CN110225002A - Business handling method and Related product - Google Patents

Business handling method and Related product Download PDF

Info

Publication number
CN110225002A
CN110225002A CN201910426567.8A CN201910426567A CN110225002A CN 110225002 A CN110225002 A CN 110225002A CN 201910426567 A CN201910426567 A CN 201910426567A CN 110225002 A CN110225002 A CN 110225002A
Authority
CN
China
Prior art keywords
information
server
user
terminal
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910426567.8A
Other languages
Chinese (zh)
Other versions
CN110225002B (en
Inventor
王义文
王健宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910426567.8A priority Critical patent/CN110225002B/en
Publication of CN110225002A publication Critical patent/CN110225002A/en
Application granted granted Critical
Publication of CN110225002B publication Critical patent/CN110225002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The embodiment of the present application discloses a kind of business handling method and Related product, and wherein method is applied to server, this method comprises: the server, which receives first terminal, is directed to the information to be verified sent to transacting business;The server obtains the corresponding identity characteristic information of the information to be verified;If the identity characteristic information includes that the first identity characteristic information of corresponding first user of the first terminal and the Second Identity of Local information to the corresponding second user of transacting business, the server obtain the target association value between first user and the second user;If the target association value is greater than first threshold, the server is handled described to transacting business.Using the application, the convenience of business handling operation can be improved.

