CN109165491A - Security certificate method, apparatus, electronic equipment and storage medium - Google Patents

Security certificate method, apparatus, electronic equipment and storage medium Download PDF

Info

Publication number
CN109165491A
CN109165491A CN201810870827.6A CN201810870827A CN109165491A CN 109165491 A CN109165491 A CN 109165491A CN 201810870827 A CN201810870827 A CN 201810870827A CN 109165491 A CN109165491 A CN 109165491A
Authority
CN
China
Prior art keywords
user
information
verification request
identity
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810870827.6A
Other languages
Chinese (zh)
Inventor
葛伟平
韩海波
邹铁山
孙积慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koala Credit Services Ltd
Original Assignee
Koala Credit Services Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koala Credit Services Ltd filed Critical Koala Credit Services Ltd
Priority to CN201810870827.6A priority Critical patent/CN109165491A/en
Publication of CN109165491A publication Critical patent/CN109165491A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present disclosure discloses a kind of security certificate method, apparatus, electronic equipment and storage medium.Wherein, this method comprises: the information of the first user based on the received, verifies the identity of first user and obtain the position of first user;The information of second user based on the received verifies the identity of the second user and obtains the position of the second user;When the position for determining first user is less than preset threshold at a distance from the position of the second user, in response to first user to the information verification request of the second user, the corresponding authorization requests of the information verification request are sent to the second user;After receiving the license confirmation information that the second user returns, information corresponding to the information verification request is verified;The verification result of information corresponding to the information verification request is returned into first user.

Description

Security certificate method, apparatus, electronic equipment and storage medium
Technical field
This disclosure relates to filed of network information security, and in particular to a kind of security certificate method, apparatus, electronic equipment and deposit Storage media.
Background technique
With the continuous development of society, the commerce and trade cooperation between people becomes more and more frequent and gos deep into, and internet skill Art has further facilitated interpersonal exchange, communication and cooperation, but while cooperation is with intensification is relied on, unreliable or empty To injure caused by legitimate user also can be more serious, this becomes more and more important social credit system for false partner.
Internet while providing convenient but also the manufacture and propagation of deceptive information become more to be easy, it is existing thus Occurs the credit system based on Internet information technique in technology.By the acquisition and processing to personal information, computer can It, can by the information of investigation side to ensure that legitimate user can be appreciated that credit modeling and investigate for related personnel to individual By degree, reduces and even deceptive information is avoided to cause unnecessary injury to legitimate user.
However, inventor has found that the prior art is at least deposited during realizing embodiment of the present disclosure related art scheme In following problems: on the one hand, simple internet interaction not can solve all problems, and many scenes still will rely under line Exchange, to how guaranteeing the authenticity of information under line and consistency is that current internet credit system is difficult to solve from line 's;On the other hand, the credit inquiry based on Internet technology is also faced with the antinomy of personal privacy protection, also that is, credit inquiry It needs to acquire user information in large quantities and user information may be disclosed to other people, and individual subscriber is that protection privacy then may require that the greatest extent Amount avoids personal information collected or is leaked, and existing internet credit system is also difficult to take into account the reliability and safety of information Property.
Summary of the invention
For above-mentioned technical problem in the prior art, the embodiment of the present disclosure propose a kind of security certificate method, apparatus, Electronic equipment and computer readable storage medium lack reliability and security to solve personal information investigation Internet-based The problem of.
The first aspect of the embodiment of the present disclosure provides a kind of security certificate method, comprising: the first user based on the received Information, verify the identity of first user and obtain the position of first user;The letter of second user based on the received Breath, verifies the identity of the second user and obtains the position of the second user;The position for determining first user with When the distance of the position of the second user is less than preset threshold, in response to first user to the information of the second user Checking request sends the corresponding authorization requests of the information verification request to the second user;It is used receiving described second After the license confirmation information that family returns, information corresponding to the information verification request is verified;By the information verification request institute The verification result of corresponding information returns to first user.
In some embodiments, it in the method, is carried simultaneously into the authorization requests of second user transmission The information state of the first user requests verification and/or the identity information of first user.
In some embodiments, the method also includes: in the license confirmation letter for not receiving the second user and returning When ceasing or receive the refusal authorization message that the second user returns, failure information is returned to first user.
In some embodiments, the method also includes: receive what first user adjusted according to the failure information Information verification request is less than preset threshold in the position for determining first user at a distance from the position of the second user When, the corresponding authorization requests again of the information verification request for sending the adjustment to the second user;Receiving described After the confirmation information for the sub-authorization again that two users return, information corresponding to the information verification request of the adjustment is verified;By institute The verification result for stating information corresponding to the information verification request of adjustment returns to first user.
It in some embodiments, include the biology of first user in the method, in the information of first user It include the biological information of the second user in the information of characteristic information and/or the second user.
The second aspect of the embodiment of the present disclosure provides a kind of security certificate method, comprising: sets according to by the first acquisition The biological information of first user of standby acquisition, verifies the identity of first user;It is logical in the identity of first user When crossing verifying, in response to first user to the information verification request of second user, the letter is sent to the second user The corresponding authorization requests of checking request are ceased, the authorization requests include by the second acquisition with the first acquisition proximity of devices Equipment acquires the biological information of the second user;After receiving the license confirmation information that the second user returns, Verify information corresponding to the information verification request;The verification result of information corresponding to the information verification request is returned To first user.
In some embodiments, the second acquisition equipment is the first acquisition equipment.
In some embodiments, the second acquisition equipment and the first acquisition equipment are arranged in same terminal.
In some embodiments, described after receiving the license confirmation information that the second user returns, described in verifying Information corresponding to information verification request, comprising: according to the biological information of the second user of acquisition, verify described the The identity of two users;When the identity of the second user passes through verifying, information corresponding to the information verification request is verified.
The third aspect of the embodiment of the present disclosure provides a kind of device of security certificate, comprising:
First position obtains module, for the information of the first user based on the received, verifies the identity of first user And obtain the position of first user;
The second position obtains module and verifies the identity of the second user for the information of second user based on the received And obtain the position of the second user;
Range estimation module, for small at a distance from the position of the second user in the position for determining first user When preset threshold, in response to first user to the information verification request of the second user, sent out to the second user Send the information verification request corresponding authorization requests;
Authentication module, for verifying the information and testing after receiving the license confirmation information that the second user returns The corresponding information of card request;
Result return module, for the verification result of information corresponding to the information verification request to be returned to described One user.
It in some embodiments, include: authorization requests sending module in the range estimation module, for described the While two users send the authorization requests, the information state and/or described first of the first user requests verification is sent The identity information of user.
In some embodiments, described device further include: failure information return module, for not receiving described second License confirmation information that user returns or when receiving the refusal authorization message that the second user returns, to first user Return to failure information.
