Summary of the invention
In view of the above problems, it proposes the embodiment of the present application and overcomes the above problem or at least partly in order to provide one kind
A kind of verification method of the user information to solve the above problems, a kind of verifying device of user information and a kind of testing for user information
Card system.
According to a kind of aspect of the embodiment of the present application, the embodiment of the present application discloses a kind of verification method of user information,
Include:
Receive the first checking request of the first platform transmission;It include the first platform identification, the in first checking request
One service for checking credentials mark, the first user information;
It searches and is verified with the one or more second of first platform identification and first service for checking credentials identity map
Service identifiers;
At least using one or more of second services for checking credentials mark and first user information, one or more is generated
A second checking request;
One or more of second checking requests are respectively sent to one or more second platforms, and, receive one
A or multiple first verification results, wherein one or more of first verification results are one or more of second platforms
The result of verifying acquisition is carried out for one or more of second services for checking credentials mark.
Preferably, include authorization data in first checking request, include authorization data in second checking request.
Preferably, one or more searched with first platform identification and first service for checking credentials identity map
A second service for checking credentials identify the step of include:
Search with first platform identification and first service for checking credentials identity map, hinge service for checking credentials mark and
One or more second platform identifications;
Search one or more with one or more of second platform identifications and the hinge service for checking credentials identity map
A second service for checking credentials mark.
It is preferably, described at least to use one or more of second services for checking credentials mark and first user information,
The step of generating one or more second checking requests include:
Search the corresponding manner of decryption of first platform identification, one or more of second platform identifications corresponding one
A or multiple cipher modes;
First user information is decrypted according to the manner of decryption, to obtain original user information;
The original user information is encrypted according to one or more of cipher modes, to obtain one or more
Second user information;
One is generated using one or more of second services for checking credentials mark and one or more of second user information
A or multiple second checking requests.
Preferably, second platform is verified in the following manner:
Extract the second service for checking credentials mark and the second user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
The second user information and preset third party's user information are verified using the service for checking credentials, to obtain
Obtain the first verification result.
Preferably, first user information carries out encryption generation by specified public key, and second platform passes through following
Mode is verified:
Extract second service for checking credentials mark and the first user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
Specified public key encrypts preset third party's user information using the service for checking credentials, to obtain feature
User information;
It is verified using the second user information and the feature user information, to obtain the first verification result.
Preferably, first verification result includes at least one of logic checking result, Numerical Validation result.
Preferably, the method also includes:
Normalization is carried out using one or more of first verification results, to obtain the second verification result;
Second verification result is returned into first platform.
Preferably, the method also includes:
One or more of first verification results are returned into first platform and carry out normalization, to obtain second
Verification result.
Preferably, the normalization includes at least one of logic normalization, numerical value normalization.
According to another aspect of the embodiment of the present application, the embodiment of the present application also discloses a kind of verifying dress of user information
It sets, comprising:
First checking request receiving module, for receiving the first checking request of the first platform transmission;First verifying
It include the first platform identification, first service for checking credentials mark, the first user information in request;
Second service for checking credentials identifier lookup module, for searching and first platform identification and first service for checking credentials
Second service for checking credentials of one or more of identity map identifies;
Second checking request generation module is used at least identify using one or more of second services for checking credentials and described
First user information generates one or more second checking requests;
Second checking request sending module, for by one or more of second checking requests be respectively sent to one or
Multiple second platforms;
First verification result receiving module, for receiving one or more first verification results, wherein one or more
A first verification result is that one or more of second platforms are carried out for one or more of second services for checking credentials mark
Verify the result obtained.
Preferably, include authorization data in first checking request, include authorization data in second checking request.
Preferably, second service for checking credentials identifier lookup module includes:
First searches submodule, for searching and first platform identification and first service for checking credentials identity map
, hinge service for checking credentials mark and one or more second platform identifications;
Second searches submodule, for searching and one or more of second platform identifications and the hinge service for checking credentials
Second service for checking credentials of one or more of identity map identifies.
Preferably, the second checking request generation module includes:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of
The corresponding one or more cipher modes of second platform identification;
Submodule is decrypted, it is original to obtain for first user information to be decrypted according to the manner of decryption
User information;
Submodule is encrypted, for being encrypted according to one or more of cipher modes to the original user information,
To obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second
User information generates one or more second checking requests.