Description

Business handling method and Related product
Technical field
This application involves field of computer technology, a kind of business handling method and Related product have been related generally to.
Background technique
It is handled currently, user in transacting business, generally requires carrying proof of identification to business hall, such as: communication operation Quotient requires real-name authentication, then major operator business hall needs to verify the identity information of the user of transacting business.If user goes Proof of identification is forgotten to carry when business hall, the business of will lead to can not be handled normally.
Summary of the invention
The embodiment of the present application provides a kind of business handling method and Related product, and the convenience of business handling operation can be improved Property.
In a first aspect, the embodiment of the present application provides a kind of business handling method, it is applied to server, in which:
The server receives first terminal and is directed to the information to be verified sent to transacting business, and the information to be verified is extremely It less include with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
The server obtains the corresponding identity characteristic information of the information to be verified;
If the identity characteristic information include corresponding first user of the first terminal the first identity characteristic information and The Second Identity of Local information to the corresponding second user of transacting business, then the server obtain first user with Target association value between the second user;
If the target association value is greater than first threshold, the server is handled described to transacting business.
Second aspect, the embodiment of the present application provide a kind of business handling device, are applied to server, in which:
Communication unit is directed to the information to be verified sent to transacting business, the letter to be verified for receiving first terminal Breath is included at least with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Acquiring unit, for obtaining the corresponding identity characteristic information of the information to be verified;If the identity characteristic information It the first identity characteristic information including corresponding first user of the first terminal and described is used to transacting business corresponding second The Second Identity of Local information at family then obtains the target association value between first user and the second user;
Unit is handled, if being greater than first threshold for the target association value, is handled described to transacting business.
The third aspect, the embodiment of the present application provide a kind of server, including processor, memory, communication interface and one A or multiple programs, wherein said one or multiple programs are stored in above-mentioned memory, and are configured by above-mentioned processing Device executes, and described program includes the instruction for the step some or all of as described in first aspect.
Fourth aspect, the embodiment of the present application provide another business handling method, are applied to first terminal, in which:
The first terminal is obtained for the information to be verified inputted to transacting business, and the information to be verified includes at least With the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
The first terminal sends the information to be verified to server;
If it includes that the first terminal is corresponding that the server, which obtains the corresponding identity characteristic information of the information to be verified, The first user the first identity characteristic information and the Second Identity of Local information to the corresponding second user of transacting business, And the target association value between first user and the second user is greater than first threshold, then the first terminal is based on institute State server handle it is described to transacting business.
5th aspect, the embodiment of the present application provide another business handling device, are applied to first terminal, in which:
Acquiring unit, for obtaining for the corresponding information to be verified of transacting business, the information to be verified is at least wrapped It includes with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Communication unit, for sending the information to be verified to server;
Unit is handled, if it includes described for obtaining the corresponding identity characteristic information of the information to be verified for the server The first identity characteristic information of corresponding first user of first terminal and second to the corresponding second user of transacting business Identity characteristic information, and the target association value between first user and the second user is greater than first threshold, then is based on The server is handled described to transacting business.
6th aspect, the embodiment of the present application provide a kind of computer readable storage medium, wherein described computer-readable Storage medium stores computer program, wherein the computer program makes computer execute such as the embodiment of the present application first party Step some or all of described in face and fourth aspect.
7th aspect, the embodiment of the present application provide a kind of computer program product, wherein the computer program product Non-transient computer readable storage medium including storing computer program, the computer program are operable to make to calculate Machine executes the step some or all of as described in the embodiment of the present application first aspect and fourth aspect.The computer program produces Product can be a software installation packet.
Implement the embodiment of the present application, will have the following beneficial effects:
After above-mentioned business handling method and Related product, server receives first terminal and is directed to industry to be handled The information to be verified that business is sent obtains the corresponding identity characteristic information of the information to be verified.If the identity characteristic information packet Include the first identity characteristic information of corresponding first user of the first terminal and described to the corresponding second user of transacting business Second Identity of Local information, then the server obtains the target association between first user and the second user Value, if the target association value is greater than first threshold, the server is handled described to transacting business.In this way, the first user Usable first terminal handles the business of second user at a distance, improves the convenience of business handling operation.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Wherein:
Fig. 1 is a kind of flow diagram of business handling method provided by the embodiments of the present application;
Fig. 2 is a kind of structural schematic diagram of business handling system provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another business handling method provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram of business handling system provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of business handling device provided by the embodiments of the present application;
Fig. 6 is the structural schematic diagram of another business handling device provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram of first terminal provided by the embodiments of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only Some embodiments of the present application, instead of all the embodiments.According to the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
It describes in detail below to the embodiment of the present application.
Electronic equipment involved by the embodiment of the present application may include the various handheld devices with wireless communication function, Wearable device calculates equipment or is connected to other processing equipments of radio modem and various forms of users set Standby (user equipment, UE), mobile station (mobile station, MS), terminal device (terminal device) etc. Deng.For convenience of description, apparatus mentioned above is referred to as electronic equipment.
In this application, server is used to provide the business service of electronic equipment, such as: if server is carrier service Then communication service can be performed by the server in device;If server is the server of bank, pass through the executable silver of the server Industry business;If server is the server of local cable TV network, cable television service can be performed by the server;If Server is the telephone expenses server authorized in third-party application, then can pay and inquire telephone expenses by the third application server Deng.
Fig. 1 is please referred to, the embodiment of the present application provides a kind of flow diagram of business handling method.This method is applied to such as Server shown in Fig. 2, the server can be wireless multiple electronic equipments, such as: first terminal, second terminal, third Terminal, the 4th terminal and N terminal.Wherein, N is positive integer, and each electronic equipment can be according to corresponding account and login password Log in the server.
Wherein, login password can be the password of letter, number and symbol composition, be also possible to biological characteristic, such as: The corresponding vocal print feature of voice data, image or the corresponding brain wave feature of the corresponding facial characteristics of video, eeg signal refer to Corresponding fingerprint characteristic of print image etc., it is not limited here.
Specifically, as shown in Figure 1, a kind of business handling method, is applied to server, in which:
S101: server receives first terminal and is directed to the information to be verified sent to transacting business.
In this application, information to be verified includes image information, audio-frequency information, video information, brain wave information, fingerprint letter Breath etc. can be used for the information of authentication, herein also without limitation.
It should be noted that information to be verified in addition to include for the information of authentication other than, may also include commission letter Breath, such as: proof of identification and second user including the first user and second user in image information entrust the first user to do The certificate of entrustment of reason business improves the flexible of business handling in this way, second user can help the first user to handle related service Property.
In this application, first terminal refers to acquisition and sends the electronic equipment of information to be verified.First terminal can be To the corresponding electronic equipment used by a user of transacting business;It is also possible to electronic equipment used in other users, in this way, It, can be by other people mobile phone transacting business when the user mobile phone is lost;It can also be the corresponding electronic equipment of server, that is, seek Self-service machine etc. in the industry Room, it is not limited here.
The application can pass through the camera collection image information or video information of first terminal;Pass through the Mike of first terminal Elegance collection audio-frequency information;Brain wave information is acquired by the brain wave sensor of first terminal;It is passed by the fingerprint of first terminal Sensor acquires finger print information etc., it is not limited here.
Above-mentioned brain wave sensor can be built in first terminal, can also be worn on the user's head of transacting business, The brain wave data for being connected via wire or wirelessly mode to connect with first terminal, and the brain wave sensor being acquired is sent First terminal, it is not limited here.