In some embodiments, in described device: the range estimation module is also used to, receive first user according to The information verification request of the failure information adjustment, in position and the position of the second user of judgement first user When distance is less than preset threshold, the corresponding sub-authorization again of the information verification request for sending the adjustment to the second user is asked It asks;The authentication module is also used to, after the confirmation information for receiving the sub-authorization again that the second user returns, described in verifying Information corresponding to the information verification request of adjustment;The result return module is also used to, and the Information Authentication of the adjustment is asked The verification result of corresponding information is asked to return to first user.
The fourth aspect of the embodiment of the present disclosure provides a kind of device of security certificate, comprising:
First authentication module, for the biological characteristic letter according to the first user by the first acquisition equipment acquisition Breath verifies the identity of first user;
Authorization request module, for when the identity of first user passes through verifying, in response to first user couple The information verification request of second user sends the corresponding authorization requests of the information verification request to the second user, described Authorization requests include that the biology spy of the second user is acquired by the second acquisition equipment with the first acquisition proximity of devices Reference breath;
Authentication module, for verifying the information and testing after receiving the license confirmation information that the second user returns The corresponding information of card request;
Result return module, for the verification result of information corresponding to the information verification request to be returned to described One user.
In some embodiments, the second acquisition equipment is the first acquisition equipment.
In some embodiments, the second acquisition equipment and the first acquisition equipment are arranged in same terminal.
In some embodiments, the authentication module includes: the second authentication module, for according to described the of acquisition The biological information of two users verifies the identity of the second user;Information authentication module, in the second user When identity passes through verifying, information corresponding to the information verification request is verified.
5th aspect of the embodiment of the present disclosure provides a kind of electronic equipment, comprising:
Memory and one or more processors;
Wherein, the memory is connect with one or more of processor communications, and being stored in the memory can quilt The instruction that one or more of processors execute, when described instruction is executed by one or more of processors, the electronics Equipment is for realizing the method as described in foregoing embodiments.
6th aspect of the embodiment of the present disclosure provides a kind of computer readable storage medium, and being stored thereon with computer can It executes instruction, when the computer executable instructions are executed by a computing apparatus, can be used to realize as described in foregoing embodiments Method.
The embodiment of the present disclosure is in aspectant scene by the user that identification personal information investigates both sides, is adjusted to determine Seeking Truth of making a thorough investigation of is true, and then according to the verification result to both sides' identity and/or by the authorization conditions of investigation side, to guarantee to provide Personal information be reliable and safe.The technical solution of the embodiment of the present disclosure makes full use of the spy of the face-to-face scene of two parties Different property by sufficient authentication and authorization, while ensure that the authenticity of personal information investigation content and to individual The protection of privacy improves the reliability and security of personal information investigation Internet-based.
Detailed description of the invention
The feature and advantage of the disclosure can be more clearly understood by reference to attached drawing, attached drawing is schematically without that should manage Solution is carries out any restrictions to the disclosure, in the accompanying drawings:
Fig. 1 is a kind of interconnection network personal credit plateform system schematic diagram according to shown in the embodiment of the present disclosure;
Fig. 2 is a kind of flow diagram of security certificate method according to shown in the embodiment of the present disclosure;
Fig. 3 is a kind of flow diagram of security certificate method according to shown in the another embodiment of the disclosure;
Fig. 4 is a kind of structural block diagram of the device of security certificate according to shown in the embodiment of the present disclosure;
Fig. 5 is a kind of structural block diagram of the device of security certificate according to shown in the another embodiment of the disclosure;
Fig. 6 is the structural schematic diagram of a kind of electronic equipment according to shown in some embodiments of the present disclosure.
Specific embodiment
In the following detailed description, many details of the disclosure are elaborated by example, in order to provide to correlation The thorough understanding of disclosure.However, for those of ordinary skill in the art, the disclosure can obviously not have this Implement in the case where a little details.It should be understood that using " system ", " device ", " unit " and/or " module " art in the disclosure Language is for distinguishing in the sequence arrangement different components of different stage, element, part or a kind of method of component.However, such as Identical purpose may be implemented in other expression formulas of fruit, these terms can be replaced by other expression formulas.
It should be understood that when equipment, unit or module be referred to as " ... on ", " being connected to " or " being coupled to " it is another When equipment, unit or module, can directly in another equipment, unit or module, be connected or coupled to or with other equipment, Unit or module communication, or may exist intermediate equipment, unit or module, unless context clearly prompts exceptional situation.Example Such as, term "and/or" used in the disclosure includes any one and all combinations of entry listed by one or more correlations.
Term used in the disclosure limits disclosure range only for describing specific embodiment.Such as present disclosure specification With shown in claims, unless context clearly prompts exceptional situation, " one ", "one", the words such as "an" and/or "the" Odd number is not refered in particular to, may also comprise plural number.It is, in general, that term " includes " and "comprising" only prompt to include the spy clearly identified Sign, entirety, step, operation, element and/or component, and such statement do not constitute one it is exclusive enumerate, other features, Including entirety, step, operation, element and/or component also may include.
Referring to the following description and the annexed drawings, these or other feature and feature, operating method, the phase of structure of the disclosure Function, the combination of part and the economy of manufacture for closing element can be better understood, and wherein description and accompanying drawings form Part of specification.It is to be expressly understood, however, that attached drawing is used only as the purpose of illustration and description, it is not intended to limit this Disclosed protection scope.It is understood that attached drawing is not necessarily drawn to scale.
Various structures figure has been used to be used to illustrate various modifications according to an embodiment of the present disclosure in the disclosure.It should be understood that , before or following structure be not for limiting the disclosure.The protection scope of the disclosure is subject to claim.
Internet credit system is relied on to the true sex investigation of personal information in the prior art, internet reference is then to rely on The advantage of internet big data provides and verifies information, although taking certain audit and licensing scheme to guarantee information Reliability and legitimacy, but on certain lines to the scene under line or in terms of privacy of user protection it is still deficient It lacks.Typically, in the cooperation carried out using internet, the verifying through investigation for identity and reliability to another party may be cooperation The demand that both sides have, for example house to let or employ in the service of confinement-caring woman, service has even been confirmed by intermediary The information of opposite side, the two sides concerned also can still wish to the authenticity for verifying other side's identity and information face to face, this is currently to interconnect Net credit system is difficult to the service provided.In addition, internet reference platform should be obtained when acquiring and disclosing userspersonal information The abundant authorization of user, but the prior art often only by application in confirmation message or short message verification code as authorization with Card, which is actually still the simple proof procedure executed by computer program, since computer is difficult to ensure and is known The safety and legitimacy of other licensing process, therefore there are still letters in terms of personal information investigation for existing internet credit system Cease the risk of unreliable and individual privacy leakage.