Preferably, second platform is verified in the following manner:
Extract the second service for checking credentials mark and the second user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
The second user information and preset third party's user information are verified using the service for checking credentials, to obtain
Obtain the first verification result.
Preferably, first verification result includes at least one of logic checking result, Numerical Validation result.
Preferably, first user information carries out encryption generation by specified public key, and second platform passes through following
Mode is verified:
Extract second service for checking credentials mark and the first user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
Specified public key encrypts preset third party's user information using the service for checking credentials, to obtain feature
User information;
It is verified using the second user information and the feature user information, to obtain the first verification result.
Preferably, described device further include:
Normalization module, for carrying out normalization using one or more of first verification results, to obtain the
Two verification results;
Second verification result return module, for second verification result to be returned to first platform.
Preferably, further includes:
First verification result return module, it is flat for one or more of first verification results to be returned to described first
Platform carries out normalization, to obtain the second verification result.
Preferably, the normalization includes at least one of logic normalization, numerical value normalization.
According to another aspect of the embodiment of the present application, the embodiment of the present application also discloses a kind of verifying system of user information
System, the system comprises the first platform, hinge platform, one or more second platforms;Wherein,
First platform includes:
First checking request sending module, for sending the first checking request to hinge platform;
The hinge platform includes:
First checking request receiving module, for receiving the first checking request of the first platform transmission;First verifying
It include the first platform identification, first service for checking credentials mark, the first user information in request;
Second service for checking credentials identifier lookup module, for searching and first platform identification and first service for checking credentials
Second service for checking credentials of one or more of identity map identifies;
Second checking request generation module is used at least identify using one or more of second services for checking credentials and described
First user information generates one or more second checking requests;
Second checking request sending module, for by one or more of second checking requests be respectively sent to one or
Multiple second platforms;
First verification result receiving module, for receiving one or more first verification results;
Second platform includes:
User information authentication module, for being verified for second service for checking credentials mark, to obtain the first verifying
As a result;
First verification result sending module, for first verification result to be sent to the hinge platform.
Preferably, first platform further include:
First checking request generation module, for generating the first checking request when receiving service request;
Service Processing Module, for carrying out business processing using second verification result.
Preferably, include authorization data in first checking request, include authorization data in second checking request.
Preferably, second service for checking credentials identifier lookup module includes following submodule:
First searches submodule, for searching and first platform identification and first service for checking credentials identity map
, hinge service for checking credentials mark and one or more second platform identifications;
Second searches submodule, for searching and one or more of second platform identifications and the hinge service for checking credentials
Second service for checking credentials of one or more of identity map identifies.
Preferably, the second checking request generation module includes following submodule:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of
The corresponding one or more cipher modes of second platform identification;
Submodule is decrypted, it is original to obtain for first user information to be decrypted according to the manner of decryption
User information;
Submodule is encrypted, for being encrypted according to one or more of cipher modes to the original user information,
To obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second
User information generates one or more second checking requests.
Preferably, the user information authentication module includes following submodule:
First extracting sub-module, for extracting the second service for checking credentials mark and second user letter in the second checking request
Breath;
First calls submodule, for calling second service for checking credentials to identify the corresponding service for checking credentials;
First verifying submodule, for being used using the service for checking credentials the second user information and preset third party
Family information is verified, to obtain the first verification result.
Preferably, first user information carries out encryption generation, the user information authentication module by specified public key
Include:
Second extracting sub-module, for extracting the mark of second service for checking credentials in the second checking request and the first user letter
Breath;
Second calls submodule, for calling second service for checking credentials to identify the corresponding service for checking credentials;
Feature user information obtains submodule, for using the service for checking credentials to specified public key to preset third party
User information is encrypted, to obtain feature user information;
Second verifying submodule, for being verified using the second user information with the feature user information, with
Obtain the first verification result.
Preferably, first verification result includes at least one of logic checking result, Numerical Validation result.
Preferably, the hinge platform further include:
Normalization module, for carrying out normalization using one or more of first verification results, to obtain the
Two verification results;
Second verification result return module, for second verification result to be returned to first platform.
Preferably, the hinge platform further includes following module:
First verification result return module, it is flat for one or more of first verification results to be returned to described first
Platform carries out normalization, to obtain the second verification result.
Preferably, the normalization includes at least one of logic normalization, numerical value normalization.