The application for first terminal how to send for transacting business scene without limitation, can by this first Web browser, instant message applications or client in terminal etc. submit service request to server, such as: user can be The webpage of respective operator business handling is found in web browser, and submits service request in the web page;It can also be in sight When communication software (such as wechat) in find the public platform or small routine of respective operator, and submitted in the public platform or small routine Service request;Special client of operator end can also be logged in, and submits service request in the client of operator end.
In a kind of possible embodiment, it is to be verified for sending to transacting business that the server receives first terminal Information, comprising: the server receives the first terminal for the service request sent to transacting business;The service Device obtains described to the corresponding targeted security value of transacting business;The server obtains the targeted security and is worth corresponding verifying class Type;The server sends the corresponding prompt information of the Authentication-Type to the first terminal;Described in the server receives First terminal is directed to the information to be verified of prompt information input.
Wherein, service request be used to indicate server handle first terminal submission to transacting business;Targeted security value is used In describing the security level to transacting business, targeted security value is bigger, then higher to the corresponding security requirement of transacting business, from And safer verification method is needed to be verified.
In this application, the corresponding Authentication-Type of different target safety value, target peace as shown in table 1 below can be stored in advance Relation table between total head and Authentication-Type, wherein targeted security value be (0,5], corresponding Authentication-Type be vocal print feature;Mesh Mark safety value be (5,10], corresponding Authentication-Type be fingerprint characteristic;Targeted security value be (10,20], corresponding Authentication-Type For facial characteristics and living body characteristics;Targeted security value be (20,30], corresponding Authentication-Type be expressive features+living body characteristics.It can To understand, targeted security value is bigger, and corresponding Authentication-Type type is more, and required safety is higher.
Table 1
Targeted security value Authentication-Type
(0,5] Vocal print feature
(5,10] Fingerprint characteristic
(10,20] Facial characteristics+living body characteristics
(20,30] Expressive features+living body characteristics
For example, on the display page of first terminal, user is clicked to the corresponding component of transacting business, then pop-up to The prompt information of verification information.In this way, user inputs information to be verified according to the prompt information, then first terminal can be to server Information to be verified is sent for transacting business.
It is appreciated that first terminal is sent to server to the corresponding service request of transacting business, then server obtain to The corresponding targeted security value of transacting business, server obtain the corresponding Authentication-Type of targeted security value again, then server root Prompt information is sent to first terminal according to the Authentication-Type, in this way, the corresponding user of first terminal can be defeated according to the prompt information Enter corresponding information to be verified, then server carries out authentication to the information to be verified, so as to improve the accurate of authentication Property.
The application for obtain targeted security value method without limitation, in a kind of possible embodiment, the service Device obtains described to the corresponding targeted security value of transacting business, comprising: the server obtains the first terminal corresponding the One region and described to the corresponding second area of transacting business;The server is according to the first area and the second area Obtain the first safety value;The server obtains described to the corresponding type of service of transacting business;The server is according to Type of service obtains the second safety value;The server obtains the mesh according to first safety value and second safety value Mark safety value.
Wherein: the first area of first terminal refers to the current location of first terminal, can pass through the positioning in first terminal Module is determined, such as: global positioning system (Global Positioning System, GPS) chip, network positions clothes Be engaged in (Network Location Provider, NLP) etc., wherein network includes mobile data network, Wireless Fidelity (Wireless-Fidelity, Wi-Fi) network or bluetooth (Bluetooth) network etc., i.e., when electronic equipment accesses above-mentioned network When at least one network, media access control (Media the Access Control or Medium of corresponding base station can be obtained Access Control, MAC) address information and network signal intensity, the mac address information of Wi-Fi and bluetooth MAC Address letter Breath, and latitude and longitude information corresponding with above-mentioned mac address information or address information are calculated under connected state;Base can also be passed through Stand setting multiple receiver receiving devices send signal time calculate equipment at a distance from base station, received according to receiver Direction of the equipment relative to base station is obtained to the direction of signal, so that the latitude and longitude information or address information of equipment are obtained, and The method is not limited by connected state, as long as having used client identification module (Subscriber Identity in equipment Module, SIM card) or similar card, it can be obtained.
To the corresponding second area of transacting business refer to the current of terminal bound in the corresponding user of transacting business Position.In this application, will be to the corresponding user of transacting business as second user, terminal bound in the second user is the Two terminals, wherein binding mode can be bound by the corresponding application of various identification informations, such as: telephone number, E-mail address, Third-party application etc..
The application for determining the method for second terminal without limitation, can according to the corresponding identification information of transacting business, The physical label that second terminal is obtained further according to identification information, so that it is determined that second terminal, that is to say, that looked into according to identification information Physical label is looked for, second terminal is determined further according to physical label with uniqueness, the accuracy of determining second terminal can be improved.
The application obtains the method for the first safety value without limitation for first area and second area, can be according to the firstth area The distance between domain and second area are obtained;It can also be obtained according to the abnormal conditions of first area, that is, obtain second The corresponding normal region range of terminal, if the normal region range is deviateed farther out in first area, it is determined that the first safety value is larger Deng.
Type of service refers to the form of service to transacting business, such as: inquiring, pay, modifying, submitting new business etc., it can To understand, paying business not will cause the leakage of privacy, and inquiry business may cause the leakage of privacy, and modification business and submission are new Business can all change information, then the security level for paying business is less than the security level of inquiry business, the safety level of inquiry business Not little Yu modification business and submit new business security level.
In this application, corresponding second safety value of different service types can be stored in advance, such as: the second of inquiry business Safety value is 5, and the second safety value for paying business is 9, and the second safety value for modifying business is 15, and the second of new business is submitted to pacify Total head is 16 etc..
The application obtains the method for targeted security value also without limitation for the first safety value and the second safety value, can be preparatory The first safety value and the corresponding weight of the second safety value is respectively set, is then weighted to obtain targeted security value.
It is appreciated that server first obtain the corresponding first area of first terminal with to corresponding secondth area of transacting business Domain, server obtain the first safety value further according to first area and second area.Then server is according to corresponding to transacting business Type of service obtain the second safety value, last server obtains targeted security value according to the first safety value and the second safety value. In this way, considering the safety value to transacting business itself respectively and submitting the safety value of the first terminal of business, acquisition can be improved The accuracy of targeted security value.
The application for obtain second area method without limitation, in a kind of possible embodiment, the server It obtains described to the corresponding second area of transacting business, comprising: the server obtains described to the corresponding mark of transacting business Information;The server obtains the corresponding the last usage record of the identification information;The server is according to described nearest First use records corresponding address and obtains the second area.
Wherein, identification information can be with the account information of business-binding to be handled, such as: if to transacting business be communication Business, then the account information is telephone number;If being banking to transacting business, which is bank's card number;If to Transacting business is combustion gas expense, then the account information is combustion gas account etc..Identification information is also possible to account information and answers with third party With the information of binding, such as: telephone number etc., it is not limited here.
Usage record can be the consumer record of the identification information, such as: supplement the record etc. of telephone expenses with money;Usage record can also To be the communications records of telephone number bound in the identification information, such as: phone, short message etc.;Usage record can also be company Enter the record of wireless network or log in the record of third-party application using other electronic equipments, it is not limited here.Nearest one Secondary usage record can be above-mentioned a kind of usage record the last record, be also possible in above-mentioned a variety of usage records most Nearly primary usage record.
It is appreciated that server is first obtained to the corresponding identification information of transacting business, server obtains the identification information again Corresponding the last time usage record obtains second area according to the corresponding address of the last time usage record.In this way, foundation The last time obtains second area using the address of the identification information, and the accuracy for obtaining second area can be improved.
S102: the server obtains the corresponding identity characteristic information of the information to be verified.
In this application, identity characteristic information is used to verify the corresponding identity of information to be verified, such as: obtain image information Or the corresponding face characteristic of video information, eyeprint feature or iris feature, the also corresponding vocal print feature of available audio-frequency information, The brain wave feature of brain wave information, the fingerprint characteristic of finger print information or palm print characteristics of palmprint image etc. can also be obtained, into One step, expressive features can be obtained according to face characteristic, according to audio-frequency information acquisition text information to obtain semantic feature etc., This is without limitation.