In the technical solution of the embodiment of the present disclosure, investigation side ensure that by certain technological means and by the letter of investigation side Breath has obtained sufficient authentication vs. authorization, to enhance the reliability and security of personal information investigation.Firstly, such as Fig. 1 Shown, in embodiment of the disclosure, interconnection network personal credit platform 100 can be by server 110 and at least one user Terminal (using the first user terminal 120 and second user terminal 130 as example in Fig. 1) is implemented, server 110 usually also with note Record has the interaction of database 140 of personal credit data.Wherein, user generates/provides personal information, server by user terminal These personal information are acquired to form personal credit data and record in the database;User is further also initiated by user terminal Personal information investigation request, server verifies the request and receives the authorized user message acquired by user terminal, to obtain It takes and requests and the corresponding personal credit data feedback of authorization message is to user terminal.
In some embodiments, server 110 can be individual server, be also possible to a server farm.One Server farm can be centralization, such as data center.One server farm be also possible to it is distributed, such as one Distributed system.Server 110 can be local, be also possible to long-range.In some embodiments, server 110 can be with Data or information are obtained by network.For example, server 110 can obtain the first user terminal 120 of investigation side by network And/or by the data or information of the second user terminal 130 of investigation side.In another example server 110 can be read directly or pass through Data or information in network reading database 140.In some embodiments, server 110 can send data by network Or information.For example, the information that the data of processing or needs are shown can be sent to the first user end by network by server 110 End 120 and/or second user terminal 130.In another example data or information directly can be stored in database 140 by server 110 In or the data of processing be sent to by database 140 by network store.
User terminal is the equipment of user.In Fig. 1, user terminal further comprises the first user terminal of investigation side 120 and by the second user terminal 130 of investigation side, with no restrictions, multiple user terminals can be with for the particular number of user terminal Pass through network attached server 110.Relevant technical staff in the field is appreciated that in Fig. 1 that two class user terminals are only one kind Preferred example, the type and quantity of actual user's terminal are not construed as the limit to disclosed technique scheme specific embodiment System.In some embodiments, the user terminal can be smart machine, for example can be mobile phone, tablet computer or notebook The combination of one or more of computer etc..Multiple user terminals can directly be connect with server respectively, or converge to one It is connect again with server after a node.
Database 140 can refer to the equipment with store function.Database 140 can be local or long-range.Such as Shown in Fig. 1, database can have multiple, and from database 1 until database Q, wherein Q is natural number.Database 140 may include Hierarchical database, network database and relational database etc. or several combinations.Database 140 can be by Information Number After word again by by electricity, magnetically or optically etc. in the way of storage equipment stored.Database 140 can be used to store various letters Breath, for example, procedure, data etc..Database 140 can be the equipment that information is stored in the way of electric energy, for example, various storages Device, random access memory (Random Access Memory (RAM)), read-only memory (Read Only Memory (ROM)) etc..Random access memory may include dekatron, selectron, delay line storage, WILLIAMS-DARLING Ton pipe, dynamic random Memory (DRAM), Static RAM (SRAM), thyristor random access memory (T-RAM), zero capacitance random access memory (Z- ) etc. or several combinations RAM.Read-only memory may include magnetic bubble memory, A.O. linear memory, thin-film memory, magnetic plating Linear memory, magnetic core memory, magnetic drum memory, CD drive, hard disk, tape, early stage nonvolatile storage (NVRAM), phase Variation memory, reluctance type random storage formula memory, ferroelectric random stored memory, non-volatile SRAM, flash memory, the electronics formula of erasing can answer Write read-only memory, Erasable Programmable Read Only Memory EPROM, programmable read only memory, Mask ROM, floating connection Door random access memory, nanometer random access memory, racing track memory, variable resistance type memory, programmable metallization unit etc., or Several combinations.Database 140 can be the equipment that information is stored in the way of magnetic energy, for example, hard disk, floppy disk, tape, magnetic core Memory, magnetic bubble memory, USB flash disk, flash memory etc..Database 140 can be the equipment using optical mode storage information, for example, CD or DVD etc..Database 140 can be the equipment that information is stored in the way of magneto-optic, for example, magneto-optic disk etc..Database 140 Access mode can be random storage, serial access storage, read-only storage etc. or several combinations.Database 140 may include Impermanent memory memory, permanent memory memory, or both combination.
Fig. 2 is the flow diagram of the security certificate method according to shown in some embodiments of the present disclosure.In some implementations In example, the security certificate method is executed by server 110.As shown in Fig. 2, the security certificate method comprising steps of
S201, the information of the first user, verifies the identity of first user and obtains described first and use based on the received The position at family.
In one embodiment of the present disclosure, in order to fully ensure that personal information investigation reliability and security, need It is verified respectively to investigation side and by both sides' identity of investigation side, and ensures to obtain before sending personal information and adequately award Power.Preferred embodiment of the present disclosure is primarily based on the user information received to the verifying of user identity, user information include but It is not limited to account information, the user equipment information, the social information of user, the social network information of user, user of user's registration Network behavior information and user biological information etc. in it is at least a kind of.User can be originated to the reception of user information Personal is actively entered, and is also possible to collect using user equipment, can also be and obtained by network from other equipment It takes, more specific limitation is not done to reception approach herein.And to the verifying of user identity then usually in accordance with formerly having recorded The comparison of user information and the user information being currently received realize;Further, the user information formerly recorded can To be the trust data for having been subjected to verification and assessment.
In a preferred embodiment of the disclosure, by the position of user come auxiliary judgment personal information fact-finding process Authenticity and reliability.The preferred embodiment generally directed to the interaction scenarios under line, that is, ensure on line investigate two parties The interactive environment under aspectant line, to guarantee that user has consistency on messaging on user and line under line, is reduced or avoided Network false information brings unnecessary loss to user.Preferably, the location information of user is acquired in real time by user equipment, Positioning method includes but is not limited at least one of satellite positioning, base station location and WiFi positioning etc..
S202, the information of second user, verifies the identity of the second user and obtains described second and use based on the received The position at family.
In embodiment of the disclosure, to the acquisition of the authentication of second user and location information with to the first user's Handle similar, details are not described herein.
S203 is less than preset threshold in the position for determining first user at a distance from the position of the second user When, in response to first user to the information verification request of the second user, the information is sent to the second user The corresponding authorization requests of checking request.
As previously mentioned, being come auxiliary judgment two parties by the position of user in a preferred embodiment of the disclosure It is no to be in interactive environment under aspectant line.Specifically, by the comparison to two users position, to judge whether both sides meet very The condition of real personal information investigation;Also that is, just allowing progress at both sides position close enough (distance is less than preset threshold) The investigation of people's information.
In the example of the embodiment of the present disclosure, using the first user as investigation side, second user is used as by investigation side, and first (i.e. some or all of requests verification second user information is true for personal information investigation request of user's initiation to second user Property and/or particular content).Optionally, the first user initiates the request and can be at any time in the embodiment of the present disclosure, not It is only limitted to just initiate to request when the distance in position meets condition, for example the first user can be at the beginning of method or in method Except just initiate (when both sides carry out interaction on line) to the personal information investigation request (information verification request) of second user;But only Just think that the request of the first user is reasonable true when distance in both sides position meets condition (when being in face-to-face environment) Real request, can just respond the request of the first user and start subsequent processing.
