CN105871786B - A kind of verification method of user information, device and system - Google Patents

A kind of verification method of user information, device and system Download PDF

Info

Publication number
CN105871786B
CN105871786B CN201510033288.7A CN201510033288A CN105871786B CN 105871786 B CN105871786 B CN 105871786B CN 201510033288 A CN201510033288 A CN 201510033288A CN 105871786 B CN105871786 B CN 105871786B
Authority
CN
China
Prior art keywords
checking
platform
service
user information
checking credentials
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510033288.7A
Other languages
Chinese (zh)
Other versions
CN105871786A (en
Inventor
高玉涛
付歆
杨沐桥
沈洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510033288.7A priority Critical patent/CN105871786B/en
Publication of CN105871786A publication Critical patent/CN105871786A/en
Application granted granted Critical
Publication of CN105871786B publication Critical patent/CN105871786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the present application provides a kind of verification method of user information, device and system, this method comprises: receiving the first checking request that the first platform is sent;It searches and is identified with second service for checking credentials of one or more of first platform identification and first service for checking credentials identity map;At least using one or more of second services for checking credentials mark and first user information, one or more second checking requests are generated;One or more of second checking requests are respectively sent to one or more second platforms, and, receive one or more first verification results, wherein, one or more of first verification results are the result that one or more of second platforms carry out verifying acquisition for one or more of second services for checking credentials mark.The embodiment of the present application can increase the channel of verifying, and the mass data stored in the second platform can greatly increase the success rate of verifying.