The embodiment of the present application includes the following advantages:
The embodiment of the present application connects the first platform and the second platform by hinge platform, and the first verifying of the first platform is asked
It asks through mapping, is translated as the second checking request, is verified by the second platform, on the one hand, the quantity of the second platform greatly increases
Add, the channel of verifying can be increased, the mass data stored in the second platform can greatly increase the success rate of verifying;Another party
Face, the first platform are docked with hinge platform, and without being coordinated with multiple second platforms, similarly, the second platform and hinge are flat
Platform docking, without docking with multiple first platforms, hinge platform safeguards mapping relations as connection structure, and the first platform is not necessarily to
It modifies to its parameter, the second platform is converted without to interface, so that the system of the first platform, the second platform changes
Dynamic seldom, system maintains integrality, improves scalability and maintainability, while greatly reducing human and material resources cost, adds
It, since hinge platform is absorbed in the mapping of various information.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real
Applying mode, the present application will be further described in detail.
If current platform finds more information sources, multiple third party's information systems are accessed, can be increased to a certain extent
Add the channel of verifying user information and the success rate of verifying.
But the Parameter specifications of third party's information system are generally different from current platform, can not generally directly read
The Parameter specifications of current platform, current platform generally requires the Parameter specifications according to its API provided, by the Parameter Switch of itself
For its readable parameter, the service for calling it to provide to third party's information system is retransmited.
Current platform needs to carry out interface mode, transport protocol, data format, equipment performance etc. with third party's information system
Coordinated.
In order to improve the comprehensive of verifying, the quantity of third party's information system of current platform access is generally very much, and same
One third party's information system may also will convert multiple interfaces according to the requirement of each platform to multiple platforms, to current platform and
The modification of third party's information system also can be very big, and the cost of required manpower and material resources is very big, very high so as to cause verifying cost, maintenance
Property and scalability are very low, also, in many cases, the applications of the business of current platform more unexpected winner are very low, to current platform
The more utilization rate of third party's information system verified of user information needed for the business of unexpected winner is also very low, leads to resource
Service efficiency is very low.
Therefore, it is proposed to one of the core idea of the embodiment of the present application, as shown in Figure 1, between platform and platform, such as the
Between one platform 101 and the second platform 104, hinge platform 102 is established, one or more second platforms 104 are macroscopically forming
Third party's information pool 103, to improve the channel of verifying and the success rate of verifying, hinge platform 102 is used as hinge, can be to first
The certificate parameter of platform is mapped, and the readable certificate parameter of the second platform is mapped as, and to reduce the modification to each platform, is guaranteed
The maintainability and scalability of each platform itself, improve the service efficiency of resource.
Referring to Fig. 2, a kind of step flow chart of the verification method embodiment of user information of the application is shown, specifically may be used
To include the following steps:
Step 201, the first checking request that the first platform is sent is received;
Platform, such as the first platform, the second platform, hinge platform are can to refer to mechanism for object
(such as financial institution), company (such as insurance company), department (such as public security department), essence can be independent server or
Person's server cluster, such as distributed system, Cloud Server.
In practical applications, hinge platform can be connected with multiple platforms, as the hinge between each platform, so that each flat
It may not need direct docking between platform.
In the embodiment of the present application, the first platform can be the platform of requests verification user information, and the second platform can be
The platform that user information is verified.
It should be noted that user information can carry out symmetrical two-way request and verifying between the platform of equity, often
One platform can have the function of to possess the right and justice of equity of both requestor, verifier of user information etc. simultaneously
Business.
Specifically, i.e. each platform (in addition to hinge platform) can be connected to other platforms by hinge platform, go forward side by side
The request and verifying of row identity information, any two platform (in addition to hinge platform) can be with the first platforms each other, while again each other
Second platform.
In the concrete realization, user can be sent by client (such as webpage, independent application program) to the first platform
Service request, to apply for a certain business, for example, user applies for vehicle insurance industry to financial institution's application loan transaction, to insurance company
Business etc..
It is more important since these business are usually directed to user, assets of the first platform etc., generally require the current use of verifying
The personal identification at family identifies whether digital identity lawful owner is corresponding with operator in network, is service requester's
Whether physical identity and digital identity correspond to.
In the embodiment of the present application, the personal identification of user can be tested by the personal exclusive information such as user information
Card.
For example, financial institution can require to fill in name, certificate number, mobile phone, address when a certain business of client's online application
Etc. user informations, the personal identification of user is verified.