In a kind of possible embodiment, the server obtains the corresponding identity characteristic information of the information to be verified, It include: described in the server obtains to the corresponding targeted security value of transacting business;The server obtains the targeted security It is worth corresponding Authentication-Type;The server carries out feature extraction to the information to be verified according to the Authentication-Type, with To the identity characteristic information.
Wherein, the method and Authentication-Type that obtain targeted security value can refer to the description of step S101, no longer superfluous herein It states.
It is appreciated that server is first obtained to the corresponding targeted security value of transacting business, server obtains target peace again The corresponding Authentication-Type of total head, then server treats verification information according to the Authentication-Type and carries out feature extraction to obtain identity Characteristic information.In this way, the accuracy for obtaining identity characteristic information can be improved, convenient for improving verification efficiency.
The application for how carrying out feature extraction without limitation, such as: pass through positioning feature point image information or video Facial image in information;The corresponding verification information of audio-frequency information is obtained by speech recognition technology, passes through sound groove recognition technology in e Obtain the corresponding vocal print feature of audio-frequency information;It is matched etc. by eeg signal or the corresponding image of finger print information, herein Without limitation.
In a kind of possible embodiment, if the Authentication-Type is vocal print feature, the server is tested according to It demonstrate,proves type and feature extraction is carried out to the information to be verified, to obtain the identity characteristic information, comprising: the server is to institute It states information to be verified and carries out vocal print feature extraction, to obtain vocal print feature information;The server to the information to be verified into Row semantics recognition, to obtain text information;If the text information includes default identification information corresponding with first user The second identifier information of matched first identifier information and default identification information match corresponding with the second user, and it is described Vocal print feature information default vocal print feature information matches success corresponding with first user, it is determined that the identity characteristic letter Breath includes first identity characteristic information and the Second Identity of Local information.
Wherein, the vocal print feature information corresponding user identity of information to be verified for identification.
Text information be the corresponding semantic content of information to be verified, can be used speech recognition technology by the information to be verified into Row semantics recognition obtains.
In this application, it is corresponding that each user in multiple users such as the first user and second user can be stored in advance in server Default identification information, the application first identifier information and second identifier information without limitation, can be ID card No., phone Number, password etc. have the information of unique identification.
It should be noted that text information can be entrusted information, and such as: text information is " trustee Zhang San, identity Card number is 156254199103153514;Trustee Li Si, identity card number is 462158198412156541;Hereby entrust by The Li Si that asks someone handles to transacting business.", Zhang San (i.e. second user) commission Li Si so can be obtained (i.e. according to text information First user) entrusted information to transacting business is handled, Zhang San's (i.e. second user) and Li Si (i.e. the first user) can also be obtained Identification information.
If being appreciated that, Authentication-Type is vocal print feature, and server first treats verification information and carries out vocal print feature extraction To obtain vocal print feature information, treats verification information and carry out semantics recognition to obtain text information.Server is again to text information In identification information matched, if the first identifier information for including in text information default mark corresponding with the first user Information matches, and second identifier information default identification information match corresponding with second user, then server judges vocal print feature Whether information matches with the default vocal print special-effect information of the first user, if so, determining that the identity characteristic information includes described First identity characteristic information and the Second Identity of Local information.That is, the information to be verified by sound type carries out Identity characteristic information is extracted, to determine corresponding first identity characteristic information of first terminal and corresponding second identity of second terminal Characteristic information improves the convenience and accuracy for extracting identity characteristic.The embodiment is applied to the first user and uses on behalf of second Family handle this it is pending ought to application scenarios.
It should be noted that if identity characteristic information only includes Second Identity of Local information, illustrate that the application scenarios are the Two users are handled using first terminal to transacting business, and first terminal can be the first user, are also possible to second user.
S103: if the identity characteristic information includes the first identity characteristic letter of corresponding first user of the first terminal Breath and the Second Identity of Local information to the corresponding second user of transacting business, then the server obtains first use Target association value between family and the second user.
In this application, target association value is used to despise the correlation degree between the first user and second user, the application For obtaining the method for target association value without limitation.In a kind of possible embodiment, the server obtains described first Target association value between user and the second user, comprising: the server obtains first user and described second Incidence relation between user;The server obtains between the first terminal and the corresponding second terminal of the second user Connection frequency;Server target association value according to the incidence relation and the connection frequency acquisition.
Wherein, incidence relation can be the relationship between the first user and second user, such as: spouse, children, friend Deng;Connection frequency is used to describe the frequency that is communicated between first terminal and second terminal, the communication mode may include phone, Short message, video etc., it is not limited here.
The application for how according to incidence relation and connection frequency acquisition target association value method without limitation, can be pre- First setting incidence relation weight corresponding with connection frequency and incidence relation relating value corresponding with connection frequency, then carry out Weighted sum is to obtain target association value.For example, incidence relation weight corresponding with connection frequency is 0.6,0.4, When incidence relation is spouse, corresponding first relating value of incidence relation is 0.5, when contacting frequency is 0.4, contacts frequency pair The second relating value answered is 0.4, then target association value is 0.6*5+0.4*0.4=0.46.
It is appreciated that server first obtains the incidence relation between the first user and second user, then obtain first terminal Connection frequency between second terminal, then according to incidence relation and connection frequency acquisition target association value.So, it is contemplated that The relating value and the corresponding relating value of two terminals of first user and second user itself can be improved and obtain target association value Accuracy.
S104: if the target association value is greater than first threshold, the server is handled described to transacting business.
The application for first threshold without limitation, if target association value is greater than first threshold and can illustrate the first user and the Target association value between two users is larger, then the first user can handle second user to transacting business a possibility that it is larger, Otherwise it is smaller.
In a kind of possible embodiment, the method also includes: if the target association value is less than or equal to described the One threshold value, then the server handles confirmation message according to first identity characteristic information and the service generation to be handled; The confirmation message of handling is sent to the corresponding second terminal of the second user by the server;If the server receives To the second terminal for the confirmation instruction for handling confirmation message transmission, then handle described to transacting business.
Wherein, it handles confirmation message and is used to indicate whether the corresponding second user of second terminal handles the industry to be handled Business, confirmation instruction be used to indicate server second user determine handle it is described to transacting business.
If the target association value being appreciated that between first terminal and second terminal is less than or equal to first threshold, take Business device handles confirmation message according to the first identity characteristic information and service generation to be handled, and sends this to second terminal and handle really Recognize information.If server receives the confirmation instruction that second terminal handles confirmation message transmission for this, this is handled wait handle Business.In this way, the verifying by second terminal carries out business handling, the flexibility and safety of business handling can further improve Property.
In business handling method as shown in Figure 1, server receive first terminal be directed to transacting business send to Verification information obtains the corresponding identity characteristic information of the information to be verified.If the identity characteristic information includes described first The first identity characteristic information of corresponding first user of terminal and second identity to the corresponding second user of transacting business Characteristic information, then the server obtains the target association value between first user and the second user, if the mesh It marks relating value and is greater than first threshold, then the server is handled described to transacting business.In this way, the first user can be used for the first end The business of second user is handled at end at a distance, improves the convenience of business handling operation.
Consistent with the embodiment of Fig. 1, referring to figure 3., Fig. 3 is another business handling method provided by the embodiments of the present application Flow diagram, this method be applied to first terminal, specifically, as shown in figure 3, a kind of business handling method, comprising:
S301: first terminal is obtained for the information to be verified inputted to transacting business.
Wherein, the information to be verified is included at least with the next item down: image information, audio-frequency information, video information, brain wave Information, finger print information.
S302: the first terminal sends the information to be verified to server.