Description

A kind of verification method of user information, device and system
Technical field
This application involves security technology areas, verification method, a kind of user information more particularly to a kind of user information Verifying device and a kind of user information verifying system.
Background technique
With the fast development of internet, business provided by each network platform is also more and more, to meet each of people Kind life requirement.
For example, the platform of communication company provides communication traffic, the platform of educational training company provides educational training business etc. Deng.
Due to network remote application business, user can not arrive in person scene and handle, and therefore, website generally can be to client Identity verified, need to fill in the user informations such as name, certificate number, mobile phone, address when a certain business of client's online application.
These user informations are handled according to certain interface format, rule on current platform, then call certain The API (Application Program Interface, application programming interface) that tripartite's information system provides, by third Square information system verifies the user informations such as the name, certificate number, mobile phone, address.
This verification mode is only verified by the third party's information system docked with current site, and verifying channel is single, Also, due to the user information limited amount of third party's information system storage, it is easy to cause the rate of being proved to be successful low.
For example, a user fills in identity card and cell-phone number, then identity card can from certain third party's information system into Row verifying, in the user and when the service of third party's information system is not used, which is not deposited The cell-phone number of user instantly is stored up, alternatively, although third party's information system has storage user information, but makes to use for some reason The amount of storage of family information is less, is not enough to support to verify, which can not but be verified in third party's information system.
Summary of the invention
In view of the above problems, it proposes the embodiment of the present application and overcomes the above problem or at least partly in order to provide one kind A kind of verification method of the user information to solve the above problems, a kind of verifying device of user information and a kind of testing for user information Card system.
According to a kind of aspect of the embodiment of the present application, the embodiment of the present application discloses a kind of verification method of user information, Include:
Receive the first checking request of the first platform transmission;It include the first platform identification, the in first checking request One service for checking credentials mark, the first user information;
It searches and is verified with the one or more second of first platform identification and first service for checking credentials identity map Service identifiers;
At least using one or more of second services for checking credentials mark and first user information, one or more is generated A second checking request;
One or more of second checking requests are respectively sent to one or more second platforms, and, receive one A or multiple first verification results, wherein one or more of first verification results are one or more of second platforms The result of verifying acquisition is carried out for one or more of second services for checking credentials mark.
Preferably, include authorization data in first checking request, include authorization data in second checking request.
Preferably, one or more searched with first platform identification and first service for checking credentials identity map A second service for checking credentials identify the step of include:
Search with first platform identification and first service for checking credentials identity map, hinge service for checking credentials mark and One or more second platform identifications;
Search one or more with one or more of second platform identifications and the hinge service for checking credentials identity map A second service for checking credentials mark.
It is preferably, described at least to use one or more of second services for checking credentials mark and first user information, The step of generating one or more second checking requests include:
Search the corresponding manner of decryption of first platform identification, one or more of second platform identifications corresponding one A or multiple cipher modes;
First user information is decrypted according to the manner of decryption, to obtain original user information;
The original user information is encrypted according to one or more of cipher modes, to obtain one or more Second user information;
One is generated using one or more of second services for checking credentials mark and one or more of second user information A or multiple second checking requests.
Preferably, second platform is verified in the following manner:
Extract the second service for checking credentials mark and the second user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
The second user information and preset third party's user information are verified using the service for checking credentials, to obtain Obtain the first verification result.
Preferably, first user information carries out encryption generation by specified public key, and second platform passes through following Mode is verified:
Extract second service for checking credentials mark and the first user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
Specified public key encrypts preset third party's user information using the service for checking credentials, to obtain feature User information;
It is verified using the second user information and the feature user information, to obtain the first verification result.
Preferably, first verification result includes at least one of logic checking result, Numerical Validation result.
Preferably, the method also includes:
Normalization is carried out using one or more of first verification results, to obtain the second verification result;
Second verification result is returned into first platform.
Preferably, the method also includes:
One or more of first verification results are returned into first platform and carry out normalization, to obtain second Verification result.
Preferably, the normalization includes at least one of logic normalization, numerical value normalization.
According to another aspect of the embodiment of the present application, the embodiment of the present application also discloses a kind of verifying dress of user information It sets, comprising:
First checking request receiving module, for receiving the first checking request of the first platform transmission;First verifying It include the first platform identification, first service for checking credentials mark, the first user information in request;
Second service for checking credentials identifier lookup module, for searching and first platform identification and first service for checking credentials Second service for checking credentials of one or more of identity map identifies;
Second checking request generation module is used at least identify using one or more of second services for checking credentials and described First user information generates one or more second checking requests;
Second checking request sending module, for by one or more of second checking requests be respectively sent to one or Multiple second platforms;
First verification result receiving module, for receiving one or more first verification results, wherein one or more A first verification result is that one or more of second platforms are carried out for one or more of second services for checking credentials mark Verify the result obtained.
Preferably, include authorization data in first checking request, include authorization data in second checking request.
Preferably, second service for checking credentials identifier lookup module includes:
First searches submodule, for searching and first platform identification and first service for checking credentials identity map , hinge service for checking credentials mark and one or more second platform identifications;
Second searches submodule, for searching and one or more of second platform identifications and the hinge service for checking credentials Second service for checking credentials of one or more of identity map identifies.
Preferably, the second checking request generation module includes:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of The corresponding one or more cipher modes of second platform identification;
Submodule is decrypted, it is original to obtain for first user information to be decrypted according to the manner of decryption User information;
Submodule is encrypted, for being encrypted according to one or more of cipher modes to the original user information, To obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second User information generates one or more second checking requests.
Preferably, second platform is verified in the following manner:
Extract the second service for checking credentials mark and the second user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
The second user information and preset third party's user information are verified using the service for checking credentials, to obtain Obtain the first verification result.
Preferably, first verification result includes at least one of logic checking result, Numerical Validation result.
Preferably, first user information carries out encryption generation by specified public key, and second platform passes through following Mode is verified:
Extract second service for checking credentials mark and the first user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
Specified public key encrypts preset third party's user information using the service for checking credentials, to obtain feature User information;
It is verified using the second user information and the feature user information, to obtain the first verification result.
Preferably, described device further include:
Normalization module, for carrying out normalization using one or more of first verification results, to obtain the Two verification results;
Second verification result return module, for second verification result to be returned to first platform.
Preferably, further includes:
First verification result return module, it is flat for one or more of first verification results to be returned to described first Platform carries out normalization, to obtain the second verification result.
Preferably, the normalization includes at least one of logic normalization, numerical value normalization.
According to another aspect of the embodiment of the present application, the embodiment of the present application also discloses a kind of verifying system of user information System, the system comprises the first platform, hinge platform, one or more second platforms;Wherein,
First platform includes:
First checking request sending module, for sending the first checking request to hinge platform;
The hinge platform includes:
First checking request receiving module, for receiving the first checking request of the first platform transmission;First verifying It include the first platform identification, first service for checking credentials mark, the first user information in request;
Second service for checking credentials identifier lookup module, for searching and first platform identification and first service for checking credentials Second service for checking credentials of one or more of identity map identifies;
Second checking request generation module is used at least identify using one or more of second services for checking credentials and described First user information generates one or more second checking requests;
Second checking request sending module, for by one or more of second checking requests be respectively sent to one or Multiple second platforms;
First verification result receiving module, for receiving one or more first verification results;
Second platform includes:
User information authentication module, for being verified for second service for checking credentials mark, to obtain the first verifying As a result;
First verification result sending module, for first verification result to be sent to the hinge platform.
Preferably, first platform further include:
First checking request generation module, for generating the first checking request when receiving service request;
Service Processing Module, for carrying out business processing using second verification result.
Preferably, include authorization data in first checking request, include authorization data in second checking request.
Preferably, second service for checking credentials identifier lookup module includes following submodule:
First searches submodule, for searching and first platform identification and first service for checking credentials identity map , hinge service for checking credentials mark and one or more second platform identifications;
Second searches submodule, for searching and one or more of second platform identifications and the hinge service for checking credentials Second service for checking credentials of one or more of identity map identifies.
Preferably, the second checking request generation module includes following submodule:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of The corresponding one or more cipher modes of second platform identification;
Submodule is decrypted, it is original to obtain for first user information to be decrypted according to the manner of decryption User information;
Submodule is encrypted, for being encrypted according to one or more of cipher modes to the original user information, To obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second User information generates one or more second checking requests.
Preferably, the user information authentication module includes following submodule:
First extracting sub-module, for extracting the second service for checking credentials mark and second user letter in the second checking request Breath;
First calls submodule, for calling second service for checking credentials to identify the corresponding service for checking credentials;
First verifying submodule, for being used using the service for checking credentials the second user information and preset third party Family information is verified, to obtain the first verification result.
Preferably, first user information carries out encryption generation, the user information authentication module by specified public key Include:
Second extracting sub-module, for extracting the mark of second service for checking credentials in the second checking request and the first user letter Breath;
Second calls submodule, for calling second service for checking credentials to identify the corresponding service for checking credentials;
Feature user information obtains submodule, for using the service for checking credentials to specified public key to preset third party User information is encrypted, to obtain feature user information;
Second verifying submodule, for being verified using the second user information with the feature user information, with Obtain the first verification result.
Preferably, first verification result includes at least one of logic checking result, Numerical Validation result.
Preferably, the hinge platform further include:
Normalization module, for carrying out normalization using one or more of first verification results, to obtain the Two verification results;
Second verification result return module, for second verification result to be returned to first platform.
Preferably, the hinge platform further includes following module:
First verification result return module, it is flat for one or more of first verification results to be returned to described first Platform carries out normalization, to obtain the second verification result.
Preferably, the normalization includes at least one of logic normalization, numerical value normalization.
The embodiment of the present application includes the following advantages:
The embodiment of the present application connects the first platform and the second platform by hinge platform, and the first verifying of the first platform is asked It asks through mapping, is translated as the second checking request, is verified by the second platform, on the one hand, the quantity of the second platform greatly increases Add, the channel of verifying can be increased, the mass data stored in the second platform can greatly increase the success rate of verifying;Another party Face, the first platform are docked with hinge platform, and without being coordinated with multiple second platforms, similarly, the second platform and hinge are flat Platform docking, without docking with multiple first platforms, hinge platform safeguards mapping relations as connection structure, and the first platform is not necessarily to It modifies to its parameter, the second platform is converted without to interface, so that the system of the first platform, the second platform changes Dynamic seldom, system maintains integrality, improves scalability and maintainability, while greatly reducing human and material resources cost, adds It, since hinge platform is absorbed in the mapping of various information.
Detailed description of the invention
Fig. 1 is a kind of platform architecture schematic diagram of the application;
Fig. 2 is a kind of step flow chart of the verification method embodiment of user information of the application;
Fig. 3 is a kind of structural block diagram of the verifying Installation practice of user information of the application;
Fig. 4 is a kind of structural block diagram of the verifying system embodiment of user information of the application.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Applying mode, the present application will be further described in detail.
If current platform finds more information sources, multiple third party's information systems are accessed, can be increased to a certain extent Add the channel of verifying user information and the success rate of verifying.
But the Parameter specifications of third party's information system are generally different from current platform, can not generally directly read The Parameter specifications of current platform, current platform generally requires the Parameter specifications according to its API provided, by the Parameter Switch of itself For its readable parameter, the service for calling it to provide to third party's information system is retransmited.
Current platform needs to carry out interface mode, transport protocol, data format, equipment performance etc. with third party's information system Coordinated.
In order to improve the comprehensive of verifying, the quantity of third party's information system of current platform access is generally very much, and same One third party's information system may also will convert multiple interfaces according to the requirement of each platform to multiple platforms, to current platform and The modification of third party's information system also can be very big, and the cost of required manpower and material resources is very big, very high so as to cause verifying cost, maintenance Property and scalability are very low, also, in many cases, the applications of the business of current platform more unexpected winner are very low, to current platform The more utilization rate of third party's information system verified of user information needed for the business of unexpected winner is also very low, leads to resource Service efficiency is very low.
Therefore, it is proposed to one of the core idea of the embodiment of the present application, as shown in Figure 1, between platform and platform, such as the Between one platform 101 and the second platform 104, hinge platform 102 is established, one or more second platforms 104 are macroscopically forming Third party's information pool 103, to improve the channel of verifying and the success rate of verifying, hinge platform 102 is used as hinge, can be to first The certificate parameter of platform is mapped, and the readable certificate parameter of the second platform is mapped as, and to reduce the modification to each platform, is guaranteed The maintainability and scalability of each platform itself, improve the service efficiency of resource.
Referring to Fig. 2, a kind of step flow chart of the verification method embodiment of user information of the application is shown, specifically may be used To include the following steps:
Step 201, the first checking request that the first platform is sent is received;
Platform, such as the first platform, the second platform, hinge platform are can to refer to mechanism for object (such as financial institution), company (such as insurance company), department (such as public security department), essence can be independent server or Person's server cluster, such as distributed system, Cloud Server.
In practical applications, hinge platform can be connected with multiple platforms, as the hinge between each platform, so that each flat It may not need direct docking between platform.
In the embodiment of the present application, the first platform can be the platform of requests verification user information, and the second platform can be The platform that user information is verified.
It should be noted that user information can carry out symmetrical two-way request and verifying between the platform of equity, often One platform can have the function of to possess the right and justice of equity of both requestor, verifier of user information etc. simultaneously Business.
Specifically, i.e. each platform (in addition to hinge platform) can be connected to other platforms by hinge platform, go forward side by side The request and verifying of row identity information, any two platform (in addition to hinge platform) can be with the first platforms each other, while again each other Second platform.
In the concrete realization, user can be sent by client (such as webpage, independent application program) to the first platform Service request, to apply for a certain business, for example, user applies for vehicle insurance industry to financial institution's application loan transaction, to insurance company Business etc..