In order to further protect the privacy of user, the related information by investigation side fed back to investigation side should obtain being adjusted The abundant authorization for the side of looking into, therefore after the information verification request for receiving the first user, authorization further, which is sent, to second user asks Ask so that second user come be confirmed whether should to the first user send associated personal information.Preferably, it is sent to second user The information state (list, abstract, full text etc.) and/or first that first user's requests verification can be carried in authorization requests simultaneously are used The identity information at family, to help second user to judge whether that corresponding authorization should be given.
S204 verifies the information verification request institute after receiving the license confirmation information that the second user returns Corresponding information.
In embodiment of the disclosure, personal information tune is carried out based on by the authorization conditions of investigation side (i.e. second user) It looks into, to guarantee that all personal information being provided out are permitted by user, to avoid the infringement to individual privacy.It is excellent Selection of land, second user can confirm the range and object of authorization simultaneously when being authorized, i.e., may include in license confirmation information The information state (list, abstract, full text etc.) of authorization and/or the confirmation situation to the first user identity.
Optionally, license confirmation information can be application message corresponding with request, short message, can also be second user Input or other preset modes, can also be attached to the identity information (or digital signature) of second user, to authorize as abundant Voucher.
According to the license confirmation of second user, start to verify the information that the first user requests, to ensure to first The authenticity and reliability of field feedback.Either rely on big data, digital signature, biology special the verifying of personal information Sign, block chain, artificial intelligence or manual examination and verification etc. have more complete solution party in existing internet credit system Case, therefore not reinflated description herein.
The verification result of information corresponding to the information verification request is returned to first user by S205.
In embodiment of the disclosure, when obtaining authorization, testing for the information of its requests verification is returned to the first user Demonstrate,prove result;When not obtaining authorization, then the information of this request failure is returned to the first user.Optionally, second user is awarded Weighing confirmation message can only record in server end, can also return to the first user simultaneously.License confirmation information is only in server End record can further protect second user individual privacy, and return to the first user and the first user is then convenient for understand failure original Because investigating strategy or the enough warnings of acquisition to adjust, thus the scheme of the embodiment of the present disclosure can also be according to specific application scenarios Situation selects corresponding strategy to determine to return to the particular content of the first user.
Optionally, in addition, the first user can choose this investigation of end after this request failure, can also suitably adjust Whole subsequent supervention plays the information verification request (personal information investigation request) to second user.The Information Authentication for continuing to initiate is asked The processing mode asked is similar to above method step S203-S205, and details are not described herein.
Embodiment of the disclosure according to Fig.2, by the position of user come auxiliary judgment personal information fact-finding process Authenticity and reliability.The preferred embodiment generally directed on line to the interaction scenarios under line, by two users position away from From whether be less than preset threshold judgement, come determine investigate two parties be in interactive environment under aspectant line, so that it is guaranteed that The information returned to user is the information of object interactive face-to-face, which ensure that user has with user on line under line Standby consistency on messaging, has been reduced or avoided network false information to user and has brought unnecessary loss.
Certainly, relevant technical staff in the field is appreciated that embodiment shown in Fig. 2 only by taking the interaction of two users as an example Illustrative explanation is done to scene interactive face-to-face, in fact, embodiment of the disclosure obviously can also be applied to more The situation of the interaction of user.In addition, embodiment of the disclosure is also not limited to the letter that the first user requests investigation second user The case where breath, second user obviously can also request the information to the first user to be investigated simultaneously;Or when multiple users, arbitrarily One side initiates to may be applicable to embodiment of the disclosure to the personal information investigation of any other one or more users, herein not Targeted number of users and investigation direction to embodiment of the present disclosure technical solution do specific limitation.
Fig. 3 is the flow diagram of the security certificate method according to shown in the other embodiment of the disclosure.In some realities It applies in example, the security certificate method is executed by server 110.It should be noted that the embodiment of Fig. 2 server end is to pass through The position (determining by the first user terminal 120 and the facility information of second user terminal 130) of two users judges user In scene interactive face-to-face, so that personal information investigation service is provided for user interactive face-to-face, to ensure to use under line User has consistency on messaging on family and line;And the embodiment of Fig. 3 is then logical according to the acquisition of the biological information to both sides The acquisition equipment for crossing known neighbouring (including identical) is completed, to ensure investigation side and be in aspectant environment by investigation side.Fig. 3 With it is face-to-face authorization guarantee investigation request be by being permitted by the side of investigation, while using the biological information of both sides as investigate The authorized certificate of request is further ensured while meeting user demand and is not investigated illegally by the individual privacy of investigation side Infringement.It also, should not be by Fig. 3 embodiment that is, the application scenarios of embodiment shown in Fig. 3 and Fig. 2 embodiment have certain difference Technical solution be simply interpreted as the supplement to Fig. 2 technical solution.
Specifically, as shown in figure 3, the security certificate method comprising steps of
S301 verifies described first and uses according to the biological information of the first user by the first acquisition equipment acquisition The identity at family.
S302, when the identity of first user passes through verifying, in response to first user to the letter of second user Checking request is ceased, sends the corresponding authorization requests of the information verification request to the second user, the authorization requests include The biological information of the second user is acquired by the second acquisition equipment with the first acquisition proximity of devices.
Wherein, the first acquisition equipment and the second acquisition equipment it is adjoining should be it is known, do not need additional verifying step Rapid.For example, the first acquisition equipment and the second acquisition equipment are all disposed in same terminal, they should be neighbouring;Alternatively, Although first acquisition equipment and the second acquisition equipment are arranged in different terminals, but two different terminals are known neighbouring 's;Alternatively, the first acquisition equipment is identical with the second acquisition equipment.
S303 verifies the information verification request institute after receiving the license confirmation information that the second user returns Corresponding information.
The verification result of information corresponding to the information verification request is returned to first user by S304.
It is described after receiving the license confirmation information that the second user returns in some embodiments of the present disclosure, Verify information corresponding to the information verification request, comprising: according to the biological information of the second user of acquisition, test Demonstrate,prove the identity of the second user;When the identity of the second user passes through verifying, it is right to verify the information verification request institute The information answered.
It optionally, can be by any user end to the acquisition of both sides' biological information in security certificate method shown in Fig. 3 (such as the first user terminal 120 or second user terminal 130) is held to execute.Specifically, by taking the first user terminal 120 as an example, institute Security certificate method is stated in subscriber terminal side comprising steps of
The biological information of the first user is acquired by the first acquisition equipment on the first user terminal 120;
When the identity of first user passes through verifying, in response to first user to the information of the second user Checking request sends the corresponding authorization requests of the information verification request to the second user, and the authorization requests include logical The biological information that the second user is acquired with the second acquisition equipment of the first user terminal 120 is crossed, optionally, second adopts It is identical as the first acquisition equipment to collect equipment;
When the authentication of the second user passes through, generates license confirmation information and send;
Receive the verification result of information corresponding to the information verification request.
