Abstract:
The present application is directed to apparatuses and methods for preventing information disclosure. According to example embodiments of the present application, after a mobile terminal of a user is lost, a first short message may be sent to the mobile terminal through a short message network. When the mobile terminal determines that the received short message is the first short message, user information stored in the mobile terminal may be erased by the mobile terminal.
Abstract:
A method for submitting an order for use in a terminal, includes: scanning a pre-generated near field communication (NFC) tag to obtain tag data, wherein the tag data includes at least an identification code of a third-party service provider and transaction information; generating an order according to the identification code, the transaction information, and user information; and sending the order for a server to process to obtain the identification code, the transaction information, and the user information, and to further send the transaction information and the user information to the third-party service provider corresponding to the identification code.
Abstract:
A method and an apparatus of verifying a terminal are provided in the field of computer technology. In the method, the terminal establishes a secure channel with a server through a secure element in the terminal. The terminal sends original terminal hardware parameters in the secure element to the server through the secure channel by using the secure element, where the server is configured to feed back identification information according to the terminal hardware parameters. The terminal then determines a verification result of an authenticity of the terminal according to the identification information fed back by the server. The apparatus includes: a channel establishing module, a parameter sending module and a result determining module. The present disclosure solves the problem that the verification application program cannot identify the authenticity of the terminal due to the degradation of the terminal performance, and achieves the effect that the accuracy of the authenticity of verifying the terminal is improved.
Abstract:
A method and an apparatus of verifying a terminal are provided in the field of computer technology. In the method, the terminal establishes a secure channel with a server through a secure element in the terminal The terminal sends original terminal hardware parameters in the secure element to the server through the secure channel by using the secure element, where the server is configured to feed back identification information according to the terminal hardware parameters. The terminal then determines a verification result of an authenticity of the terminal according to the identification information fed back by the server. The apparatus includes: a channel establishing module, a parameter sending module and a result determining module. The present disclosure solves the problem that the verification application program cannot identify the authenticity of the terminal due to the degradation of the terminal performance, and achieves the effect that the accuracy of the authenticity of verifying the terminal is improved.
Abstract:
An information interaction method and device are provided. In the method, the device establishes a connection with a wearable device. The device sends information to be interacted corresponding to a logged-in ID to the wearable device via the connection. The device receives a first encrypted result returned by the wearable device. The device generates a first verifying factor corresponding to the first encrypted result with a predetermined algorithm. The device sends the information to be interacted and the first verifying factor in an associated manner to a server. The device receives a message indicating that an interaction is finished, where the message is sent if the server determines that a second verifying factor generated with the predetermined algorithm and corresponding to a second encrypted result matches the first verifying factor. The second encrypted result is obtained by encrypting the information by the server with the pre-stored encryption key.
Abstract:
A method for submitting an order for use in a terminal, includes: scanning a pre-generated near field communication (NFC) tag to obtain tag data, the tag data including an identification code of a service provider and transaction information; generating an order according to the identification code, the transaction information, and user information; and sending the order to the service provider corresponding to the identification code.
Abstract:
A method for submitting an order for use in a terminal, includes: scanning a pre-generated near field communication (NFC) tag to obtain tag data, the tag data including an identification code of a service provider and transaction information; generating an order according to the identification code, the transaction information, and user information; and sending the order to the service provider corresponding to the identification code.
Abstract:
A method for submitting an order for use in a terminal, includes: scanning a pre-generated near field communication (NFC) tag to obtain tag data, wherein the tag data includes at least an identification code of a third-party service provider and transaction information; generating an order according to the identification code, the transaction information, and user information; and sending the order for a server to process to obtain the identification code, the transaction information, and the user information, and to further send the transaction information and the user information to the third-party service provider corresponding to the identification code.
Abstract:
The present disclosure is related to a payment verification system, method and apparatus, which pertain to the field of security technologies. The system includes a device verification server and at least one payment verification server. The device verification server is configured to register the at least one payment verification server to provide a payment service that is based on biometric recognition, and verify a user device in response to a request from the user device to activate a payment function for the user device that is based on biometric recognition. The payment verification server is configured to verify a payment application that is used on the user device in response to the request when the user device is verified with success, activate the payment function for the user device when the payment application is verified with success, and verify one or more payment requests from the user device.
Abstract:
A method, apparatus, and system are provided for displaying usage records. The method includes: reading a usage record stored in a transportation card and acquiring a terminal number corresponding to the usage record; transmitting a route identifier query request to a server, the route identifier query request including the terminal number corresponding to the usage record; receiving a route identifier of a vehicle associated with the terminal number of the usage record; and displaying the usage record as well as the route identifier of a vehicle associated with the terminal number corresponding to the usage record.