It is more important since these business are usually directed to user, assets of the first platform etc., generally require the current use of verifying The personal identification at family identifies whether digital identity lawful owner is corresponding with operator in network, is service requester's Whether physical identity and digital identity correspond to.
In the embodiment of the present application, the personal identification of user can be tested by the personal exclusive information such as user information Card.
For example, financial institution can require to fill in name, certificate number, mobile phone, address when a certain business of client's online application Etc. user informations, the personal identification of user is verified.
It in the concrete realization, may include the first user information in the service request that client is submitted, the first platform can be with When receiving the service request that client is submitted, the first checking request is generated.
Specifically, the first platform can use preset first platform identification, the first platform identification, first service for checking credentials Mark, the first user information generate the first checking request, and are sent to hinge platform.
It then may include the first platform identification, first service for checking credentials mark, the first user letter in first checking request Breath.
Wherein, the first platform identification can be the information that can represent the first platform that one uniquely determines, the first verifying Service identifiers can be the information that can represent the readable service for checking credentials of the first platform that one uniquely determines.
Under normal conditions, since user information is more important, the first platform can be encrypted the first user information, be mentioned Safety of high first user information in transmission process.
The mode that first platform encrypts the first user information may include the cipher mode exclusive using the first platform, Can carry out encrypting using specified public key etc., the embodiment of the present application is without restriction to this.
Certainly, the first user information can not be encrypted, directly marks the first user in some specific scenarios Knowledge is encapsulated into the first checking request, but the first checking request needs to have privacy, for example, hinge platform only receives white name First checking request of the first platform in list, the embodiment of the present application are without restriction to this.
In addition, to further increase the safety of verifying user information, the first platform can send verifying to client and award Power prompt, for example, " XX mechanism whether is authorized to read you in the user information of XX company, XX mechanism, including name, cell-phone number."
If user returns to confirmation instruction to the first platform by client, it is equivalent to user and the verifying is used by client The behavior authorization of family information, for example, user is close for verifying authorization prompt input such as mobile phone identifying code, U-shield by client Stronger information of privacy such as code etc., then the first platform can generate the first checking request in the case where obtaining authorization.
If user returns to refusal instruction to the first platform by client, it is equivalent to instruction user and passes through client refusal pair The behavior authorization of the verifying user information, then the first platform can terminate to service.
It therefore, may include authorization data in first checking request, which, which can characterize, uses verifying The behavior authorization of family information, such as mobile phone identifying code, U-shield password.
Furthermore, hinge platform can open a specified api interface, and the first platform can call this specified Api interface passes through the corresponding URL of the API (Uniform Resource according to the Parameter specifications of the specified api interface Locator, uniform resource locator) to the second platform the first checking request of transmission, the requests verification user whether there is and work as The identical user information of preceding user information.
Step 202, the one or more with first platform identification and first service for checking credentials identity map is searched Second service for checking credentials mark;
In practical applications, hinge platform can be arranged with each platform in advance, and the first platform identification and first is arranged Service for checking credentials mark, and, mapping relations of one or more second services for checking credentials marks, hinge platform default can be reflected by this Relationship is penetrated to search and second service for checking credentials of one or more of the first platform identification and the first service for checking credentials identity map mark.
Wherein, second service for checking credentials mark, which can be, can represent the readable verifying clothes of the second platform that one uniquely determines The information of business.
Further, if the behavior of information of verifying user needs to authorize, hinge platform when detecting authorization data, It searches and is identified with second service for checking credentials of one or more of first platform identification and first service for checking credentials identity map.
In a preferred embodiment of the present application, step 202 may include following sub-step:
Sub-step S11 is searched and first platform identification and first service for checking credentials identity map, hinge verifying Service identifiers and one or more second platform identifications;
Sub-step S12 is searched and one or more of second platform identifications and the hinge service for checking credentials identity map Second service for checking credentials of one or more mark.
In the embodiment of the present application, hinge platform can store first service for checking credentials request mapping table, the second verifying clothes Business request mapping table.
Checking request ID can be recorded in first service for checking credentials request mapping table, the first platform identification, first tested Demonstrate,prove the information such as service identifiers, hinge service for checking credentials mark, the second platform identification.
Checking request ID can be recorded in second service for checking credentials request mapping table, the second platform identification, second tested Demonstrate,prove the information such as service identifiers, hinge service for checking credentials mark.
Wherein, the second platform identification can be the information that can represent the second platform that one uniquely determines, hinge verifying Service identifiers can be the information that can represent the readable service for checking credentials of hinge platform that one uniquely determines.
Hinge platform can request to search in mapping table and first platform identification and described the in first service for checking credentials One service for checking credentials identity map, hinge service for checking credentials mark and one or more second platform identifications, in second service for checking credentials It requests to search one with one or more of second platform identifications and the hinge service for checking credentials identity map in mapping table Or multiple second service for checking credentials marks.
The example of first service for checking credentials request mapping table can be such that
The example of second service for checking credentials request mapping table can be such that
Wherein, Ikcert is the mark of the readable ID card verification service of bank A, to request the identity card to user to carry out Verifying, certsvr are the mark of the readable ID card verification service of hinge platform, and Akcert is the readable identity of insurance company B The mark of the service for checking credentials is demonstrate,proved, Tmcert is the mark of the readable ID card verification service of property firm C.
The sequence of verifying can be first to verify from insurance company B, Zai Qu property firm C verifying.
It should be noted that the first platform can make an appointment, needs are verified to which the second platform, how to be verified (such as verifying sequence), the first platform can send verifying authorization prompt to client for second platform, and hinge platform can be with When detecting authorization data, the verifying of user information is carried out to second platform.
Step 203, it is at least generated using one or more of second services for checking credentials mark and first user information One or more second checking requests;
In practical applications, the second different platforms has different Parameter specifications, and hinge platform is according to different second The Parameter specifications of platform generate the second readable checking request of each second platform, the service for checking credentials for calling the second platform to provide.
Due to the first platform send user information generally carried out encryption, in order to the second platform to user information into Row verifying, the first platform, the second platform and hinge platform can in advance arrange user information.
In a preferred embodiment of the present application, step 203 may include following sub-step:
Sub-step S21 searches the corresponding manner of decryption of first platform identification, one or more of second platform marks Know corresponding one or more cipher modes;
Sub-step S22 is decrypted first user information according to the manner of decryption, to obtain original user letter Breath;
Sub-step S23 encrypts the original user information according to one or more of cipher modes, to obtain One or more second user information;
Sub-step S24, using one or more of second services for checking credentials mark and one or more of second users Information generates one or more second checking requests.
In the embodiment of the present application, since the system of different platform (such as the first platform, the second platform) has formed, respectively Using exclusive cipher mode and manner of decryption, to reduce the modification to each plateform system, the first platform and the second platform, with, Hinge platform can arrange cipher mode, manner of decryption, be converted by hinge platform to user information, and the first platform is readable The first user information be converted to the readable second user information of the second platform.
In another preferred embodiment of the present application, the first platform and the second platform can make an appointment the side of encryption Formula such as arranges specified public key, and hinge platform can not be handled the first user information, is sent directly to the second platform.
Step 204, one or more of second checking requests are respectively sent to one or more second platforms;
It should be noted that can not belong to mutually mutually between the first platform and the second platform and between the second platform, but Be can in face of identical user, the user can in the second platform register account number.
