B2 (en) Tag management system, tag management method, information providing system, information providing method, and devices used therefor
CN105678872A (en)Entrance guard manage system, authorization method thereof and entrance guard terminal device
EP3702944B1 (en)System, method, and computer program product for authentication by augmented reality for fraud prevention
CN113421087B (en)Payment processing method, device and server
CN107316395A (en)A kind of autonomous system for borrowing and returning of sports equipment and its method
CN109213310A (en)Information interaction equipment, data object information processing method and processing device
CN109859415B (en) Library system and method therefor
CN108337235A (en)A kind of method and system executing safety operation using safety equipment
CN110766388B (en)Virtual card generation method and system and electronic equipment
CN110503756A (en)A kind of information processing method, device, storage medium and mobile terminal
CN107786349A (en)A kind of method for managing security and device for user account
CN114519576A (en)Resource transfer and control method and device thereof, electronic equipment and storage medium
KR102575213B1 (en)APPARATUS AND METHOD for displaying codes
JP2004021332A (en)Network connection service method, network connection service device, program for customer terminal and program for staffer terminal
CN113077372B (en)Service processing method and device and computer equipment
CN110378713A (en)Method for building up and device, storage medium, the electronic equipment of corresponding relationship
WO2020009658A1 (en)Identity or security authentication device for electronic system using visual patterns or codes
KR101502377B1 (en)Mobile communication terminal with authentication function using registered security card, system for payment authentication using the mobile communication terminal, and method thereof
CN109299949A (en)A kind of payment mechanism and method of payment based on iris recognition
JP2015069343A (en)Shopping system
KR20150102292A (en)System and method for providing location authentication service using message
KR101342534B1 (en)A service method for simultaneous exchange of personal information and system for the same

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20191126


[8]ページ先頭

©2009-2025 Movatter.jp