It in the concrete realization, may include the first user information in the service request that client is submitted, the first platform can be with
When receiving the service request that client is submitted, the first checking request is generated.
Specifically, the first platform can use preset first platform identification, the first platform identification, first service for checking credentials
Mark, the first user information generate the first checking request, and are sent to hinge platform.
It then may include the first platform identification, first service for checking credentials mark, the first user letter in first checking request
Breath.
Wherein, the first platform identification can be the information that can represent the first platform that one uniquely determines, the first verifying
Service identifiers can be the information that can represent the readable service for checking credentials of the first platform that one uniquely determines.
Under normal conditions, since user information is more important, the first platform can be encrypted the first user information, be mentioned
Safety of high first user information in transmission process.
The mode that first platform encrypts the first user information may include the cipher mode exclusive using the first platform,
Can carry out encrypting using specified public key etc., the embodiment of the present application is without restriction to this.
Certainly, the first user information can not be encrypted, directly marks the first user in some specific scenarios
Knowledge is encapsulated into the first checking request, but the first checking request needs to have privacy, for example, hinge platform only receives white name
First checking request of the first platform in list, the embodiment of the present application are without restriction to this.
In addition, to further increase the safety of verifying user information, the first platform can send verifying to client and award
Power prompt, for example, " XX mechanism whether is authorized to read you in the user information of XX company, XX mechanism, including name, cell-phone number."
If user returns to confirmation instruction to the first platform by client, it is equivalent to user and the verifying is used by client
The behavior authorization of family information, for example, user is close for verifying authorization prompt input such as mobile phone identifying code, U-shield by client
Stronger information of privacy such as code etc., then the first platform can generate the first checking request in the case where obtaining authorization.
If user returns to refusal instruction to the first platform by client, it is equivalent to instruction user and passes through client refusal pair
The behavior authorization of the verifying user information, then the first platform can terminate to service.
It therefore, may include authorization data in first checking request, which, which can characterize, uses verifying
The behavior authorization of family information, such as mobile phone identifying code, U-shield password.
Furthermore, hinge platform can open a specified api interface, and the first platform can call this specified
Api interface passes through the corresponding URL of the API (Uniform Resource according to the Parameter specifications of the specified api interface
Locator, uniform resource locator) to the second platform the first checking request of transmission, the requests verification user whether there is and work as
The identical user information of preceding user information.
Step 202, the one or more with first platform identification and first service for checking credentials identity map is searched
Second service for checking credentials mark;
In practical applications, hinge platform can be arranged with each platform in advance, and the first platform identification and first is arranged
Service for checking credentials mark, and, mapping relations of one or more second services for checking credentials marks, hinge platform default can be reflected by this
Relationship is penetrated to search and second service for checking credentials of one or more of the first platform identification and the first service for checking credentials identity map mark.
Wherein, second service for checking credentials mark, which can be, can represent the readable verifying clothes of the second platform that one uniquely determines
The information of business.
Further, if the behavior of information of verifying user needs to authorize, hinge platform when detecting authorization data,
It searches and is identified with second service for checking credentials of one or more of first platform identification and first service for checking credentials identity map.
In a preferred embodiment of the present application, step 202 may include following sub-step:
Sub-step S11 is searched and first platform identification and first service for checking credentials identity map, hinge verifying
Service identifiers and one or more second platform identifications;
Sub-step S12 is searched and one or more of second platform identifications and the hinge service for checking credentials identity map
Second service for checking credentials of one or more mark.
In the embodiment of the present application, hinge platform can store first service for checking credentials request mapping table, the second verifying clothes
Business request mapping table.
Checking request ID can be recorded in first service for checking credentials request mapping table, the first platform identification, first tested
Demonstrate,prove the information such as service identifiers, hinge service for checking credentials mark, the second platform identification.
Checking request ID can be recorded in second service for checking credentials request mapping table, the second platform identification, second tested
Demonstrate,prove the information such as service identifiers, hinge service for checking credentials mark.
Wherein, the second platform identification can be the information that can represent the second platform that one uniquely determines, hinge verifying
Service identifiers can be the information that can represent the readable service for checking credentials of hinge platform that one uniquely determines.
Hinge platform can request to search in mapping table and first platform identification and described the in first service for checking credentials
One service for checking credentials identity map, hinge service for checking credentials mark and one or more second platform identifications, in second service for checking credentials
It requests to search one with one or more of second platform identifications and the hinge service for checking credentials identity map in mapping table
Or multiple second service for checking credentials marks.