Second platform can open a specified api interface, and the api interface that hinge platform can call this specified is pressed According to the Parameter specifications of the specified api interface, matched second is sent to the second platform by the corresponding URL of the API and is tested Card request, request the second platform validation user whether there is user information identical with current user information.
In addition, the behavior needs for verifying user information are authorized to further increase the safety of verifying user information, Then authorization data can be written in the second checking request.
Then may include authorization data in second checking request, the second platform when detecting authorization data, for Second service for checking credentials mark carries out verification processing.
Step 205, one or more first verification results are received;
Wherein, one or more of first verification results can be directed to described one for one or more of second platforms A or multiple second service for checking credentials marks carry out the result of verifying acquisition.
In a preferred embodiment of the present application, second platform can be verified in the following manner:
Sub-step S31 extracts the second service for checking credentials mark and second user information in the second checking request;
Sub-step S32 calls second service for checking credentials to identify the corresponding service for checking credentials;
Sub-step S33, using the service for checking credentials to the second user information and preset third party's user information into Row verifying, to obtain the first verification result.
In the embodiment of the present application, hinge platform converts user information, by the first readable user of the first platform Information is converted to the readable second user information of the second platform.
Second platform can be directly used third party's user information that second user information stores with itself and verify, Obtain the first verification result.
It should be noted that third party's user information is for the first current platform, the second platform can be with It is considered the third party verified to user information, the essence of third party's user information is also possible to user information.
For different user informations, the different services for checking credentials can have, for example, name, the identity card of verifying user Number etc. can verify the mode that second user information is compared with third party's user information;In another example verifying user's Repaying ability etc. can directly inquire the corresponding repaying energy of the second users information such as user name, ID card No. of the user Power (third party's user information) etc., the embodiment of the present application is without restriction to this.
Then first verification result may include logic checking result (whether such as identity card correct, whether address correct, Whether contact method correct etc.), Numerical Validation result (such as repaying ability is 500,000 yuan/year, the level of consumption be 100,000 yuan/year, At least one of Assets Levels are 1,000,000 yuan of deposits).
In a preferred embodiment of the present application, first user information can carry out encryption life by specified public key At then in the embodiment of the present application, second platform can be verified in the following manner:
Sub-step S41 extracts second service for checking credentials mark and the first user information in the second checking request;
Sub-step S42 calls second service for checking credentials to identify the corresponding service for checking credentials;
Sub-step S43 encrypts specified public key to preset third party's user information using the service for checking credentials, To obtain feature user information;
Sub-step S44 is verified using the second user information and the feature user information, is tested with obtaining first Demonstrate,prove result.
In the embodiment of the present application, hinge platform does not convert user information, and the second platform can be directly to second User information is verified.
In the concrete realization, the second platform itself can be stored using cipher mode identical with the first platform the Tripartite's user information is encrypted, and then obtains feature user information with encryption using second user information and verified, Obtain the first verification result.
Wherein, first verification result may include at least one of logic checking result, Numerical Validation result.
In a preferred embodiment of the present application, this method embodiment can with comprising steps of
Step 206, normalization is carried out using one or more of first verification results, to obtain the second verifying knot Fruit;
Step 207, second verification result is returned into first platform.
It should be noted that normalization can refer to one or more first verification results according to preset processing rule It is handled, obtains the treatment process of final second verification result.
In the embodiment of the present application, normalization can be carried out by hinge platform, the second verification result of acquisition is returned First platform.
In the concrete realization, the normalization may include logic normalization (such as with operation or operation, inverse, Priority arithmetic etc.), numerical value normalization (such as plus operation, average, ask weighting draw value) at least one of.
In the embodiment of the present application can to logic checking result carry out logic normalization, can with logarithm verification result into Line number value normalization etc..
For example, bank A request insurance company B, property firm C verify the identity card of user, if insurance company B The first verification result being proved to be successful is returned to, property firm C returns to the first verification result of authentication failed, returns carrying out logic When one processing, it is believed that when the first verification result is not proved to be successful all, judge authentication failed (i.e. the second verification result), It, can be using result that insurance company B is proved to be successful as the it is considered that insurance company B's is with a high credibility in property firm C Two verification results request property firm C to verify again when insurance company B can not be verified.
In another example bank A request insurance company B, property firm C verify the level of consumption of user, if insurance Company B returns to the first verification result of the amount insured of 20,000 yuan/year, and property firm C returns to the first of the housing loan of 80,000 yuan/year Verification result can carry out summation process to the first verification result, obtain 100,000 yuan/year when carrying out numerical value normalization Second verification result of the amount of consumption.
In a preferred embodiment of the present application, this method embodiment can with comprising steps of
Step 208, one or more of first verification results are returned into first platform and carries out normalization, with Obtain the second verification result.
In the embodiment of the present application, the first verification result can be returned to the first platform by hinge platform, there is the first platform Normalization is carried out, with the second verification result of acquisition.
In practical applications, hinge platform can pre-process the first verification result, and the first verification result is turned It is changed to the readable character of the first platform.
For example, character " N " and " Y " are respectively identified as authentication failed and being proved to be successful in the first platform, and some second Character " 0 " and " 1 " are respectively identified as authentication failed in platform and are proved to be successful, if the first verifying knot that second platform returns In fruit include " 0 " or " 1 ", then hinge platform can should " 0 " or " 1 " be converted to " N " or " Y ".
First platform can carry out business processing using second verification result, specifically when obtaining the second verification result May include by service request, refusal service request, into next step audit etc..
For example, user applies for vehicle insurance business to insurance company (the first platform), insurance company's (the first platform) passes through hinge Platform is to the cell-phone number (user information) of communication company's requests verification user, if the result obtained is is proved to be successful, (second is tested Demonstrate,prove result), then insurance company's (the first platform) may determine that the vehicle insurance business application by preliminary audit survey, is examined into next step Core;If the result obtained is authentication failed (the second verification result), insurance company's (the first platform) may determine that the vehicle insurance industry Business application refuses the vehicle insurance business application not by preliminary audit survey.
In another example user to bank (the first platform) apply loan transaction, bank's (the first platform) by hinge platform to Insurance company, property firm's (the second platform) requests verification user Assets Levels (user information), the consumption water of acquisition The fixed assets (the second verification result) for 1,500,000 yuan are equalled, if the fixed assets are enough the guarantee as the loan transaction, silver Row (the first platform) may determine that the loan transaction application by preliminary audit survey, is audited into next step;If the fixed assets are not It is enough the guarantee as the loan transaction, then bank's (the first platform) may determine that the vehicle insurance business application does not pass through and tentatively examine Core, refuse the loan transaction application.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented Necessary to example.
Referring to Fig. 3, a kind of structural block diagram of the verifying Installation practice of user information of the application is shown, specifically can wrap Include following module:
First checking request receiving module 301, for receiving the first checking request of the first platform transmission;Described first tests It include the first platform identification, first service for checking credentials mark, the first user information in card request;
Second service for checking credentials identifier lookup module 302, for searching and first platform identification and first verifying Second service for checking credentials of the one or more mark of service identifiers mapping;
Second checking request generation module 303, at least using one or more of second services for checking credentials mark and First user information generates one or more second checking requests;
Second checking request sending module 304, for one or more of second checking requests to be respectively sent to one A or multiple second platforms;
First verification result receiving module 305, for receiving one or more first verification results, wherein one Or multiple first verification results are that one or more of second platforms are identified for one or more of second services for checking credentials Carry out the result of verifying acquisition.