In some embodiments of the present disclosure, it is contemplated that the investigation of personal information is actually to invade one kind of individual privacy Violate, needs to be adequately protected while meeting the needs of investigation side by the privacy of investigation side, i.e. interconnection network personal credit platform On the one hand it needs to disclose personal reference information to an other side in the case where individual, which obtains, to be allowed, it on the one hand will also be to personal hidden Private carries out necessary protection, so that personal information is not revealed illegally.For this purpose, in embodiment of the disclosure, by face-to-face The biological information that ground acquisition can not be forged by investigation side is as voucher, to guarantee that each personal information investigation all obtains By the adequately authorization face-to-face of investigation side, so that personal reference becomes more reliable and individual privacy information is protected not disliked Meaning discloses.
Wherein, the targeted biological information of the embodiment of the present disclosure includes but is not limited to face-image, fingerprint image, eye At least one of in base map picture and voiceprint, the acquisition device and method of biological information have more in the prior art Mature technical solution, is not repeating herein.In disclosure an optional embodiment, the biology of two parties collected The type of characteristic information can be the same or different;Therefore correspondingly, in one embodiment of the present disclosure, equipment is acquired Also be not limited to must be same equipment (such as by fingerprint sensor acquire the first user finger print information, pass through recording The voiceprint etc. of equipment acquisition second user), as long as completing the biological information to two parties by neighbouring equipment Acquisition.Optionally, according to identity of the biological information to user verify can server end complete can also It is locally completed in user terminal, but for the protection to individual subscriber privacy, and also to guarantee the reliability of authentication, It is preferred that carrying out authentication in server end, user terminal only receives verification result.
In disclosure embodiment shown in Fig. 3, only it need to guarantee to collect two parties by neighbouring acquisition equipment Biological information, so that it may confirm that two parties are in the scene authorized face-to-face;Since biological information has uniquely Property, thus the biological information that authorize face-to-face when acquires can be to avoid the puppet of either side as the voucher sufficiently authorized Behavior is made or denied, ensure that legitimacy, the reliability and security of personal information investigation.
Relevant technical staff in the field is appreciated that the key of embodiment shown in Fig. 3 is to set by neighbouring acquisition The biological information of standby acquisition both sides, therefore the information collection of its technical solution can execute in any one user terminal, Including but not limited to executed in investigation side's terminal (the first user terminal 120) or by investigation side's terminal (second user terminal 130), Therefore the specific terminal that executes is not limited herein.
Optionally, in order to guarantee the progress authorized face-to-face, in embodiment of the disclosure, it is being authorized face-to-face It is preceding also to arrange the details authorized face-to-face for investigation side and by investigation side.Wherein, after being agreed to receive investigation by investigation side, It can be returned only to by the confirmation message of investigation side and the specific personal information of non-disclosre;Then, both sides' agreement authorizes face-to-face The information such as specific time and location.The request authorized face-to-face can be initiated by either side, and include the appointed information of time and location It can also be proposed by either side or be provided by server end, other party receives association requests and appointed information.If each side is agreed to, The face-to-face licensing process that method shown in Fig. 3 is then executed by appointed information, can not honour an agreement, then if any at least one party by appointed information Re-start agreement.
Specifically, by taking investigation side's terminal (the first user terminal 120) as an example, the method also includes: initiate described first Information verification request of the user to the second user;The second user is received to the confirmation letter of the information verification request The face-to-face authorization requests for being directed to the confirmation message are initiated and/or received to breath;Receive and/or confirm the face-to-face authorization The appointed information of request.If for by investigation side's terminal (second user terminal 130), the method also includes: receive institute The first user is stated to the information verification request of the second user;The second user is sent to the information verification request really Recognize information;Receive and/or initiate the face-to-face authorization requests for being directed to the confirmation message;Confirm and/or receives described face-to-face The appointed information of authorization requests.
Optionally, in addition, in face-to-face licensing process, can also to acquisition second user biological information the step of It is proposed that the acquisition time limit requires;Continue subsequent step if completing acquisition within the acquisition time limit;If exceeding the acquisition Time limit requires to fail to collect the biological information of the second user, then returns to the failure for being directed to the information verification request Information.
In embodiment of the disclosure, investigation side is acquired by using neighbouring acquisition equipment and by the biology of investigation side On the one hand characteristic information ensure that both sides are in aspectant scene, that is, ensure that both sides know the case where personals poll Feelings, there is no the investigation of illegal personal information;On the other hand using the biological information by investigation side that acquires face-to-face as Authorized certificate avoids personal information to guarantee that the information sent to investigation side is the content by being permitted by the side of investigation Improper leakage.
Fig. 4 is the schematic device of the security certificate according to shown in some embodiments of the present disclosure.As shown in figure 4, safety The device 400 of authorization includes: that first position obtains module 410, the second position obtains module 420, range estimation module 430, tests Demonstrate,prove module 440 and result return module 450;Wherein, first position obtains module 410, for the first user's based on the received Information verifies the identity of first user and obtains the position of first user;The second position obtains module 420, is used for The information of second user based on the received verifies the identity of the second user and obtains the position of the second user;Distance Determination module 430, for being less than default threshold at a distance from the position of the second user in the position for determining first user When value, in response to first user to the information verification request of the second user, the letter is sent to the second user Cease the corresponding authorization requests of checking request;Authentication module 440, in the license confirmation letter for receiving the second user return After breath, information corresponding to the information verification request is verified;Result return module 450 is used for the information verification request The verification result of corresponding information returns to first user.
Correspondingly with security certificate method shown in Fig. 2, security certificate device shown in Fig. 4 is preferably server end Device, wherein first position obtains module 410 and interacts with the first user terminal, and the second position obtains module 420 and second user Terminal interaction, the information for receiving two users respectively carry out authentication and obtain user location.Range estimation module 430 utilizes two User location is judged, to determine that both sides are in the scene interacted face-to-face, to guarantee the request of personal information investigation It is true, while also ensures the consistency under line with information on line, enhances the reliability and security of information investigation.
It in embodiment of the disclosure, optionally, include: authorization requests sending module in the range estimation module 430, For sending the information state of the first user requests verification while sending the authorization requests to the second user And/or the identity information of first user.
Optionally, described device further include: failure information return module, for not receiving the second user return License confirmation information or when receiving the refusal authorization message that the second user returns, return and fail to first user Information.
Optionally, in described device: the range estimation module is also used to, and receives first user according to the failure The information verification request of information adjustment is less than at a distance from the position of the second user in the position for determining first user When preset threshold, the corresponding authorization requests again of the information verification request for sending the adjustment to the second user;It is described to test Card module is also used to, and after the confirmation information for receiving the sub-authorization again that the second user returns, verifies the letter of the adjustment Cease information corresponding to checking request;The result return module is also used to, will be corresponding to the information verification request of the adjustment The verification result of information return to first user.
