Abstract:
A method, an apparatus, a server and a terminal of accessing a network are disclosed. The method includes: receiving a first base station identifier and a first terminal identifier of a terminal from the terminal, the first base station identifier being a base station identifier of a first Bluetooth base station acquired by the terminal after establishing a connection with the first Bluetooth base station; obtaining a first access point device associated with the first Bluetooth base station based on the first base station identifier; and sending an access instruction to the first access point device to cause the first access point device to allow the terminal to access a wireless network upon verifying that the terminal has been registered based on the first terminal identifier. Using the embodiments of the present disclosure, a terminal can automatically access a wireless network without the need of a terminal user to perform cumbersome input operations manually, thereby improving the speed of accessing a network.
Abstract:
A user identity verification method is disclosed. The method includes receiving an identity verification request sent by a user through a client terminal; determining a user communication number according to the identity verification request and generating a corresponding temporary communication number for the user communication number; recording the user communication number and the temporary communication number as first data; returning the temporary communication number to the client terminal; receiving a call request initiated by the user to the temporary communication number; determining a respective user communication number and a respective temporary communication number corresponding to the call request as second data; verifying whether the first data matches with the second data; and returning a verification result to the client terminal. The method can improve security and reliability of identity verification, reduce a user's waiting time, and enhance user experience.
Abstract:
Methods, apparatuses and systems of payment verification are disclosed. A method includes receiving a request for connecting to a receiver access point (AP) from a terminal of a payer to be verified and geographical location information of the receiver AP, verifying whether account information included in the request matches with pre-stored payment account information; returning a verification result to the receiver AP; receiving a payer terminal geographical location information verification request from a payment server if the verification result indicates a match; verifying geographical location information of the terminal of the payer to be verified based on the geographical location information of the receiver AP; and returning a verification result of the payer terminal geographical location information verification request to the payment server. The method increases the security of a payment process and prevents a legitimate user from suffering financial losses and unnecessary troubles.
Abstract:
Embodiments of the present application provide an identity authentication method, business server, authentication server and identity authentication system. According to some embodiments, the method includes acquiring a first user identification code corresponding to a client when a data interaction request sent by the client is received, sending the first user identification code to the authentication server, acquiring an intermediate number corresponding to the first user identification code from the authentication server, sending the intermediate number to the client for a client-side user to initiate a call request to the intermediate number using a telephone communication network, receiving an authentication result of the identity authentication from the authentication server according to the call request, and processing the data interaction request according to the authentication result. The identity authentication method of embodiments of the present application improves the reliability and security of identity authentication.