It may include authorization data in first checking request in a preferred embodiment of the present application, described It may include authorization data in two checking requests.
In a preferred embodiment of the present application, second service for checking credentials identifier lookup module 302 may include as Lower submodule:
First searches submodule, for searching and first platform identification and first service for checking credentials identity map , hinge service for checking credentials mark and one or more second platform identifications;
Second searches submodule, for searching and one or more of second platform identifications and the hinge service for checking credentials Second service for checking credentials of one or more of identity map identifies.
In a preferred embodiment of the present application, the second checking request generation module 303 may include following son Module:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of The corresponding one or more cipher modes of second platform identification;
Submodule is decrypted, it is original to obtain for first user information to be decrypted according to the manner of decryption User information;
Submodule is encrypted, for being encrypted according to one or more of cipher modes to the original user information, To obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second User information generates one or more second checking requests.
In a preferred embodiment of the present application, second platform can be verified in the following manner:
Extract the second service for checking credentials mark and the second user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
The second user information and preset third party's user information are verified using the service for checking credentials, to obtain Obtain the first verification result.
In a preferred embodiment of the present application, first user information can carry out encryption life by specified public key At second platform can be verified in the following manner:
Extract second service for checking credentials mark and the first user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
Specified public key encrypts preset third party's user information using the service for checking credentials, to obtain feature User information;
It is verified using the second user information and the feature user information, to obtain the first verification result.
In the concrete realization, first verification result may include logic checking result, in Numerical Validation result extremely Few one kind.
In a preferred embodiment of the present application, which can also include following module:
Normalization module, for carrying out normalization using one or more of first verification results, to obtain the Two verification results;
Second verification result return module, for second verification result to be returned to first platform.
In a preferred embodiment of the present application, which can also include following module:
First verification result return module, it is flat for one or more of first verification results to be returned to described first Platform carries out normalization, to obtain the second verification result.
In the concrete realization, the normalization may include logic normalization, at least one in numerical value normalization Kind.
Referring to Fig. 4, a kind of structural block diagram of the verifying system embodiment of user information of the application, the system packet are shown Include the first platform 410, hinge platform 420, one or more second platforms 430;Wherein,
First platform 410 may include following module:
First checking request sending module 411, for sending the first checking request to hinge platform;
The hinge platform 420 may include following module:
First checking request receiving module 421, for receiving the first checking request of the first platform transmission;Described first tests It include the first platform identification, first service for checking credentials mark, the first user information in card request;
Second service for checking credentials identifier lookup module 422, for searching and first platform identification and first verifying Second service for checking credentials of the one or more mark of service identifiers mapping;
Second checking request generation module 423, at least using one or more of second services for checking credentials mark and First user information generates one or more second checking requests;
Second checking request sending module 424, for one or more of second checking requests to be respectively sent to one A or multiple second platforms;
First verification result receiving module 425, for receiving one or more first verification results;
Second platform 430 may include following module:
User information authentication module 431 is tested for being verified for second service for checking credentials mark with obtaining first Demonstrate,prove result;
First verification result sending module 432, for first verification result to be sent to the hinge platform.
In a preferred embodiment of the present application, first platform 410 can also include following module:
First checking request generation module, for generating the first checking request when receiving service request;
Service Processing Module, for carrying out business processing using second verification result.
It may include authorization data in first checking request in a preferred embodiment of the present application, described It may include authorization data in two checking requests.
In a preferred embodiment of the present application, second service for checking credentials identifier lookup module 422 may include as Lower submodule:
First searches submodule, for searching and first platform identification and first service for checking credentials identity map , hinge service for checking credentials mark and one or more second platform identifications;
Second searches submodule, for searching and one or more of second platform identifications and the hinge service for checking credentials Second service for checking credentials of one or more of identity map identifies.
In a preferred embodiment of the present application, the second checking request generation module 423 may include following son Module:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of The corresponding one or more cipher modes of second platform identification;
Submodule is decrypted, it is original to obtain for first user information to be decrypted according to the manner of decryption User information;
Submodule is encrypted, for being encrypted according to one or more of cipher modes to the original user information, To obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second User information generates one or more second checking requests.
In a preferred embodiment of the present application, the user information authentication module 431 may include following submodule:
First extracting sub-module, for extracting the second service for checking credentials mark and second user letter in the second checking request Breath;
First calls submodule, for calling second service for checking credentials to identify the corresponding service for checking credentials;
First verifying submodule, for being used using the service for checking credentials the second user information and preset third party Family information is verified, to obtain the first verification result.
In a preferred embodiment of the present application, first user information can carry out encryption life by specified public key At the user information authentication module 431 may include following submodule:
Second extracting sub-module, for extracting the mark of second service for checking credentials in the second checking request and the first user letter Breath;
Second calls submodule, for calling second service for checking credentials to identify the corresponding service for checking credentials;
Feature user information obtains submodule, for using the service for checking credentials to specified public key to preset third party User information is encrypted, to obtain feature user information;
Second verifying submodule, for being verified using the second user information with the feature user information, with Obtain the first verification result.
In the concrete realization, first verification result may include logic checking result, in Numerical Validation result extremely Few one kind.
In a preferred embodiment of the present application, the hinge platform 420 can also include following module:
Normalization module, for carrying out normalization using one or more of first verification results, to obtain the Two verification results;
Second verification result return module, for second verification result to be returned to first platform.
In a preferred embodiment of the present application, the hinge platform 420 can also include following module:
First verification result return module, it is flat for one or more of first verification results to be returned to described first Platform carries out normalization, to obtain the second verification result.
In the concrete realization, the normalization may include logic normalization, at least one in numerical value normalization Kind.
For device, system embodiment, since it is basically similar to the method embodiment, so the comparison of description is simple Single, the relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiments of the present application may be provided as method, apparatus or calculating Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
In a typical configuration, the computer equipment includes one or more processors (CPU), input/output Interface, network interface and memory.Memory may include the non-volatile memory in computer-readable medium, random access memory The forms such as device (RAM) and/or Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is to calculate The example of machine readable medium.Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be with Realize that information is stored by any method or technique.Information can be computer readable instructions, data structure, the module of program or Other data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to Herein defines, and computer-readable medium does not include non-persistent computer readable media (transitory media), such as The data-signal and carrier wave of modulation.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, limited by sentence " including one ... " Element, it is not excluded that including identical being wanted in the process, method of the element, article or terminal device there is also other Element.
Above to the verifying device and one of a kind of verification method of user information provided herein, a kind of user information The verifying system of kind of user information, is described in detail, used herein principle and implementation of the specific case to the application Mode is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;Meanwhile For those of ordinary skill in the art, according to the thought of the application, has change in specific embodiments and applications Become place, in conclusion the contents of this specification should not be construed as limiting the present application.