The example of first service for checking credentials request mapping table can be such that
The example of second service for checking credentials request mapping table can be such that
Wherein, Ikcert is the mark of the readable ID card verification service of bank A, to request the identity card to user to carry out
Verifying, certsvr are the mark of the readable ID card verification service of hinge platform, and Akcert is the readable identity of insurance company B
The mark of the service for checking credentials is demonstrate,proved, Tmcert is the mark of the readable ID card verification service of property firm C.
The sequence of verifying can be first to verify from insurance company B, Zai Qu property firm C verifying.
It should be noted that the first platform can make an appointment, needs are verified to which the second platform, how to be verified
(such as verifying sequence), the first platform can send verifying authorization prompt to client for second platform, and hinge platform can be with
When detecting authorization data, the verifying of user information is carried out to second platform.
Step 203, it is at least generated using one or more of second services for checking credentials mark and first user information
One or more second checking requests;
In practical applications, the second different platforms has different Parameter specifications, and hinge platform is according to different second
The Parameter specifications of platform generate the second readable checking request of each second platform, the service for checking credentials for calling the second platform to provide.
Due to the first platform send user information generally carried out encryption, in order to the second platform to user information into
Row verifying, the first platform, the second platform and hinge platform can in advance arrange user information.
In a preferred embodiment of the present application, step 203 may include following sub-step:
Sub-step S21 searches the corresponding manner of decryption of first platform identification, one or more of second platform marks
Know corresponding one or more cipher modes;
Sub-step S22 is decrypted first user information according to the manner of decryption, to obtain original user letter
Breath;
Sub-step S23 encrypts the original user information according to one or more of cipher modes, to obtain
One or more second user information;
Sub-step S24, using one or more of second services for checking credentials mark and one or more of second users
Information generates one or more second checking requests.
In the embodiment of the present application, since the system of different platform (such as the first platform, the second platform) has formed, respectively
Using exclusive cipher mode and manner of decryption, to reduce the modification to each plateform system, the first platform and the second platform, with,
Hinge platform can arrange cipher mode, manner of decryption, be converted by hinge platform to user information, and the first platform is readable
The first user information be converted to the readable second user information of the second platform.
In another preferred embodiment of the present application, the first platform and the second platform can make an appointment the side of encryption
Formula such as arranges specified public key, and hinge platform can not be handled the first user information, is sent directly to the second platform.
Step 204, one or more of second checking requests are respectively sent to one or more second platforms;
It should be noted that can not belong to mutually mutually between the first platform and the second platform and between the second platform, but
Be can in face of identical user, the user can in the second platform register account number.
Second platform can open a specified api interface, and the api interface that hinge platform can call this specified is pressed
According to the Parameter specifications of the specified api interface, matched second is sent to the second platform by the corresponding URL of the API and is tested
Card request, request the second platform validation user whether there is user information identical with current user information.
In addition, the behavior needs for verifying user information are authorized to further increase the safety of verifying user information,
Then authorization data can be written in the second checking request.
Then may include authorization data in second checking request, the second platform when detecting authorization data, for
Second service for checking credentials mark carries out verification processing.
Step 205, one or more first verification results are received;
Wherein, one or more of first verification results can be directed to described one for one or more of second platforms
A or multiple second service for checking credentials marks carry out the result of verifying acquisition.
In a preferred embodiment of the present application, second platform can be verified in the following manner:
Sub-step S31 extracts the second service for checking credentials mark and second user information in the second checking request;
Sub-step S32 calls second service for checking credentials to identify the corresponding service for checking credentials;
Sub-step S33, using the service for checking credentials to the second user information and preset third party's user information into
Row verifying, to obtain the first verification result.
In the embodiment of the present application, hinge platform converts user information, by the first readable user of the first platform
Information is converted to the readable second user information of the second platform.
Second platform can be directly used third party's user information that second user information stores with itself and verify,
Obtain the first verification result.
It should be noted that third party's user information is for the first current platform, the second platform can be with
It is considered the third party verified to user information, the essence of third party's user information is also possible to user information.
For different user informations, the different services for checking credentials can have, for example, name, the identity card of verifying user
Number etc. can verify the mode that second user information is compared with third party's user information;In another example verifying user's
Repaying ability etc. can directly inquire the corresponding repaying energy of the second users information such as user name, ID card No. of the user
Power (third party's user information) etc., the embodiment of the present application is without restriction to this.