Fig. 5 is the schematic device of the security certificate according to shown in some embodiments of the present disclosure.As shown in figure 5, safety The device 500 of authorization includes: that the first authentication module 510, authorization request module 520, authentication module 530 and result return to mould Block 540;Wherein, the first authentication module 510, it is special for the biology according to the first user by the first acquisition equipment acquisition Reference breath, verifies the identity of first user;Authorization request module 520, for the identity in first user by testing When card, in response to first user to the information verification request of second user, the information is sent to the second user and is tested Card requests corresponding authorization requests, and the authorization requests include by the second acquisition equipment with the first acquisition proximity of devices Acquire the biological information of the second user;Authentication module 530, in the authorization for receiving the second user return After confirmation message, information corresponding to the information verification request is verified;Result return module 540, for testing the information The verification result of the corresponding information of card request returns to first user.
In some embodiments of the present disclosure, the second acquisition equipment is the first acquisition equipment.
In some embodiments of the present disclosure, the second acquisition equipment and the first acquisition equipment were arranged at same end On end.
In some embodiments of the present disclosure, the authentication module includes: the second authentication module, for according to acquisition The second user biological information, verify the identity of the second user;Information authentication module, for described the When the identity of two users passes through verifying, information corresponding to the information verification request is verified.
Correspondingly with security certificate method shown in Fig. 3, security certificate device shown in fig. 5 passes through neighbouring acquisition Equipment acquires the biological information of both sides, to ensure that both sides are in authorization scene face-to-face.In some optional embodiments In, than as shown in Figure 1, the system of the embodiment of the present disclosure includes server end and at least two clients, wherein the first client End is surveyee's client, and second of client is investigator's client;Security certificate device shown in fig. 5 preferably services Device end device, and information collection can be executed by the user terminal apparatus of any one client, it can also be by two clients User terminal apparatus execute respectively, as long as they are known neighbouring.Optionally, server end has memory module, is used for Store personal credit data.Server end also includes message processing module, is used for various data relevant to personal credit It is handled.Server end further includes network communication module, and network communication module is used for through wired or wireless network and its His server or client communicate.Client and server passes through network connection.The client include communication module, Data memory module, data processing module, human-computer interaction module and image sensing module.
In a kind of preferably embodiment, client sends personal credit investigation request to investigator by inquiry, Described in include personal relevant identification information in request.Server end after receiving the request, is searched in the local database Rope sends personal information investigation request to surveyee by surveyee's client after finding corresponding data.Optionally, Surveyee can send confirmation investigation by man-machine interface or short message.Note that server end only records surveyee at this time Approval information, without personal information is sent to investigator's client.Optionally, server includes face in investigation request Opposite authorization flow information.
Further, investigator and surveyee are investigated or are visited face to face by client or other means of communication agreement It talks.After both sides' meeting, the imaging sensor of investigator's client by inquiry obtains the biological characteristic letter of surveyee Breath, such as face-image, fingerprint image, eye fundus image, voiceprint.Investigator's client sends information to server end, The biological information is compared server end with the personal information in database, after comparison passes through, by personal letter The client of investigator is sent to information.Meanwhile the biology of the surveyee of server storage investigator's client transmission is special Reference breath, as authorized certificate.If server end does not receive the facial credit information of surveyee at the appointed time, Automatically the request of storage is cancelled.
Server, which receives, requests and personal information investigation is forwarded to request, and server and two clients are specific The lower authorization for completing personal information investigation of configuration.Wherein, server must by inquiry client obtain surveyee life Object characteristic information could be completed to compare.
By above method, personal reference platform is connected to two kinds of clients as third party's data platform.Due to two kinds The identity of the user of client is different, so that the request and transmission of this sensitive information of personal credit are established a kind of sufficient On authorization, that is, only surveyee's requests authorization surveyee when, personal credit information can disclose.Specifically , the abundant authorization is that client acquires surveyee's biological information this process face to face and completes by inquiry, due to Existing biological feather recognition method supports In vivo detection, therefore will by the biological information that surveyee sends record The comparison of server end can not be passed through.Compared to existing third party's request of data and transmission mode, such as the side of input identifying code Formula, all retaining the invention enables reference platform in the disclosure of each personal credit information has legal voucher, therefore mentions significantly The high reliability and personal information protection ability of personal reference platform.
In one embodiment, server is when receiving surveyee's biological information from investigator's client, together When the location informations of two clients is obtained by two kinds of clients.Further, both server end confirmations position coordinates distance When less than certain threshold value, just completes to compare and send personal credit information.
In one embodiment, server is receiving surveyee's biological information simultaneously from investigator's client, Start another imaging sensor of smart machine, such as the front camera of smart phone, while obtaining the life of investigator Object characteristic information.Server end, while will be in the biological information and database of investigator and surveyee when comparing Record is compared, and just sends personal credit information after the two compares successfully simultaneously.
In another embodiment, the server end records the above-mentioned information authorized face-to-face, and further remembers Record the subsequent contract information of investigator and surveyee.For example, personal credit information is used as a kind of professional collage-credit data, The credit information purpose that investigator carries out investigation surveyee is to carry out professional background investigation.Therefore, server end is to each The secondary personal credit information investigation authorized face-to-face is required to feedback application result information.Further, server end can count The investigation bring signing success rate of investigator.Further, server end is when sending investigation request to surveyee's client, The signing success rate is shown simultaneously.In this embodiment, surveyee can obtain when receiving investigation request for the first time To the signing intention between investigator and surveyee.When investigator's malice obtain the personal information of a large amount of surveyees without In the case where the subsequent signing of essence, platform will obtain a lower signing success rate, and surveyee can choose refusal at this time It investigates and personal information is avoided to leak.
In another embodiment, the server end provided in surveyee's client reversely investigate it is man-machine Interface.When server end send an investigation request arrive surveyee's client when, surveyee can initiate simultaneously one instead To request, which is sent to the associated individual of investigator by server end.For example, request can be sent to investigation At the individual that person interior employee or investigator investigated.By face-to-face or other authorizations, surveyee is available anti- To the personal information of respondent or the relevant information of other investigators.In this embodiment, surveyee can pass through The relevant personal credit information of investigator is obtained, whether further auxiliary judgment should receive personal credit information investigation request.