Claims (20)

1. a kind of verification method of user information characterized by comprising
Receive the first checking request of the first platform transmission;It is tested in first checking request including the first platform identification, first Demonstrate,prove service identifiers, the first user information;
Search second service for checking credentials of one or more with first platform identification and first service for checking credentials identity map Mark;
At least using one or more of second services for checking credentials mark and first user information, one or more the are generated Two checking requests;
One or more of second checking requests are respectively sent to one or more second platforms, and, receive one or Multiple first verification results, wherein one or more of first verification results are that one or more of second platforms are directed to One or more of second service for checking credentials marks carry out the result of verifying acquisition.
2. the method according to claim 1, wherein in first checking request include authorization data, it is described It include authorization data in second checking request.
3. the method according to claim 1, wherein the lookup and first platform identification and described first Service for checking credentials identity map second service for checking credentials of one or more mark the step of include:
It searches and first platform identification and first service for checking credentials identity map, hinge service for checking credentials mark and one Or multiple second platform identifications;
Search one or more the with one or more of second platform identifications and the hinge service for checking credentials identity map Two services for checking credentials mark.
4. method according to claim 1 or 2 or 3, which is characterized in that described at least to use one or more of second Service for checking credentials mark and first user information, the step of generating one or more second checking requests include:
Search the corresponding manner of decryption of first platform identification, one or more of second platform identifications it is corresponding one or Multiple cipher modes;
First user information is decrypted according to the manner of decryption, to obtain original user information;
The original user information is encrypted according to one or more of cipher modes, to obtain one or more second User information;
Using one or more of second services for checking credentials mark and one or more of second user information generate one or Multiple second checking requests.
5. according to the method described in claim 4, it is characterized in that, second platform is verified in the following manner:
Extract the second service for checking credentials mark and the second user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
The second user information and preset third party's user information are verified using the service for checking credentials, to obtain One verification result.
6. according to the method described in claim 4, it is characterized in that, first user information is encrypted by specified public key It generates, second platform is verified in the following manner:
Extract second service for checking credentials mark and the first user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
Specified public key encrypts preset third party's user information using the service for checking credentials, to obtain feature user Information;
It is verified using the second user information and the feature user information, to obtain the first verification result.
7. method described according to claim 1 or 5 or 6, which is characterized in that first verification result includes logic checking knot At least one of fruit, Numerical Validation result.
8. method described according to claim 1 or 2 or 3 or 5 or 6, which is characterized in that further include:
Normalization is carried out using one or more of first verification results, to obtain the second verification result;
Second verification result is returned into first platform.
9. method described according to claim 1 or 2 or 3 or 5 or 6, which is characterized in that further include:
One or more of first verification results are returned into first platform and carry out normalization, to obtain the second verifying As a result.
10. according to the method described in claim 9, it is characterized in that, the normalization includes that logic normalization, numerical value are returned At least one of one processing.
11. a kind of verifying device of user information characterized by comprising
First checking request receiving module, for receiving the first checking request of the first platform transmission;First checking request In include the first platform identification, first service for checking credentials mark, the first user information;
Second service for checking credentials identifier lookup module is identified for searching with first platform identification and first service for checking credentials Second service for checking credentials of one or more of mapping identifies;
Second checking request generation module, at least using one or more of second services for checking credentials mark and described first User information generates one or more second checking requests;
Second checking request sending module, for one or more of second checking requests to be respectively sent to one or more Second platform;
First verification result receiving module, for receiving one or more first verification results, wherein one or more of the One verification result is that one or more of second platforms are verified for one or more of second services for checking credentials mark The result of acquisition.
12. device according to claim 11, which is characterized in that include authorization data, institute in first checking request Stating includes authorization data in the second checking request.
13. device according to claim 11, which is characterized in that second service for checking credentials identifier lookup module includes:
First search submodule, for searching and first platform identification and first service for checking credentials identity map, pivot Knob service for checking credentials mark and one or more second platform identifications;
Second searches submodule, identifies for searching with one or more of second platform identifications and the hinge service for checking credentials Second service for checking credentials of one or more of mapping identifies.
14. device described in 1 or 12 or 13 according to claim 1, which is characterized in that the second checking request generation module packet It includes:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of second The corresponding one or more cipher modes of platform identification;
Submodule is decrypted, for first user information to be decrypted according to the manner of decryption, to obtain original user Information;
Submodule is encrypted, for encrypting according to one or more of cipher modes to the original user information, to obtain Obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second users Information generates one or more second checking requests.
15. device according to claim 14, which is characterized in that second platform is verified in the following manner:
Extract the second service for checking credentials mark and the second user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
The second user information and preset third party's user information are verified using the service for checking credentials, to obtain One verification result.
16. device according to claim 14, which is characterized in that first user information is added by specified public key It is dense at second platform is verified in the following manner:
Extract second service for checking credentials mark and the first user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
Specified public key encrypts preset third party's user information using the service for checking credentials, to obtain feature user Information;
It is verified using the second user information and the feature user information, to obtain the first verification result.
17. device described in 1 or 12 or 13 or 15 or 16 according to claim 1, which is characterized in that further include:
Normalization module is tested for carrying out normalization using one or more of first verification results with obtaining second Demonstrate,prove result;
Second verification result return module, for second verification result to be returned to first platform.
18. device described in 1 or 12 or 13 or 15 or 16 according to claim 1, which is characterized in that further include:
First verification result return module, for by one or more of first verification results return to first platform into Row normalization, to obtain the second verification result.
19. a kind of verifying system of user information, which is characterized in that the system comprises the first platform, hinge platform, one or Multiple second platforms;Wherein,
First platform includes:
First checking request sending module, for sending the first checking request to hinge platform;
The hinge platform includes:
First checking request receiving module, for receiving the first checking request of the first platform transmission;First checking request In include the first platform identification, first service for checking credentials mark, the first user information;
Second service for checking credentials identifier lookup module is identified for searching with first platform identification and first service for checking credentials Second service for checking credentials of one or more of mapping identifies;
Second checking request generation module, at least using one or more of second services for checking credentials mark and described first User information generates one or more second checking requests;
Second checking request sending module, for one or more of second checking requests to be respectively sent to one or more Second platform;
First verification result receiving module, for receiving one or more first verification results;
Second platform includes:
User information authentication module, for being verified for second service for checking credentials mark, to obtain the first verification result;
First verification result sending module, for first verification result to be sent to the hinge platform.
20. system as claimed in claim 19, which is characterized in that first platform further include:
First checking request generation module, for generating the first checking request when receiving service request;
Service Processing Module, for carrying out business processing using second verification result.
CN201510033288.7A 2015-01-22 2015-01-22 A kind of verification method of user information, device and system Active CN105871786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510033288.7A CN105871786B (en) 2015-01-22 2015-01-22 A kind of verification method of user information, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510033288.7A CN105871786B (en) 2015-01-22 2015-01-22 A kind of verification method of user information, device and system