Then first verification result may include logic checking result (whether such as identity card correct, whether address correct,
Whether contact method correct etc.), Numerical Validation result (such as repaying ability is 500,000 yuan/year, the level of consumption be 100,000 yuan/year,
At least one of Assets Levels are 1,000,000 yuan of deposits).
In a preferred embodiment of the present application, first user information can carry out encryption life by specified public key
At then in the embodiment of the present application, second platform can be verified in the following manner:
Sub-step S41 extracts second service for checking credentials mark and the first user information in the second checking request;
Sub-step S42 calls second service for checking credentials to identify the corresponding service for checking credentials;
Sub-step S43 encrypts specified public key to preset third party's user information using the service for checking credentials,
To obtain feature user information;
Sub-step S44 is verified using the second user information and the feature user information, is tested with obtaining first
Demonstrate,prove result.
In the embodiment of the present application, hinge platform does not convert user information, and the second platform can be directly to second
User information is verified.
In the concrete realization, the second platform itself can be stored using cipher mode identical with the first platform the
Tripartite's user information is encrypted, and then obtains feature user information with encryption using second user information and verified,
Obtain the first verification result.
Wherein, first verification result may include at least one of logic checking result, Numerical Validation result.
In a preferred embodiment of the present application, this method embodiment can with comprising steps of
Step 206, normalization is carried out using one or more of first verification results, to obtain the second verifying knot
Fruit;
Step 207, second verification result is returned into first platform.
It should be noted that normalization can refer to one or more first verification results according to preset processing rule
It is handled, obtains the treatment process of final second verification result.
In the embodiment of the present application, normalization can be carried out by hinge platform, the second verification result of acquisition is returned
First platform.
In the concrete realization, the normalization may include logic normalization (such as with operation or operation, inverse,
Priority arithmetic etc.), numerical value normalization (such as plus operation, average, ask weighting draw value) at least one of.
In the embodiment of the present application can to logic checking result carry out logic normalization, can with logarithm verification result into
Line number value normalization etc..
For example, bank A request insurance company B, property firm C verify the identity card of user, if insurance company B
The first verification result being proved to be successful is returned to, property firm C returns to the first verification result of authentication failed, returns carrying out logic
When one processing, it is believed that when the first verification result is not proved to be successful all, judge authentication failed (i.e. the second verification result),
It, can be using result that insurance company B is proved to be successful as the it is considered that insurance company B's is with a high credibility in property firm C
Two verification results request property firm C to verify again when insurance company B can not be verified.
In another example bank A request insurance company B, property firm C verify the level of consumption of user, if insurance
Company B returns to the first verification result of the amount insured of 20,000 yuan/year, and property firm C returns to the first of the housing loan of 80,000 yuan/year
Verification result can carry out summation process to the first verification result, obtain 100,000 yuan/year when carrying out numerical value normalization
Second verification result of the amount of consumption.
In a preferred embodiment of the present application, this method embodiment can with comprising steps of
Step 208, one or more of first verification results are returned into first platform and carries out normalization, with
Obtain the second verification result.
In the embodiment of the present application, the first verification result can be returned to the first platform by hinge platform, there is the first platform
Normalization is carried out, with the second verification result of acquisition.
In practical applications, hinge platform can pre-process the first verification result, and the first verification result is turned
It is changed to the readable character of the first platform.
For example, character " N " and " Y " are respectively identified as authentication failed and being proved to be successful in the first platform, and some second
Character " 0 " and " 1 " are respectively identified as authentication failed in platform and are proved to be successful, if the first verifying knot that second platform returns
In fruit include " 0 " or " 1 ", then hinge platform can should " 0 " or " 1 " be converted to " N " or " Y ".
First platform can carry out business processing using second verification result, specifically when obtaining the second verification result
May include by service request, refusal service request, into next step audit etc..
For example, user applies for vehicle insurance business to insurance company (the first platform), insurance company's (the first platform) passes through hinge
Platform is to the cell-phone number (user information) of communication company's requests verification user, if the result obtained is is proved to be successful, (second is tested
Demonstrate,prove result), then insurance company's (the first platform) may determine that the vehicle insurance business application by preliminary audit survey, is examined into next step
Core;If the result obtained is authentication failed (the second verification result), insurance company's (the first platform) may determine that the vehicle insurance industry
Business application refuses the vehicle insurance business application not by preliminary audit survey.