S303: if the server obtains the information to be verified, corresponding identity characteristic information includes the first terminal The first identity characteristic information of corresponding first user and the Second Identity of Local to the corresponding second user of transacting business Information, and the target association value between first user and the second user is greater than first threshold, the then first terminal It is handled based on the server described to transacting business.
In business handling method as shown in Figure 3, first terminal is obtained for the corresponding letter to be verified of transacting business Breath, the first terminal send the information to be verified to server, if the server obtains the information to be verified and corresponds to Identity characteristic information include corresponding first user of the first terminal the first identity characteristic information and the industry to be handled The Second Identity of Local information for corresponding second user of being engaged in, and the target association between first user and the second user Value is greater than first threshold, then the first terminal is handled described to transacting business based on the server.In this way, the first user can The business for handling second user at a distance using first terminal improves the convenience of business handling operation.
In a kind of possible embodiment, the first terminal, which obtains, to be directed to the corresponding information to be verified of transacting business, It include: that the first terminal sends service request to the server to transacting business for described in;The first terminal receives The server is worth the prompt information that corresponding Authentication-Type is sent according to targeted security;The first terminal is to the server Send the information to be verified for prompt information input.
It is appreciated that first terminal is sent to server to the corresponding service request of transacting business, then server obtain to The corresponding targeted security value of transacting business, server obtain the corresponding Authentication-Type of targeted security value again, then server root Prompt information is sent to first terminal according to the Authentication-Type, in this way, the corresponding user of first terminal can be defeated according to the prompt information Enter corresponding information to be verified, then server carries out authentication to the information to be verified, so as to improve the accurate of authentication Property.
Consistent with the embodiment of Fig. 1, referring to figure 4., Fig. 4 is a kind of business handling system of the application, specifically, system is held Capable timing diagram is as shown in Figure 4, comprising:
S401: first terminal is obtained for the information to be verified inputted to transacting business.
S402: the first terminal sends the information to be verified to server.
S403: the server obtains the corresponding identity characteristic information of the information to be verified.
S404: if the identity characteristic information includes the first identity characteristic letter of corresponding first user of the first terminal Breath and the Second Identity of Local information to the corresponding second user of transacting business, then the server obtains first use Target association value between family and the second user.
S405: if the target association value is greater than first threshold, the first terminal is based on the server and handles institute It states to transacting business.
In business handling system as shown in Figure 4, first terminal is obtained for the corresponding letter to be verified of transacting business Breath, the first terminal send the information to be verified to server, and it is corresponding that the server obtains the information to be verified Identity characteristic information.If the identity characteristic information includes the first identity characteristic letter of corresponding first user of the first terminal Breath and the Second Identity of Local information to the corresponding second user of transacting business, then the server obtains first use Target association value between family and the second user, if the target association value is greater than first threshold, the first terminal It is handled based on the server described to transacting business.In this way, first terminal can be used to handle the second use at a distance for the first user The business at family improves the convenience of business handling operation.
Consistent with the embodiment of Fig. 1, referring to figure 5., Fig. 5 is that a kind of structure for business handling device that the application proposes is shown It is intended to, described device is applied to server.As shown in figure 5, above-mentioned business handling device 500 includes:
Communication unit 501 is directed to the information to be verified sent to transacting business for receiving first terminal, described to be verified Information is included at least with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Acquiring unit 502, for obtaining the corresponding identity characteristic information of the information to be verified;If the identity characteristic letter Breath includes the first identity characteristic information of corresponding first user of the first terminal and described to transacting business corresponding second The Second Identity of Local information of user then obtains the target association value between first user and the second user;
Unit 503 is handled, if being greater than first threshold for the target association value, is handled described to transacting business.
It is appreciated that server, which receives first terminal, is directed to the information to be verified that sends to transacting business, obtain described in The corresponding identity characteristic information of verification information.If the identity characteristic information includes corresponding first user of the first terminal First identity characteristic information and the Second Identity of Local information to the corresponding second user of transacting business, the then server The target association value between first user and the second user is obtained, if the target association value is greater than first threshold, Then the server is handled described to transacting business.In this way, first terminal can be used to handle second user at a distance for the first user Business, improve business handling operation convenience.
In a possible example, it is described obtain the corresponding identity characteristic information of the information to be verified in terms of, institute Acquiring unit 502 is stated to be specifically used for described in acquisition to the corresponding targeted security value of transacting business;Obtain the targeted security value pair The Authentication-Type answered;Feature extraction is carried out to the information to be verified according to the Authentication-Type, to obtain the identity characteristic Information.
In a possible example, if the Authentication-Type is vocal print feature, described according to the Authentication-Type Feature extraction is carried out to the information to be verified, in terms of obtaining the identity characteristic information, the acquiring unit 502 is specifically used In carrying out vocal print feature extraction to the information to be verified, to obtain vocal print feature information;Language is carried out to the information to be verified Justice identification, to obtain text information;If the text information includes default identification information match corresponding with first user First identifier information and default identification information match corresponding with the second user second identifier information, and the vocal print Characteristic information default vocal print feature information matches success corresponding with first user, it is determined that the identity characteristic information packet Include first identity characteristic information and the Second Identity of Local information.
In a possible example, described in the acquisition to the corresponding targeted security value of transacting business in terms of, it is described Acquiring unit 502 is specifically used for obtaining the corresponding first area of the first terminal and described to corresponding secondth area of transacting business Domain;The first safety value is obtained according to the first area and the second area;It obtains described to the corresponding business of transacting business Type;The second safety value is obtained according to the type of service;Institute is obtained according to first safety value and second safety value State targeted security value.
In a possible example, described in the acquisition to the corresponding second area of transacting business in terms of, it is described to obtain Unit 502 is taken to be specifically used for acquisition described to the corresponding identification information of transacting business;It is corresponding recently to obtain the identification information First use record;According to the last usage record corresponding address acquisition second area.
Target association in a possible example, between the acquisition first user and the second user Value aspect, the acquiring unit 502 are specifically used for obtaining the incidence relation between first user and the second user;It obtains Take the connection frequency between the first terminal and the corresponding second terminal of the second user;According to the incidence relation and institute State target association value described in connection frequency acquisition.
In a possible example, if the communication unit 501 is also used to the target association value less than or equal to institute First threshold is stated, then confirmation message is handled according to first identity characteristic information and the service generation to be handled;It will be described It handles confirmation message and is sent to the corresponding second terminal of the second user;It receives the second terminal and handles confirmation for described The confirmation instruction that information is sent;If it is described handle unit 502 and be also used to the communication unit 501 receive confirmation instruction, It then handles described to transacting business.
It is consistent with the embodiment of Fig. 1, Fig. 6 is please referred to, Fig. 6 is the structure for another business handling device that the application proposes Schematic diagram, described device are applied to first terminal.As shown in fig. 6, above-mentioned business handling device 600 includes:
Acquiring unit 601, for obtaining the information to be verified for being directed to and inputting to transacting business, the information to be verified is at least Including with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Communication unit 602, for sending the information to be verified to server;
Unit 603 is handled, includes if obtaining the corresponding identity characteristic information of the information to be verified for the server The first identity characteristic information of corresponding first user of the first terminal and described to the corresponding second user of transacting business Second Identity of Local information, and the target association value between first user and the second user is greater than first threshold, then It is handled based on the server described to transacting business.
It is appreciated that first terminal is obtained for the corresponding information to be verified of transacting business, the first terminal is to clothes Business device sends the information to be verified, if the server determines the Information Authentication success to be verified, and first user Target association value between the second user is greater than first threshold, then the first terminal is based on the server and handles institute It states to transacting business.In this way, the usable first terminal of the first user handles the business of second user at a distance, the business of improving is done Manage the convenience of operation.