In another embodiment, the server end uses number when receiving personal credit information investigation request Surveyee's personal credit information is handled according to processing module, then by treated, surveyee's information is sent to investigation Person.The data processing makes, and personal credit information is converted to half disclosure state, and investigator is enabled to obtain surveyee's The general view of personal information, while being unable to get the accurate personal credit information of surveyee.For example, the previous graduate college of Zhang San is " Peking University ", information that treated are " 985 university ".The past master information of Zhang San be " Baidu ", " Tencent ", " Jingdone district ", Information that then treated is " three Internet enterprises are inaugural ".The processing mode can classify data, and will be personal Each entry of information is included into different classifications, and the other classification of upper level of specific data call when data processing to come in fact It is existing.Further, after surveyee completes authorization face-to-face, server sends investigator visitor for detailed personal information again Family end.Alternatively, treated the information is the preconfigured field of surveyee, that is, before face-to-face authorization, adjust The person of looking into can only obtain surveyee and it is expected the information disclosed, after obtaining authorization face-to-face, the available whole quilts of investigator The personal credit information of investigator.
The structure that Fig. 6 is adapted for for realizing the electronic equipment of the information flow method for pushing according to disclosure embodiment is shown It is intended to.Optionally, either server-side devices or subscriber terminal equipment can be existed using structure shown in fig. 6.
As shown in fig. 6, electronic equipment 600 includes central processing unit (CPU) 601, it can be according to being stored in read-only deposit Program in reservoir (ROM) 602 is held from the program that storage section 608 is loaded into random access storage device (RAM) 603 Various processing in the above-mentioned method implementation shown in fig. 1 or fig. 2 of row.In RAM603, it is also stored with the behaviour of electronic equipment 600 Various programs and data needed for making.CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to bus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 605 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be mounted into storage section 608 as needed.
Particularly, it according to embodiment of the present disclosure, may be implemented as counting above with reference to Fig. 1 or Fig. 2 method described Calculation machine software program.For example, embodiment of the present disclosure includes a kind of computer program product comprising be tangibly embodied in and Computer program on its readable medium, the computer program include the program code for executing the method for Fig. 1 or Fig. 2. In such an embodiment, which can be downloaded and installed from network by communications portion 609, and/or It is mounted from detachable media 611.
Flow chart and block diagram in attached drawing illustrate system, method and computer according to the various embodiments of the disclosure The architecture, function and operation in the cards of program product.In this regard, each box in course diagram or block diagram can be with A part of a module, section or code is represented, a part of the module, section or code includes one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yiyong The dedicated hardware based system of defined functions or operations is executed to realize, or can be referred to specialized hardware and computer The combination of order is realized.
Being described in unit or module involved in disclosure embodiment can be realized by way of software, can also It is realized in a manner of through hardware.Described unit or module also can be set in the processor, these units or module Title do not constitute the restriction to the unit or module itself under certain conditions.
As on the other hand, the disclosure additionally provides a kind of computer readable storage medium, the computer-readable storage medium Matter can be computer readable storage medium included in device described in above embodiment;It is also possible to individualism, Without the computer readable storage medium in supplying equipment.Computer-readable recording medium storage has one or more than one journey Sequence, described program is used to execute by one or more than one processor is described in disclosed method.
In conclusion the present disclosure proposes a kind of security certificate method, apparatus, electronic equipment and its computer-readable storages Medium.The embodiment of the present disclosure is in aspectant scene by the user that identification personal information investigates both sides, to determine investigation Request is true, and then according to the verification result to both sides' identity and/or by the authorization conditions of investigation side, to guarantee offer Personal information is reliable and safe.The technical solution of the embodiment of the present disclosure makes full use of the special of the face-to-face scene of two parties Property, by sufficient authentication and authorization, while it ensure that the authenticity of personal information investigation content and to personal hidden Private protection improves the reliability and security of personal information investigation Internet-based.
It should be understood that the above-mentioned specific embodiment of the disclosure is used only for exemplary illustration or explains the disclosure Principle, without constituting the limitation to the disclosure.Therefore, that is done without departing from spirit and scope of the present disclosure is any Modification, equivalent replacement, improvement etc., should be included within the protection scope of the disclosure.In addition, disclosure appended claims purport Covering the whole variations fallen into attached claim scope and boundary or this range and the equivalent form on boundary and is repairing Change example.

Claims (19)

1. a kind of security certificate method characterized by comprising
The information of first user based on the received verifies the identity of first user and obtains the position of first user;
The information of second user based on the received verifies the identity of the second user and obtains the position of the second user;
When the position for determining first user is less than preset threshold at a distance from the position of the second user, in response to institute The first user is stated to the information verification request of the second user, it is corresponding to send the information verification request to the second user Authorization requests;
After receiving the license confirmation information that the second user returns, letter corresponding to the information verification request is verified Breath;
The verification result of information corresponding to the information verification request is returned into first user.
2. the method according to claim 1, wherein in the method, send to the second user described in The information state of the first user requests verification and/or the identity information of first user are carried in authorization requests simultaneously.
3. the method according to claim 1, wherein the method also includes:
It is awarded not receiving the license confirmation information of the second user return or receiving the refusal that the second user returns When weighing information, failure information is returned to first user.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
The information verification request that first user adjusts according to the failure information is received, in the position for determining first user When setting at a distance from the position of the second user less than preset threshold, the information for sending the adjustment to the second user is tested Card requests corresponding authorization requests again;
After the confirmation information for receiving the sub-authorization again that the second user returns, the information verification request of the adjustment is verified Corresponding information;
The verification result of information corresponding to the information verification request of the adjustment is returned into first user.
5. the method according to claim 1, wherein including in the information of first user in the method Biology in the biological information of first user and/or the information of the second user including the second user is special Reference breath.
6. a kind of security certificate method characterized by comprising
According to the biological information of the first user by the first acquisition equipment acquisition, the identity of first user is verified;
When the identity of first user passes through verifying, the Information Authentication of second user is asked in response to first user Ask, send the corresponding authorization requests of the information verification request to the second user, the authorization requests include by with institute The the second acquisition equipment for stating the first acquisition proximity of devices acquires the biological information of the second user;
After receiving the license confirmation information that the second user returns, letter corresponding to the information verification request is verified Breath;
The verification result of information corresponding to the information verification request is returned into first user.
7. according to the method described in claim 6, it is characterized in that, the second acquisition equipment is the first acquisition equipment.
8. according to the method described in claim 6, it is characterized in that, the second acquisition equipment is set with the first acquisition equipment It sets in same terminal.
9. according to the described in any item methods of claim 6-8, which is characterized in that described to receive the second user return License confirmation information after, verify information corresponding to the information verification request, comprising:
According to the biological information of the second user of acquisition, the identity of the second user is verified;
When the identity of the second user passes through verifying, information corresponding to the information verification request is verified.
10. a kind of device of security certificate characterized by comprising
First position obtains module, for the information of the first user based on the received, verifies the identity of first user and obtains Take the position of first user;
The second position obtains module and verifies the identity of the second user for the information of second user based on the received and obtain Take the position of the second user;
Range estimation module, it is pre- for being less than at a distance from the position of the second user in the position for determining first user If when threshold value, in response to first user to the information verification request of the second user, sending institute to the second user State the corresponding authorization requests of information verification request;
Authentication module, for verifying the Information Authentication and asking after receiving the license confirmation information that the second user returns Seek corresponding information;
Result return module is used for the verification result of information corresponding to the information verification request to be returned to described first Family.