In another example user to bank (the first platform) apply loan transaction, bank's (the first platform) by hinge platform to
Insurance company, property firm's (the second platform) requests verification user Assets Levels (user information), the consumption water of acquisition
The fixed assets (the second verification result) for 1,500,000 yuan are equalled, if the fixed assets are enough the guarantee as the loan transaction, silver
Row (the first platform) may determine that the loan transaction application by preliminary audit survey, is audited into next step;If the fixed assets are not
It is enough the guarantee as the loan transaction, then bank's (the first platform) may determine that the vehicle insurance business application does not pass through and tentatively examine
Core, refuse the loan transaction application.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to
According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented
Necessary to example.
Referring to Fig. 3, a kind of structural block diagram of the verifying Installation practice of user information of the application is shown, specifically can wrap
Include following module:
First checking request receiving module 301, for receiving the first checking request of the first platform transmission;Described first tests
It include the first platform identification, first service for checking credentials mark, the first user information in card request;
Second service for checking credentials identifier lookup module 302, for searching and first platform identification and first verifying
Second service for checking credentials of the one or more mark of service identifiers mapping;
Second checking request generation module 303, at least using one or more of second services for checking credentials mark and
First user information generates one or more second checking requests;
Second checking request sending module 304, for one or more of second checking requests to be respectively sent to one
A or multiple second platforms;
First verification result receiving module 305, for receiving one or more first verification results, wherein one
Or multiple first verification results are that one or more of second platforms are identified for one or more of second services for checking credentials
Carry out the result of verifying acquisition.
It may include authorization data in first checking request in a preferred embodiment of the present application, described
It may include authorization data in two checking requests.
In a preferred embodiment of the present application, second service for checking credentials identifier lookup module 302 may include as
Lower submodule:
First searches submodule, for searching and first platform identification and first service for checking credentials identity map
, hinge service for checking credentials mark and one or more second platform identifications;
Second searches submodule, for searching and one or more of second platform identifications and the hinge service for checking credentials
Second service for checking credentials of one or more of identity map identifies.
In a preferred embodiment of the present application, the second checking request generation module 303 may include following son
Module:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of
The corresponding one or more cipher modes of second platform identification;
Submodule is decrypted, it is original to obtain for first user information to be decrypted according to the manner of decryption
User information;
Submodule is encrypted, for being encrypted according to one or more of cipher modes to the original user information,
To obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second
User information generates one or more second checking requests.
In a preferred embodiment of the present application, second platform can be verified in the following manner:
Extract the second service for checking credentials mark and the second user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
The second user information and preset third party's user information are verified using the service for checking credentials, to obtain
Obtain the first verification result.
In a preferred embodiment of the present application, first user information can carry out encryption life by specified public key
At second platform can be verified in the following manner:
Extract second service for checking credentials mark and the first user information in the second checking request;
Second service for checking credentials is called to identify the corresponding service for checking credentials;
Specified public key encrypts preset third party's user information using the service for checking credentials, to obtain feature
User information;
It is verified using the second user information and the feature user information, to obtain the first verification result.
In the concrete realization, first verification result may include logic checking result, in Numerical Validation result extremely
Few one kind.
In a preferred embodiment of the present application, which can also include following module:
Normalization module, for carrying out normalization using one or more of first verification results, to obtain the
Two verification results;
Second verification result return module, for second verification result to be returned to first platform.
In a preferred embodiment of the present application, which can also include following module:
First verification result return module, it is flat for one or more of first verification results to be returned to described first
Platform carries out normalization, to obtain the second verification result.
In the concrete realization, the normalization may include logic normalization, at least one in numerical value normalization
Kind.
Referring to Fig. 4, a kind of structural block diagram of the verifying system embodiment of user information of the application, the system packet are shown
Include the first platform 410, hinge platform 420, one or more second platforms 430;Wherein,
First platform 410 may include following module:
First checking request sending module 411, for sending the first checking request to hinge platform;
The hinge platform 420 may include following module:
First checking request receiving module 421, for receiving the first checking request of the first platform transmission;Described first tests
It include the first platform identification, first service for checking credentials mark, the first user information in card request;
Second service for checking credentials identifier lookup module 422, for searching and first platform identification and first verifying
Second service for checking credentials of the one or more mark of service identifiers mapping;
Second checking request generation module 423, at least using one or more of second services for checking credentials mark and
First user information generates one or more second checking requests;
Second checking request sending module 424, for one or more of second checking requests to be respectively sent to one
A or multiple second platforms;
First verification result receiving module 425, for receiving one or more first verification results;
Second platform 430 may include following module:
User information authentication module 431 is tested for being verified for second service for checking credentials mark with obtaining first
Demonstrate,prove result;
First verification result sending module 432, for first verification result to be sent to the hinge platform.