In a kind of possible embodiment, obtain described for the corresponding message context to be verified of transacting business, institute Communication unit 602 is stated to be specifically used for sending service request to the server to transacting business for described;Receive the service Device is worth the prompt information that corresponding Authentication-Type is sent according to targeted security;It is sent to the server and is directed to the prompt information The information to be verified of input.
It is consistent with the embodiment of Fig. 1, Fig. 7 is please referred to, Fig. 7 is that a kind of structure of server provided by the embodiments of the present application is shown It is intended to.As shown in fig. 7, the server 700 includes processor 710, memory 720, communication interface 730 and one or more journeys Sequence 740, wherein said one or multiple programs 740 are stored in above-mentioned memory 720, and are configured by above-mentioned processing Device 710 executes, and above procedure 740 includes the instruction for executing following steps:
It receives first terminal and is directed to the information to be verified sent to transacting business, the information to be verified includes at least following One: image information, audio-frequency information, video information, brain wave information, finger print information;
Obtain the corresponding identity characteristic information of the information to be verified;
If the identity characteristic information include corresponding first user of the first terminal the first identity characteristic information and The Second Identity of Local information to the corresponding second user of transacting business then obtains first user and described second and uses Target association value between family;
If the target association value is greater than first threshold, handle described to transacting business.
It is appreciated that server, which receives first terminal, is directed to the information to be verified that sends to transacting business, obtain described in The corresponding identity characteristic information of verification information.If the identity characteristic information includes corresponding first user of the first terminal First identity characteristic information and the Second Identity of Local information to the corresponding second user of transacting business, the then server The target association value between first user and the second user is obtained, if the target association value is greater than first threshold, Then the server is handled described to transacting business.In this way, first terminal can be used to handle second user at a distance for the first user Business, improve business handling operation convenience.
In a possible example, it is described obtain the corresponding identity characteristic information of the information to be verified in terms of, institute Program 740 is stated to be specifically used for executing the instruction of following steps:
It obtains described to the corresponding targeted security value of transacting business;
Obtain the corresponding Authentication-Type of the targeted security value;
Feature extraction is carried out to the information to be verified according to the Authentication-Type, to obtain the identity characteristic information.
In a possible example, if the Authentication-Type is vocal print feature, described according to the Authentication-Type Feature extraction is carried out to the information to be verified, in terms of obtaining the identity characteristic information, described program 740 is specifically used for holding The instruction of row following steps:
Vocal print feature extraction is carried out to the information to be verified, to obtain vocal print feature information;
Semantics recognition is carried out to the information to be verified, to obtain text information;
If the text information includes the first identifier information of default identification information match corresponding with first user The second identifier information of default identification information match corresponding with the second user, and the vocal print feature information with it is described The corresponding default vocal print feature information matches success of first user, it is determined that the identity characteristic information includes first identity Characteristic information and the Second Identity of Local information.
In a possible example, described in the acquisition to the corresponding targeted security value of transacting business in terms of, it is described Program 740 is specifically used for executing the instruction of following steps:
Obtain the corresponding first area of the first terminal and described to the corresponding second area of transacting business;
The first safety value is obtained according to the first area and the second area;
It obtains described to the corresponding type of service of transacting business;
The second safety value is obtained according to the type of service;
The targeted security value is obtained according to first safety value and second safety value.
In a possible example, described in the acquisition to the corresponding second area of transacting business in terms of, the journey Sequence 740 is specifically used for executing the instruction of following steps:
It obtains described to the corresponding identification information of transacting business;
Obtain the corresponding the last usage record of the identification information;
According to the last usage record corresponding address acquisition second area.
Target association in a possible example, between the acquisition first user and the second user Value aspect, described program 740 are specifically used for executing the instruction of following steps:
Obtain the incidence relation between first user and the second user;
Obtain the connection frequency between the first terminal and the corresponding second terminal of the second user;
According to target association value described in the incidence relation and the connection frequency acquisition.
In a possible example, described program 740 is also used to execute the instruction of following steps:
If the target association value is less than or equal to the first threshold, according to first identity characteristic information and institute It states service generation to be handled and handles confirmation message;
The confirmation message of handling is sent to the corresponding second terminal of the second user;
If receiving the second terminal for the confirmation instruction for handling confirmation message transmission, handle described pending Reason business.
It is consistent with the embodiment of Fig. 1, Fig. 8 is please referred to, Fig. 8 is a kind of structure of first terminal provided by the embodiments of the present application Schematic diagram.As shown in figure 8, the first terminal 800 includes processor 810, memory 820, communication interface 830 and one or more A program 840, wherein said one or multiple programs 840 are stored in above-mentioned memory 820, and are configured by above-mentioned Processor 810 executes, and above procedure 840 includes the instruction for executing following steps:
It obtains for the information to be verified inputted to transacting business, the information to be verified is included at least with the next item down: figure As information, audio-frequency information, video information, brain wave information, finger print information;
The information to be verified is sent to server;
If it includes that the first terminal is corresponding that the server, which obtains the corresponding identity characteristic information of the information to be verified, The first user the first identity characteristic information and the Second Identity of Local information to the corresponding second user of transacting business, And the target association value between first user and the second user is greater than first threshold, then is handled based on the server It is described to transacting business.
It is appreciated that first terminal is obtained for the corresponding information to be verified of transacting business, the first terminal is to clothes Business device sends the information to be verified, if the server determines the Information Authentication success to be verified, and first user Target association value between the second user is greater than first threshold, then the first terminal is based on the server and handles institute It states to transacting business.In this way, the usable first terminal of the first user handles the business of second user at a distance, the business of improving is done Manage the convenience of operation.
In a kind of possible embodiment, obtain described for the corresponding message context to be verified of transacting business, institute Program 840 is stated to be specifically used for executing the instruction of following steps:
Service request is sent to the server to transacting business for described;
It receives the server and the prompt information that corresponding Authentication-Type is sent is worth according to targeted security;
The information to be verified inputted for the prompt information is sent to the server.
The embodiment of the present application also provides a kind of computer storage medium, wherein the computer storage medium is stored for depositing Computer program is stored up, which makes computer execute either record part of method or complete in such as embodiment of the method Portion's step, computer include server or first terminal.
The embodiment of the present application also provides a kind of computer program product, and computer program product includes storing computer journey The non-transient computer readable storage medium of sequence, computer program are operable to execute computer as remembered in embodiment of the method Some or all of either load method step.The computer program product can be a software installation packet, and computer includes Server or first terminal.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, related movement and mode not necessarily the application It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of unit, only a kind of logic Function division, there may be another division manner in actual implementation, such as multiple unit or assemblies can combine or can collect At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling It closes or direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit can be with It is electrical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also be realized in the form of software program mode.
If integrated unit is realized and when sold or used as an independent product in the form of software program mode, can To be stored in a computer-readable access to memory.According to such understanding, the technical solution of the application is substantially in other words The all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products Come, which is stored in a memory, including some instructions are used so that a computer equipment (can be Personal computer, server or network equipment etc.) execute each embodiment method of the application all or part of the steps.And it is preceding The memory stated includes: USB flash disk, read-only memory (read-only memory, ROM), random access memory (random Access memory, RAM), mobile hard disk, the various media that can store program code such as magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory It may include: flash disk, ROM, RAM, disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and Embodiment is expounded, the description of the example is only used to help understand the method for the present application and its core ideas; At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the application There is change place, to sum up, the contents of this specification should not be construed as limiting the present application.