11. device according to claim 10, which is characterized in that include: in the range estimation module
Authorization requests sending module, for sending described first while sending the authorization requests to the second user The information state of user's requests verification and/or the identity information of first user.
12. device according to claim 10, which is characterized in that described device further include:
Failure information return module, for not receiving the license confirmation information or receive described that the second user returns When the refusal authorization message that second user returns, failure information is returned to first user.
13. device according to claim 10, which is characterized in that in described device:
The range estimation module is also used to, and is received first user and is asked according to the Information Authentication that the failure information adjusts Ask, in the position for determining first user with the position of the second user at a distance from less than preset threshold when, to described the Two users send the corresponding authorization requests again of information verification request of the adjustment;
The authentication module is also used to, and after the confirmation information for receiving the sub-authorization again that the second user returns, verifies institute State information corresponding to the information verification request of adjustment;
The result return module is also used to, and the verification result of information corresponding to the information verification request of the adjustment is returned To first user.
14. a kind of device of security certificate characterized by comprising
First authentication module is tested for the biological information according to the first user by the first acquisition equipment acquisition Demonstrate,prove the identity of first user;
Authorization request module, for when the identity of first user passes through verifying, in response to first user to second The information verification request of user sends the corresponding authorization requests of the information verification request, the authorization to the second user Request includes being believed by the biological characteristic that the second acquisition equipment with the first acquisition proximity of devices acquires the second user Breath;
Authentication module, for verifying the Information Authentication and asking after receiving the license confirmation information that the second user returns Seek corresponding information;
Result return module is used for the verification result of information corresponding to the information verification request to be returned to described first Family.
15. device according to claim 14, which is characterized in that the second acquisition equipment is that first acquisition is set It is standby.
16. device according to claim 14, which is characterized in that the second acquisition equipment and the first acquisition equipment It is arranged in same terminal.
17. the described in any item devices of 4-16 according to claim 1, which is characterized in that the authentication module includes:
Second authentication module is verified described second and is used for the biological information according to the second user of acquisition The identity at family;
Information authentication module is right for when the identity of the second user passes through verifying, verifying the information verification request institute The information answered.
18. a kind of electronic equipment characterized by comprising
Memory and one or more processors;
Wherein, the memory is connect with one or more of processor communications, and being stored in the memory can be described The instruction that one or more processors execute, when described instruction is executed by one or more of processors, the electronic equipment For realizing such as described in any item methods of claim 1-9.
19. a kind of computer readable storage medium, is stored thereon with computer executable instructions, refer to when the computer is executable When order is executed by a computing apparatus, it can be used to realize such as the described in any item methods of claim 1-9.
CN201810870827.6A 2018-08-02 2018-08-02 Security certificate method, apparatus, electronic equipment and storage medium Pending CN109165491A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810870827.6A CN109165491A (en) 2018-08-02 2018-08-02 Security certificate method, apparatus, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810870827.6A CN109165491A (en) 2018-08-02 2018-08-02 Security certificate method, apparatus, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109165491A true CN109165491A (en) 2019-01-08

Family

ID=64898752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810870827.6A Pending CN109165491A (en) 2018-08-02 2018-08-02 Security certificate method, apparatus, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109165491A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254893A (en) * 2020-02-13 2021-08-13 百度在线网络技术(北京)有限公司 Identity verification method and device, electronic equipment and storage medium
TWI777148B (en) * 2020-03-27 2022-09-11 鴻海精密工業股份有限公司 Identity verification method, computer device, and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101589400A (en) * 2007-01-26 2009-11-25 日本电气株式会社 Right management method, its system, server device used in the system, and information device terminal
CN106056376A (en) * 2016-05-20 2016-10-26 深圳卡通新技术有限公司 Mobile terminal authorization system and method based on close distance induction triggering
CN107733915A (en) * 2017-11-09 2018-02-23 上海快视信息技术有限公司 The method and apparatus that identity validation is completed by terminal and server interaction
CN107948274A (en) * 2017-11-22 2018-04-20 北京同城必应科技有限公司 Business confirmation method and system, server, storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101589400A (en) * 2007-01-26 2009-11-25 日本电气株式会社 Right management method, its system, server device used in the system, and information device terminal
CN106056376A (en) * 2016-05-20 2016-10-26 深圳卡通新技术有限公司 Mobile terminal authorization system and method based on close distance induction triggering
CN107733915A (en) * 2017-11-09 2018-02-23 上海快视信息技术有限公司 The method and apparatus that identity validation is completed by terminal and server interaction
CN107948274A (en) * 2017-11-22 2018-04-20 北京同城必应科技有限公司 Business confirmation method and system, server, storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254893A (en) * 2020-02-13 2021-08-13 百度在线网络技术(北京)有限公司 Identity verification method and device, electronic equipment and storage medium
CN113254893B (en) * 2020-02-13 2023-09-19 百度在线网络技术(北京)有限公司 Identity verification method and device, electronic equipment and storage medium
TWI777148B (en) * 2020-03-27 2022-09-11 鴻海精密工業股份有限公司 Identity verification method, computer device, and readable storage medium

Similar Documents

Publication Publication Date Title
US11042719B2 (en) Digital identity system
CN104240342B (en) Access control method and device based on identity authentication
CN107294721A (en) The method and apparatus of identity registration, certification based on biological characteristic
US20180181964A1 (en) Secure Electronic Payment
CN107679861A (en) Resource transfers method, payment funding method, apparatus and electronic equipment
CN107025397B (en) Identity information acquisition method and device
CN107729727A (en) The real name identification method and device of a kind of account number
GB2549371A (en) Access authentication method and system
CN109461233A (en) Caller management method, system, computer equipment and storage medium
CN109409893A (en) A kind of belief system and its construction method, equipment and storage medium
CN109413086A (en) Line coker tests the method and device of identity information
CN106897586A (en) A kind of application programming interface API right management methods and device
CN110535882A (en) A kind of identity authentication service method and system based on heterogeneous terminals
US11531776B2 (en) Image and message management and archiving for events
CN109857766A (en) User information verification method, device, computer equipment and computer storage medium
CN109165491A (en) Security certificate method, apparatus, electronic equipment and storage medium
CN107517180A (en) Login method and device
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
CN104704521B (en) Multifactor profile and security fingerprint analysis
CN106056005A (en) Method for sharing satellite information data
CN105071993B (en) Encrypted state detection method and system
CN109145063A (en) Sincere authentication method, the authentication method of identity information and device
CN107767511A (en) A kind of gate inhibition's verification method based on Quick Response Code
CN113824732A (en) Zero trust-based multi-factor authentication method
CN106203166A (en) A kind of auto navigation information data sharing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190108

RJ01 Rejection of invention patent application after publication