In a preferred embodiment of the present application, first platform 410 can also include following module:
First checking request generation module, for generating the first checking request when receiving service request;
Service Processing Module, for carrying out business processing using second verification result.
It may include authorization data in first checking request in a preferred embodiment of the present application, described
It may include authorization data in two checking requests.
In a preferred embodiment of the present application, second service for checking credentials identifier lookup module 422 may include as
Lower submodule:
First searches submodule, for searching and first platform identification and first service for checking credentials identity map
, hinge service for checking credentials mark and one or more second platform identifications;
Second searches submodule, for searching and one or more of second platform identifications and the hinge service for checking credentials
Second service for checking credentials of one or more of identity map identifies.
In a preferred embodiment of the present application, the second checking request generation module 423 may include following son
Module:
Third searches submodule, for searching the corresponding manner of decryption of first platform identification, one or more of
The corresponding one or more cipher modes of second platform identification;
Submodule is decrypted, it is original to obtain for first user information to be decrypted according to the manner of decryption
User information;
Submodule is encrypted, for being encrypted according to one or more of cipher modes to the original user information,
To obtain one or more second user information;
Submodule is generated, for using one or more of second services for checking credentials mark and one or more of second
User information generates one or more second checking requests.
In a preferred embodiment of the present application, the user information authentication module 431 may include following submodule:
First extracting sub-module, for extracting the second service for checking credentials mark and second user letter in the second checking request
Breath;
First calls submodule, for calling second service for checking credentials to identify the corresponding service for checking credentials;
First verifying submodule, for being used using the service for checking credentials the second user information and preset third party
Family information is verified, to obtain the first verification result.
In a preferred embodiment of the present application, first user information can carry out encryption life by specified public key
At the user information authentication module 431 may include following submodule:
Second extracting sub-module, for extracting the mark of second service for checking credentials in the second checking request and the first user letter
Breath;
Second calls submodule, for calling second service for checking credentials to identify the corresponding service for checking credentials;
Feature user information obtains submodule, for using the service for checking credentials to specified public key to preset third party
User information is encrypted, to obtain feature user information;
Second verifying submodule, for being verified using the second user information with the feature user information, with
Obtain the first verification result.
In the concrete realization, first verification result may include logic checking result, in Numerical Validation result extremely
Few one kind.
In a preferred embodiment of the present application, the hinge platform 420 can also include following module:
Normalization module, for carrying out normalization using one or more of first verification results, to obtain the
Two verification results;
Second verification result return module, for second verification result to be returned to first platform.
In a preferred embodiment of the present application, the hinge platform 420 can also include following module:
First verification result return module, it is flat for one or more of first verification results to be returned to described first
Platform carries out normalization, to obtain the second verification result.
In the concrete realization, the normalization may include logic normalization, at least one in numerical value normalization
Kind.
For device, system embodiment, since it is basically similar to the method embodiment, so the comparison of description is simple
Single, the relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiments of the present application may be provided as method, apparatus or calculating
Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
In a typical configuration, the computer equipment includes one or more processors (CPU), input/output
Interface, network interface and memory.Memory may include the non-volatile memory in computer-readable medium, random access memory
The forms such as device (RAM) and/or Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is to calculate
The example of machine readable medium.Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be with
Realize that information is stored by any method or technique.Information can be computer readable instructions, data structure, the module of program or
Other data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or
Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to
Herein defines, and computer-readable medium does not include non-persistent computer readable media (transitory media), such as
The data-signal and carrier wave of modulation.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, limited by sentence " including one ... "
Element, it is not excluded that including identical being wanted in the process, method of the element, article or terminal device there is also other
Element.
Above to the verifying device and one of a kind of verification method of user information provided herein, a kind of user information
The verifying system of kind of user information, is described in detail, used herein principle and implementation of the specific case to the application
Mode is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;Meanwhile
For those of ordinary skill in the art, according to the thought of the application, has change in specific embodiments and applications
Become place, in conclusion the contents of this specification should not be construed as limiting the present application.