Claims (10)

1. a kind of business handling method, which is characterized in that be applied to server, which comprises
The server receives first terminal and is directed to the information to be verified sent to transacting business, and the information to be verified is at least wrapped It includes with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
The server obtains the corresponding identity characteristic information of the information to be verified;
If the identity characteristic information includes the first identity characteristic information of corresponding first user of the first terminal and described To the Second Identity of Local information of the corresponding second user of transacting business, then the server obtain first user with it is described Target association value between second user;
If the target association value is greater than first threshold, the server is handled described to transacting business.
2. the method according to claim 1, wherein the server obtains the corresponding body of the information to be verified Part characteristic information, comprising:
The server obtains described to the corresponding targeted security value of transacting business;
The server obtains the targeted security and is worth corresponding Authentication-Type;
The server carries out feature extraction to the information to be verified according to the Authentication-Type, to obtain the identity characteristic Information.
3. according to the method described in claim 2, it is characterized in that, if the Authentication-Type is vocal print feature, the service Device carries out feature extraction to the information to be verified according to the Authentication-Type, to obtain the identity characteristic information, comprising:
The server carries out vocal print feature extraction to the information to be verified, to obtain vocal print feature information;
The server carries out semantics recognition to the information to be verified, to obtain text information;
If the text information include default identification information match corresponding with first user first identifier information and with The second identifier information of the corresponding default identification information match of the second user, and the vocal print feature information and described first The corresponding default vocal print feature information matches success of user, it is determined that the identity characteristic information includes first identity characteristic Information and the Second Identity of Local information.
4. according to the method described in claim 2, it is characterized in that, server acquisition is described to the corresponding mesh of transacting business Mark safety value, comprising:
The server obtains the corresponding first area of the first terminal and described to the corresponding second area of transacting business;
The server obtains the first safety value according to the first area and the second area;
The server obtains described to the corresponding type of service of transacting business;
The server obtains the second safety value according to the type of service;
The server obtains the targeted security value according to first safety value and second safety value.
5. according to the method described in claim 4, it is characterized in that, the server obtain it is described to transacting business corresponding the Two regions, comprising:
The server obtains described to the corresponding identification information of transacting business;
The server obtains the corresponding the last usage record of the identification information;
The server is according to the last usage record corresponding address acquisition second area.
6. method according to claim 1-5, which is characterized in that the server obtain first user with Target association value between the second user, comprising:
The server obtains the incidence relation between first user and the second user;
The server obtains the connection frequency between the first terminal and the corresponding second terminal of the second user;
Server target association value according to the incidence relation and the connection frequency acquisition.
7. method according to claim 1-5, which is characterized in that the method also includes:
If the target association value is less than or equal to the first threshold, the server is believed according to first identity characteristic Breath and the service generation to be handled handle confirmation message;
The confirmation message of handling is sent to the corresponding second terminal of the second user by the server;
If the server receives the second terminal for the confirmation instruction for handling confirmation message transmission, institute is handled It states to transacting business.
8. a kind of business handling device, which is characterized in that be applied to server, described device includes:
Communication unit is directed to the information to be verified sent to transacting business for receiving first terminal, and the information to be verified is extremely It less include with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Acquiring unit, for obtaining the corresponding identity characteristic information of the information to be verified;If the identity characteristic information includes The first identity characteristic information of corresponding first user of the first terminal and described to the corresponding second user of transacting business Second Identity of Local information then obtains the target association value between first user and the second user;
Unit is handled, if being greater than first threshold for the target association value, is handled described to transacting business.
9. a kind of server, which is characterized in that including processor, memory, communication interface and one or multiple programs, In, one or multiple programs are stored in the memory, and are configured to be executed by the processor, described program Include the steps that requiring the instruction in any one of 1-7 method for perform claim.
10. a kind of computer readable storage medium, which is characterized in that it is used to store computer program, wherein the computer Program makes computer execute the method according to claim 1 to 7.
CN201910426567.8A 2019-05-21 2019-05-21 Business handling method and related product Active CN110225002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910426567.8A CN110225002B (en) 2019-05-21 2019-05-21 Business handling method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910426567.8A CN110225002B (en) 2019-05-21 2019-05-21 Business handling method and related product