Publications (2)

Publication Number Publication Date
CN105871786A CN105871786A (en) 2016-08-17
CN105871786B true CN105871786B (en) 2019-06-04

Family

ID=56624079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510033288.7A Active CN105871786B (en) 2015-01-22 2015-01-22 A kind of verification method of user information, device and system

Country Status (1)

Country Link
CN (1) CN105871786B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107767207B (en) * 2016-08-23 2021-08-17 阿里巴巴集团控股有限公司 Method and equipment for processing object data set
CN108737361B (en) * 2018-01-25 2022-01-04 阳光保险集团股份有限公司 Data verification method based on block chain
CN108629555B (en) * 2018-03-15 2022-07-05 考拉征信服务有限公司 Back tone method, device and system for history cross validation and storage medium thereof
CN108540574A (en) * 2018-04-27 2018-09-14 宁波银行股份有限公司 A kind of diversiform data docking system and method
CN110474863B (en) * 2018-05-10 2021-11-09 中国移动通信集团浙江有限公司 Micro-service security authentication method and device
CN109190352B (en) * 2018-07-03 2022-05-17 创新先进技术有限公司 Method and device for verifying accuracy of authorization text
CN109858339B (en) * 2018-12-22 2023-06-09 深圳市珍爱捷云信息技术有限公司 Information verification method, information verification device, computer equipment and computer readable storage medium
CN110648242A (en) * 2019-08-15 2020-01-03 阿里巴巴集团控股有限公司 Method and device for identity verification in health care project
CN112396520A (en) * 2021-01-20 2021-02-23 四川享宇金信金融科技有限公司 Anti-fraud method, device and equipment
CN112699353B (en) * 2021-03-25 2022-04-29 北京瑞莱智慧科技有限公司 Financial information transmission method and financial information transmission system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114367A (en) * 2006-07-25 2008-01-30 阿里巴巴公司 Data processing method and system relates to multi-system
CN101547092A (en) * 2008-03-27 2009-09-30 天津德智科技有限公司 Method and device for data synchronization of multi-application systems for unifying user authentication
CN101626369A (en) * 2008-07-11 2010-01-13 中国移动通信集团公司 Method, device and system for single sign-on
CN104270391A (en) * 2014-10-24 2015-01-07 中国建设银行股份有限公司 Method and device for processing access request
CN105812341A (en) * 2014-12-31 2016-07-27 阿里巴巴集团控股有限公司 User identity identifying method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110055547A1 (en) * 2009-08-27 2011-03-03 Academia Sinica Personal information management and delivery mechanism

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114367A (en) * 2006-07-25 2008-01-30 阿里巴巴公司 Data processing method and system relates to multi-system
CN101547092A (en) * 2008-03-27 2009-09-30 天津德智科技有限公司 Method and device for data synchronization of multi-application systems for unifying user authentication
CN101626369A (en) * 2008-07-11 2010-01-13 中国移动通信集团公司 Method, device and system for single sign-on
CN104270391A (en) * 2014-10-24 2015-01-07 中国建设银行股份有限公司 Method and device for processing access request
CN105812341A (en) * 2014-12-31 2016-07-27 阿里巴巴集团控股有限公司 User identity identifying method and device

Also Published As

Publication number Publication date
CN105871786A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN105871786B (en) A kind of verification method of user information, device and system
US11700257B2 (en) System and method for storing and distributing consumer information
Yu et al. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings
CN112199714B (en) Privacy protection method and device based on block chain and electronic equipment
KR102193406B1 (en) Method and device for identifying user identity
US10491593B2 (en) Multi-dimensional framework for defining criteria that indicate when authentication should be revoked
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
CN109635585A (en) Method, agent node and the medium of Transaction Information are inquired in block chain network
US11711433B2 (en) Systems and methods for asynchronous API-driven external application services for a blockchain
CN105099673A (en) Authorization method, authorization requesting method and devices
CN105591744A (en) Network real-name authentication method and system
CN103685244B (en) A kind of differentiation authentication method and device
CN110619526A (en) Business service providing method, device, equipment and system based on block chain
JP2016031760A (en) Private analytics with controlled information disclosure
US20220191027A1 (en) Mutual multi-factor authentication technology
CN112861102A (en) Block chain-based electronic file processing method and system
CN116226289A (en) Electronic certificate management method, device, equipment and storage medium based on blockchain
CN113129008B (en) Data processing method, device, computer readable medium and electronic equipment
CN115563212A (en) Supply chain data management method, device, equipment and storage medium under cloud chain cooperation
CN115065465A (en) Personal data processing method and device based on zero-knowledge proof
GB2548073A (en) System, method and apparatus for data transmission
CN111431918A (en) Method and system for determining state label of target user based on block chain
US11201856B2 (en) Message security
Deep et al. Virtual Private Cloud and Authentication: A Review
CN117176457A (en) Transaction request processing method and device and computer equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right