Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for information verification based on information identification code

A technology for information identification and information verification, applied in the field of information verification, can solve problems such as no effective solution, inability to quickly realize verification, narrow scope of application, etc.

Active Publication Date: 2017-06-13
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 79 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The problems of using the existing technology are: 1) Only for specific users, the range of users will be limited, and the realization of virtualization technology cannot benefit most people, and the scope of application is narrow, and the original design intention of this kind of application for specific users is too dependent It is difficult to continue to expand the development of a specific system architecture in the later stage. Only the original intention of the universal design suitable for most people can meet the needs of users and facilitate subsequent expansion and development; 2) Networking is very convenient, but it is necessary to fully consider various Such a situation, such as a situation where there is no network or the network situation is not good, and the existing technology as an online verification scheme cannot meet the verification requirements when there is no network or the network situation is not good, that is to say, for the situation of no network Verification cannot be realized. Even if online verification can be realized in the case of bad network conditions, the online delay caused by fluctuations in network conditions will cause a large number of users to stay and queue, and verification cannot be quickly realized.
[0004] In the related art, there is no effective solution for the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for information verification based on information identification code
  • Method and system for information verification based on information identification code
  • Method and system for information verification based on information identification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] The implementation of the technical solution will be further described in detail below in conjunction with the accompanying drawings.

[0089] A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, the use of suffixes such as "module", "component" or "unit" used to represent elements is only to facilitate the description of the embodiments of the present invention, and has no specific meaning by itself. Therefore, "module" and "component" may be used mixedly.

[0090] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been disclose...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for information verification based on an information identification code. The method includes the steps that according to a locally stored preset strategy, the information identification code is generated, and first identification used for representing the identity of a user and a second identification used for representing generation time of the information identification code are carried in the information identification code; a first terminal initiates a first request according to the information identification code to request that a second terminal verifies the identity of the user to meet a target requirement; the second terminal compares and verifies the first identification and a locally stored preset information verification library to determine the identity of the user; the second terminal compares and verifies the second identification and current time of the second terminal, if a time differential value is within a preset time range, comparison and verification are passed, the second terminal receives the first request initiated by the first terminal, and after a server carries out effective verification, corresponding processing related to the target requirement is carried out.

Description

technical field [0001] The invention relates to information verification technology, in particular to a method and system for information verification based on an information identification code. Background technique [0002] Subway and bus travel are an indispensable part of users' lives. At present, physical one-way tickets or all-in-one cards are used as tickets for rides. With the intelligentization of terminals and the convenience of networking, the virtualization of tickets has become a new trend. After the virtualization of tickets, users only need to take out their mobile terminals and swipe the corresponding identifier to pay for the ride. A technical solution of ticket virtualization in the prior art is: displaying a QR code and verifying the payment online to ensure that the user pays for the ride, and it is only used for specific users who have opened a designated payment channel. [0003] The problems of using the existing technology are: 1) Only for specific u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07B11/00G07B15/04G07C9/00G06Q20/14G06Q20/22G06Q20/24
CPCG06Q20/145G06Q20/22G06Q20/24G07B11/00G07B15/04G07C9/20G06Q50/26H04L9/3226H04L9/3247H04L63/101H04L63/0823G06Q20/327G06Q20/3827G06Q20/3829G06Q20/14G06Q2220/00G07B15/02H04L9/30G06Q20/40
Inventor 陈冲代星星吴镇权唐茂宋凌云胡宏阳
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products