Publications (2)

Publication Number Publication Date
CN110225002A true CN110225002A (en) 2019-09-10
CN110225002B CN110225002B (en) 2023-03-24

Family

ID=67821721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910426567.8A Active CN110225002B (en) 2019-05-21 2019-05-21 Business handling method and related product

Country Status (1)

Country Link
CN (1) CN110225002B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929237A (en) * 2019-11-22 2020-03-27 支付宝(杭州)信息技术有限公司 Identity verification system, method and device and information verification system
CN111209546A (en) * 2020-01-03 2020-05-29 数字广东网络建设有限公司 Online multi-person identity authentication method, system and device and identity authentication equipment
CN111586019A (en) * 2020-04-30 2020-08-25 中国银行股份有限公司 Identity authentication method and device and service equipment
CN111583931A (en) * 2020-04-30 2020-08-25 中国银行股份有限公司 Service data processing method and device
CN113068155A (en) * 2021-03-25 2021-07-02 中国联合网络通信集团有限公司 Service provisioning method and server
CN113486311A (en) * 2021-07-22 2021-10-08 中国联合网络通信集团有限公司 Access authorization method and device
CN113838238A (en) * 2021-09-26 2021-12-24 北京紫光展锐通信技术有限公司 Service processing method, device and equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140172895A1 (en) * 2012-12-18 2014-06-19 Michael Hartel Modeled Associations for Business Object Data Structures
CN105577385A (en) * 2015-12-21 2016-05-11 东莞酷派软件技术有限公司 Method and device of obtaining signature authority
CN106778354A (en) * 2017-01-17 2017-05-31 泰康保险集团股份有限公司 The method and device of rights management
US9928272B1 (en) * 2013-11-26 2018-03-27 Sugarcrm Inc. Determining contact-related information
CN108206803A (en) * 2016-12-16 2018-06-26 腾讯科技(深圳)有限公司 Business acts on behalf processing method and processing device
CN108416334A (en) * 2018-04-13 2018-08-17 小草数语(北京)科技有限公司 Proof of identity method, apparatus and equipment
CN109308416A (en) * 2017-07-26 2019-02-05 财付通支付科技有限公司 Business service data processing method, device, system, storage medium and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140172895A1 (en) * 2012-12-18 2014-06-19 Michael Hartel Modeled Associations for Business Object Data Structures
US9928272B1 (en) * 2013-11-26 2018-03-27 Sugarcrm Inc. Determining contact-related information
CN105577385A (en) * 2015-12-21 2016-05-11 东莞酷派软件技术有限公司 Method and device of obtaining signature authority
CN108206803A (en) * 2016-12-16 2018-06-26 腾讯科技(深圳)有限公司 Business acts on behalf processing method and processing device
CN106778354A (en) * 2017-01-17 2017-05-31 泰康保险集团股份有限公司 The method and device of rights management
CN109308416A (en) * 2017-07-26 2019-02-05 财付通支付科技有限公司 Business service data processing method, device, system, storage medium and equipment
CN108416334A (en) * 2018-04-13 2018-08-17 小草数语(北京)科技有限公司 Proof of identity method, apparatus and equipment

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929237A (en) * 2019-11-22 2020-03-27 支付宝(杭州)信息技术有限公司 Identity verification system, method and device and information verification system
CN111209546A (en) * 2020-01-03 2020-05-29 数字广东网络建设有限公司 Online multi-person identity authentication method, system and device and identity authentication equipment
CN111586019A (en) * 2020-04-30 2020-08-25 中国银行股份有限公司 Identity authentication method and device and service equipment
CN111583931A (en) * 2020-04-30 2020-08-25 中国银行股份有限公司 Service data processing method and device
CN113068155A (en) * 2021-03-25 2021-07-02 中国联合网络通信集团有限公司 Service provisioning method and server
CN113486311A (en) * 2021-07-22 2021-10-08 中国联合网络通信集团有限公司 Access authorization method and device
CN113486311B (en) * 2021-07-22 2023-06-02 中国联合网络通信集团有限公司 Access authorization method and device
CN113838238A (en) * 2021-09-26 2021-12-24 北京紫光展锐通信技术有限公司 Service processing method, device and equipment

Also Published As

Publication number Publication date
CN110225002B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN110225002A (en) Business handling method and Related product
US20210166241A1 (en) Methods, apparatuses, storage mediums and terminal devices for authentication
KR101415887B1 (en) Method for providing services of user identification processing
CN106910057B (en) Mobile terminal and security authentication method and device on mobile terminal side
US20150121496A1 (en) Remote authentication using mobile single sign on credentials
CN103679452A (en) Payment authentication method, device thereof and system thereof
JP2013097650A (en) Authentication system, authentication method and authentication server
US9918223B2 (en) Fingerprint based communication terminal and method, server and method thereof
CN107231232A (en) A kind of auth method and device
CN110225035A (en) The binding of third party's account and login method, server, terminal and device
CN105681258A (en) Session method and session device based on third-party server
CN104348875A (en) Method, cloud server and system for performing pocket transmission of data
CN108235823A (en) Agency is without roaming cellular
CN108966230A (en) Share the method and apparatus of wireless access point
JP2017102842A (en) Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program
CN107241362A (en) Recognize the method and apparatus that identifying code inputs user identity
CN109040050A (en) Data interactive method and Related product
CN113076533B (en) Service processing method and device
KR101441372B1 (en) Method for conducting a public opinion poll using mobile phone
KR20170051916A (en) Mobile simple payment support device based on the connection information and operating method thereof
CN106302558B (en) Service processing method and device
CN109164986A (en) Cloud disk data processing method, device, electronic equipment and storage medium
JP2012050034A (en) Information server device and information service method
KR101484187B1 (en) Method and System for non-repudiation using voice recognition on telephone authentication
CN103595848A (en) Method and device for identifying information of communication contact persons

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant