CN110225002A - Business handling method and Related product - Google Patents
Business handling method and Related product Download PDFInfo
- Publication number
- CN110225002A CN110225002A CN201910426567.8A CN201910426567A CN110225002A CN 110225002 A CN110225002 A CN 110225002A CN 201910426567 A CN201910426567 A CN 201910426567A CN 110225002 A CN110225002 A CN 110225002A
- Authority
- CN
- China
- Prior art keywords
- information
- server
- user
- terminal
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Abstract
The embodiment of the present application discloses a kind of business handling method and Related product, and wherein method is applied to server, this method comprises: the server, which receives first terminal, is directed to the information to be verified sent to transacting business;The server obtains the corresponding identity characteristic information of the information to be verified;If the identity characteristic information includes that the first identity characteristic information of corresponding first user of the first terminal and the Second Identity of Local information to the corresponding second user of transacting business, the server obtain the target association value between first user and the second user;If the target association value is greater than first threshold, the server is handled described to transacting business.Using the application, the convenience of business handling operation can be improved.
Description
Technical field
This application involves field of computer technology, a kind of business handling method and Related product have been related generally to.
Background technique
It is handled currently, user in transacting business, generally requires carrying proof of identification to business hall, such as: communication operation
Quotient requires real-name authentication, then major operator business hall needs to verify the identity information of the user of transacting business.If user goes
Proof of identification is forgotten to carry when business hall, the business of will lead to can not be handled normally.
Summary of the invention
The embodiment of the present application provides a kind of business handling method and Related product, and the convenience of business handling operation can be improved
Property.
In a first aspect, the embodiment of the present application provides a kind of business handling method, it is applied to server, in which:
The server receives first terminal and is directed to the information to be verified sent to transacting business, and the information to be verified is extremely
It less include with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
The server obtains the corresponding identity characteristic information of the information to be verified;
If the identity characteristic information include corresponding first user of the first terminal the first identity characteristic information and
The Second Identity of Local information to the corresponding second user of transacting business, then the server obtain first user with
Target association value between the second user;
If the target association value is greater than first threshold, the server is handled described to transacting business.
Second aspect, the embodiment of the present application provide a kind of business handling device, are applied to server, in which:
Communication unit is directed to the information to be verified sent to transacting business, the letter to be verified for receiving first terminal
Breath is included at least with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Acquiring unit, for obtaining the corresponding identity characteristic information of the information to be verified;If the identity characteristic information
It the first identity characteristic information including corresponding first user of the first terminal and described is used to transacting business corresponding second
The Second Identity of Local information at family then obtains the target association value between first user and the second user;
Unit is handled, if being greater than first threshold for the target association value, is handled described to transacting business.
The third aspect, the embodiment of the present application provide a kind of server, including processor, memory, communication interface and one
A or multiple programs, wherein said one or multiple programs are stored in above-mentioned memory, and are configured by above-mentioned processing
Device executes, and described program includes the instruction for the step some or all of as described in first aspect.
Fourth aspect, the embodiment of the present application provide another business handling method, are applied to first terminal, in which:
The first terminal is obtained for the information to be verified inputted to transacting business, and the information to be verified includes at least
With the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
The first terminal sends the information to be verified to server;
If it includes that the first terminal is corresponding that the server, which obtains the corresponding identity characteristic information of the information to be verified,
The first user the first identity characteristic information and the Second Identity of Local information to the corresponding second user of transacting business,
And the target association value between first user and the second user is greater than first threshold, then the first terminal is based on institute
State server handle it is described to transacting business.
5th aspect, the embodiment of the present application provide another business handling device, are applied to first terminal, in which:
Acquiring unit, for obtaining for the corresponding information to be verified of transacting business, the information to be verified is at least wrapped
It includes with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Communication unit, for sending the information to be verified to server;
Unit is handled, if it includes described for obtaining the corresponding identity characteristic information of the information to be verified for the server
The first identity characteristic information of corresponding first user of first terminal and second to the corresponding second user of transacting business
Identity characteristic information, and the target association value between first user and the second user is greater than first threshold, then is based on
The server is handled described to transacting business.
6th aspect, the embodiment of the present application provide a kind of computer readable storage medium, wherein described computer-readable
Storage medium stores computer program, wherein the computer program makes computer execute such as the embodiment of the present application first party
Step some or all of described in face and fourth aspect.
7th aspect, the embodiment of the present application provide a kind of computer program product, wherein the computer program product
Non-transient computer readable storage medium including storing computer program, the computer program are operable to make to calculate
Machine executes the step some or all of as described in the embodiment of the present application first aspect and fourth aspect.The computer program produces
Product can be a software installation packet.
Implement the embodiment of the present application, will have the following beneficial effects:
After above-mentioned business handling method and Related product, server receives first terminal and is directed to industry to be handled
The information to be verified that business is sent obtains the corresponding identity characteristic information of the information to be verified.If the identity characteristic information packet
Include the first identity characteristic information of corresponding first user of the first terminal and described to the corresponding second user of transacting business
Second Identity of Local information, then the server obtains the target association between first user and the second user
Value, if the target association value is greater than first threshold, the server is handled described to transacting business.In this way, the first user
Usable first terminal handles the business of second user at a distance, improves the convenience of business handling operation.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Wherein:
Fig. 1 is a kind of flow diagram of business handling method provided by the embodiments of the present application;
Fig. 2 is a kind of structural schematic diagram of business handling system provided by the embodiments of the present application;
Fig. 3 is the flow diagram of another business handling method provided by the embodiments of the present application;
Fig. 4 is a kind of flow diagram of business handling system provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of business handling device provided by the embodiments of the present application;
Fig. 6 is the structural schematic diagram of another business handling device provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 8 is a kind of structural schematic diagram of first terminal provided by the embodiments of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
Some embodiments of the present application, instead of all the embodiments.According to the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
It describes in detail below to the embodiment of the present application.
Electronic equipment involved by the embodiment of the present application may include the various handheld devices with wireless communication function,
Wearable device calculates equipment or is connected to other processing equipments of radio modem and various forms of users set
Standby (user equipment, UE), mobile station (mobile station, MS), terminal device (terminal device) etc.
Deng.For convenience of description, apparatus mentioned above is referred to as electronic equipment.
In this application, server is used to provide the business service of electronic equipment, such as: if server is carrier service
Then communication service can be performed by the server in device;If server is the server of bank, pass through the executable silver of the server
Industry business;If server is the server of local cable TV network, cable television service can be performed by the server;If
Server is the telephone expenses server authorized in third-party application, then can pay and inquire telephone expenses by the third application server
Deng.
Fig. 1 is please referred to, the embodiment of the present application provides a kind of flow diagram of business handling method.This method is applied to such as
Server shown in Fig. 2, the server can be wireless multiple electronic equipments, such as: first terminal, second terminal, third
Terminal, the 4th terminal and N terminal.Wherein, N is positive integer, and each electronic equipment can be according to corresponding account and login password
Log in the server.
Wherein, login password can be the password of letter, number and symbol composition, be also possible to biological characteristic, such as:
The corresponding vocal print feature of voice data, image or the corresponding brain wave feature of the corresponding facial characteristics of video, eeg signal refer to
Corresponding fingerprint characteristic of print image etc., it is not limited here.
Specifically, as shown in Figure 1, a kind of business handling method, is applied to server, in which:
S101: server receives first terminal and is directed to the information to be verified sent to transacting business.
In this application, information to be verified includes image information, audio-frequency information, video information, brain wave information, fingerprint letter
Breath etc. can be used for the information of authentication, herein also without limitation.
It should be noted that information to be verified in addition to include for the information of authentication other than, may also include commission letter
Breath, such as: proof of identification and second user including the first user and second user in image information entrust the first user to do
The certificate of entrustment of reason business improves the flexible of business handling in this way, second user can help the first user to handle related service
Property.
In this application, first terminal refers to acquisition and sends the electronic equipment of information to be verified.First terminal can be
To the corresponding electronic equipment used by a user of transacting business;It is also possible to electronic equipment used in other users, in this way,
It, can be by other people mobile phone transacting business when the user mobile phone is lost;It can also be the corresponding electronic equipment of server, that is, seek
Self-service machine etc. in the industry Room, it is not limited here.
The application can pass through the camera collection image information or video information of first terminal;Pass through the Mike of first terminal
Elegance collection audio-frequency information;Brain wave information is acquired by the brain wave sensor of first terminal;It is passed by the fingerprint of first terminal
Sensor acquires finger print information etc., it is not limited here.
Above-mentioned brain wave sensor can be built in first terminal, can also be worn on the user's head of transacting business,
The brain wave data for being connected via wire or wirelessly mode to connect with first terminal, and the brain wave sensor being acquired is sent
First terminal, it is not limited here.
The application for first terminal how to send for transacting business scene without limitation, can by this first
Web browser, instant message applications or client in terminal etc. submit service request to server, such as: user can be
The webpage of respective operator business handling is found in web browser, and submits service request in the web page;It can also be in sight
When communication software (such as wechat) in find the public platform or small routine of respective operator, and submitted in the public platform or small routine
Service request;Special client of operator end can also be logged in, and submits service request in the client of operator end.
In a kind of possible embodiment, it is to be verified for sending to transacting business that the server receives first terminal
Information, comprising: the server receives the first terminal for the service request sent to transacting business;The service
Device obtains described to the corresponding targeted security value of transacting business;The server obtains the targeted security and is worth corresponding verifying class
Type;The server sends the corresponding prompt information of the Authentication-Type to the first terminal;Described in the server receives
First terminal is directed to the information to be verified of prompt information input.
Wherein, service request be used to indicate server handle first terminal submission to transacting business;Targeted security value is used
In describing the security level to transacting business, targeted security value is bigger, then higher to the corresponding security requirement of transacting business, from
And safer verification method is needed to be verified.
In this application, the corresponding Authentication-Type of different target safety value, target peace as shown in table 1 below can be stored in advance
Relation table between total head and Authentication-Type, wherein targeted security value be (0,5], corresponding Authentication-Type be vocal print feature;Mesh
Mark safety value be (5,10], corresponding Authentication-Type be fingerprint characteristic;Targeted security value be (10,20], corresponding Authentication-Type
For facial characteristics and living body characteristics;Targeted security value be (20,30], corresponding Authentication-Type be expressive features+living body characteristics.It can
To understand, targeted security value is bigger, and corresponding Authentication-Type type is more, and required safety is higher.
Table 1
Targeted security value | Authentication-Type |
(0,5] | Vocal print feature |
(5,10] | Fingerprint characteristic |
(10,20] | Facial characteristics+living body characteristics |
(20,30] | Expressive features+living body characteristics |
… | … |
For example, on the display page of first terminal, user is clicked to the corresponding component of transacting business, then pop-up to
The prompt information of verification information.In this way, user inputs information to be verified according to the prompt information, then first terminal can be to server
Information to be verified is sent for transacting business.
It is appreciated that first terminal is sent to server to the corresponding service request of transacting business, then server obtain to
The corresponding targeted security value of transacting business, server obtain the corresponding Authentication-Type of targeted security value again, then server root
Prompt information is sent to first terminal according to the Authentication-Type, in this way, the corresponding user of first terminal can be defeated according to the prompt information
Enter corresponding information to be verified, then server carries out authentication to the information to be verified, so as to improve the accurate of authentication
Property.
The application for obtain targeted security value method without limitation, in a kind of possible embodiment, the service
Device obtains described to the corresponding targeted security value of transacting business, comprising: the server obtains the first terminal corresponding the
One region and described to the corresponding second area of transacting business;The server is according to the first area and the second area
Obtain the first safety value;The server obtains described to the corresponding type of service of transacting business;The server is according to
Type of service obtains the second safety value;The server obtains the mesh according to first safety value and second safety value
Mark safety value.
Wherein: the first area of first terminal refers to the current location of first terminal, can pass through the positioning in first terminal
Module is determined, such as: global positioning system (Global Positioning System, GPS) chip, network positions clothes
Be engaged in (Network Location Provider, NLP) etc., wherein network includes mobile data network, Wireless Fidelity
(Wireless-Fidelity, Wi-Fi) network or bluetooth (Bluetooth) network etc., i.e., when electronic equipment accesses above-mentioned network
When at least one network, media access control (Media the Access Control or Medium of corresponding base station can be obtained
Access Control, MAC) address information and network signal intensity, the mac address information of Wi-Fi and bluetooth MAC Address letter
Breath, and latitude and longitude information corresponding with above-mentioned mac address information or address information are calculated under connected state;Base can also be passed through
Stand setting multiple receiver receiving devices send signal time calculate equipment at a distance from base station, received according to receiver
Direction of the equipment relative to base station is obtained to the direction of signal, so that the latitude and longitude information or address information of equipment are obtained, and
The method is not limited by connected state, as long as having used client identification module (Subscriber Identity in equipment
Module, SIM card) or similar card, it can be obtained.
To the corresponding second area of transacting business refer to the current of terminal bound in the corresponding user of transacting business
Position.In this application, will be to the corresponding user of transacting business as second user, terminal bound in the second user is the
Two terminals, wherein binding mode can be bound by the corresponding application of various identification informations, such as: telephone number, E-mail address,
Third-party application etc..
The application for determining the method for second terminal without limitation, can according to the corresponding identification information of transacting business,
The physical label that second terminal is obtained further according to identification information, so that it is determined that second terminal, that is to say, that looked into according to identification information
Physical label is looked for, second terminal is determined further according to physical label with uniqueness, the accuracy of determining second terminal can be improved.
The application obtains the method for the first safety value without limitation for first area and second area, can be according to the firstth area
The distance between domain and second area are obtained;It can also be obtained according to the abnormal conditions of first area, that is, obtain second
The corresponding normal region range of terminal, if the normal region range is deviateed farther out in first area, it is determined that the first safety value is larger
Deng.
Type of service refers to the form of service to transacting business, such as: inquiring, pay, modifying, submitting new business etc., it can
To understand, paying business not will cause the leakage of privacy, and inquiry business may cause the leakage of privacy, and modification business and submission are new
Business can all change information, then the security level for paying business is less than the security level of inquiry business, the safety level of inquiry business
Not little Yu modification business and submit new business security level.
In this application, corresponding second safety value of different service types can be stored in advance, such as: the second of inquiry business
Safety value is 5, and the second safety value for paying business is 9, and the second safety value for modifying business is 15, and the second of new business is submitted to pacify
Total head is 16 etc..
The application obtains the method for targeted security value also without limitation for the first safety value and the second safety value, can be preparatory
The first safety value and the corresponding weight of the second safety value is respectively set, is then weighted to obtain targeted security value.
It is appreciated that server first obtain the corresponding first area of first terminal with to corresponding secondth area of transacting business
Domain, server obtain the first safety value further according to first area and second area.Then server is according to corresponding to transacting business
Type of service obtain the second safety value, last server obtains targeted security value according to the first safety value and the second safety value.
In this way, considering the safety value to transacting business itself respectively and submitting the safety value of the first terminal of business, acquisition can be improved
The accuracy of targeted security value.
The application for obtain second area method without limitation, in a kind of possible embodiment, the server
It obtains described to the corresponding second area of transacting business, comprising: the server obtains described to the corresponding mark of transacting business
Information;The server obtains the corresponding the last usage record of the identification information;The server is according to described nearest
First use records corresponding address and obtains the second area.
Wherein, identification information can be with the account information of business-binding to be handled, such as: if to transacting business be communication
Business, then the account information is telephone number;If being banking to transacting business, which is bank's card number;If to
Transacting business is combustion gas expense, then the account information is combustion gas account etc..Identification information is also possible to account information and answers with third party
With the information of binding, such as: telephone number etc., it is not limited here.
Usage record can be the consumer record of the identification information, such as: supplement the record etc. of telephone expenses with money;Usage record can also
To be the communications records of telephone number bound in the identification information, such as: phone, short message etc.;Usage record can also be company
Enter the record of wireless network or log in the record of third-party application using other electronic equipments, it is not limited here.Nearest one
Secondary usage record can be above-mentioned a kind of usage record the last record, be also possible in above-mentioned a variety of usage records most
Nearly primary usage record.
It is appreciated that server is first obtained to the corresponding identification information of transacting business, server obtains the identification information again
Corresponding the last time usage record obtains second area according to the corresponding address of the last time usage record.In this way, foundation
The last time obtains second area using the address of the identification information, and the accuracy for obtaining second area can be improved.
S102: the server obtains the corresponding identity characteristic information of the information to be verified.
In this application, identity characteristic information is used to verify the corresponding identity of information to be verified, such as: obtain image information
Or the corresponding face characteristic of video information, eyeprint feature or iris feature, the also corresponding vocal print feature of available audio-frequency information,
The brain wave feature of brain wave information, the fingerprint characteristic of finger print information or palm print characteristics of palmprint image etc. can also be obtained, into
One step, expressive features can be obtained according to face characteristic, according to audio-frequency information acquisition text information to obtain semantic feature etc.,
This is without limitation.
In a kind of possible embodiment, the server obtains the corresponding identity characteristic information of the information to be verified,
It include: described in the server obtains to the corresponding targeted security value of transacting business;The server obtains the targeted security
It is worth corresponding Authentication-Type;The server carries out feature extraction to the information to be verified according to the Authentication-Type, with
To the identity characteristic information.
Wherein, the method and Authentication-Type that obtain targeted security value can refer to the description of step S101, no longer superfluous herein
It states.
It is appreciated that server is first obtained to the corresponding targeted security value of transacting business, server obtains target peace again
The corresponding Authentication-Type of total head, then server treats verification information according to the Authentication-Type and carries out feature extraction to obtain identity
Characteristic information.In this way, the accuracy for obtaining identity characteristic information can be improved, convenient for improving verification efficiency.
The application for how carrying out feature extraction without limitation, such as: pass through positioning feature point image information or video
Facial image in information;The corresponding verification information of audio-frequency information is obtained by speech recognition technology, passes through sound groove recognition technology in e
Obtain the corresponding vocal print feature of audio-frequency information;It is matched etc. by eeg signal or the corresponding image of finger print information, herein
Without limitation.
In a kind of possible embodiment, if the Authentication-Type is vocal print feature, the server is tested according to
It demonstrate,proves type and feature extraction is carried out to the information to be verified, to obtain the identity characteristic information, comprising: the server is to institute
It states information to be verified and carries out vocal print feature extraction, to obtain vocal print feature information;The server to the information to be verified into
Row semantics recognition, to obtain text information;If the text information includes default identification information corresponding with first user
The second identifier information of matched first identifier information and default identification information match corresponding with the second user, and it is described
Vocal print feature information default vocal print feature information matches success corresponding with first user, it is determined that the identity characteristic letter
Breath includes first identity characteristic information and the Second Identity of Local information.
Wherein, the vocal print feature information corresponding user identity of information to be verified for identification.
Text information be the corresponding semantic content of information to be verified, can be used speech recognition technology by the information to be verified into
Row semantics recognition obtains.
In this application, it is corresponding that each user in multiple users such as the first user and second user can be stored in advance in server
Default identification information, the application first identifier information and second identifier information without limitation, can be ID card No., phone
Number, password etc. have the information of unique identification.
It should be noted that text information can be entrusted information, and such as: text information is " trustee Zhang San, identity
Card number is 156254199103153514;Trustee Li Si, identity card number is 462158198412156541;Hereby entrust by
The Li Si that asks someone handles to transacting business.", Zhang San (i.e. second user) commission Li Si so can be obtained (i.e. according to text information
First user) entrusted information to transacting business is handled, Zhang San's (i.e. second user) and Li Si (i.e. the first user) can also be obtained
Identification information.
If being appreciated that, Authentication-Type is vocal print feature, and server first treats verification information and carries out vocal print feature extraction
To obtain vocal print feature information, treats verification information and carry out semantics recognition to obtain text information.Server is again to text information
In identification information matched, if the first identifier information for including in text information default mark corresponding with the first user
Information matches, and second identifier information default identification information match corresponding with second user, then server judges vocal print feature
Whether information matches with the default vocal print special-effect information of the first user, if so, determining that the identity characteristic information includes described
First identity characteristic information and the Second Identity of Local information.That is, the information to be verified by sound type carries out
Identity characteristic information is extracted, to determine corresponding first identity characteristic information of first terminal and corresponding second identity of second terminal
Characteristic information improves the convenience and accuracy for extracting identity characteristic.The embodiment is applied to the first user and uses on behalf of second
Family handle this it is pending ought to application scenarios.
It should be noted that if identity characteristic information only includes Second Identity of Local information, illustrate that the application scenarios are the
Two users are handled using first terminal to transacting business, and first terminal can be the first user, are also possible to second user.
S103: if the identity characteristic information includes the first identity characteristic letter of corresponding first user of the first terminal
Breath and the Second Identity of Local information to the corresponding second user of transacting business, then the server obtains first use
Target association value between family and the second user.
In this application, target association value is used to despise the correlation degree between the first user and second user, the application
For obtaining the method for target association value without limitation.In a kind of possible embodiment, the server obtains described first
Target association value between user and the second user, comprising: the server obtains first user and described second
Incidence relation between user;The server obtains between the first terminal and the corresponding second terminal of the second user
Connection frequency;Server target association value according to the incidence relation and the connection frequency acquisition.
Wherein, incidence relation can be the relationship between the first user and second user, such as: spouse, children, friend
Deng;Connection frequency is used to describe the frequency that is communicated between first terminal and second terminal, the communication mode may include phone,
Short message, video etc., it is not limited here.
The application for how according to incidence relation and connection frequency acquisition target association value method without limitation, can be pre-
First setting incidence relation weight corresponding with connection frequency and incidence relation relating value corresponding with connection frequency, then carry out
Weighted sum is to obtain target association value.For example, incidence relation weight corresponding with connection frequency is 0.6,0.4,
When incidence relation is spouse, corresponding first relating value of incidence relation is 0.5, when contacting frequency is 0.4, contacts frequency pair
The second relating value answered is 0.4, then target association value is 0.6*5+0.4*0.4=0.46.
It is appreciated that server first obtains the incidence relation between the first user and second user, then obtain first terminal
Connection frequency between second terminal, then according to incidence relation and connection frequency acquisition target association value.So, it is contemplated that
The relating value and the corresponding relating value of two terminals of first user and second user itself can be improved and obtain target association value
Accuracy.
S104: if the target association value is greater than first threshold, the server is handled described to transacting business.
The application for first threshold without limitation, if target association value is greater than first threshold and can illustrate the first user and the
Target association value between two users is larger, then the first user can handle second user to transacting business a possibility that it is larger,
Otherwise it is smaller.
In a kind of possible embodiment, the method also includes: if the target association value is less than or equal to described the
One threshold value, then the server handles confirmation message according to first identity characteristic information and the service generation to be handled;
The confirmation message of handling is sent to the corresponding second terminal of the second user by the server;If the server receives
To the second terminal for the confirmation instruction for handling confirmation message transmission, then handle described to transacting business.
Wherein, it handles confirmation message and is used to indicate whether the corresponding second user of second terminal handles the industry to be handled
Business, confirmation instruction be used to indicate server second user determine handle it is described to transacting business.
If the target association value being appreciated that between first terminal and second terminal is less than or equal to first threshold, take
Business device handles confirmation message according to the first identity characteristic information and service generation to be handled, and sends this to second terminal and handle really
Recognize information.If server receives the confirmation instruction that second terminal handles confirmation message transmission for this, this is handled wait handle
Business.In this way, the verifying by second terminal carries out business handling, the flexibility and safety of business handling can further improve
Property.
In business handling method as shown in Figure 1, server receive first terminal be directed to transacting business send to
Verification information obtains the corresponding identity characteristic information of the information to be verified.If the identity characteristic information includes described first
The first identity characteristic information of corresponding first user of terminal and second identity to the corresponding second user of transacting business
Characteristic information, then the server obtains the target association value between first user and the second user, if the mesh
It marks relating value and is greater than first threshold, then the server is handled described to transacting business.In this way, the first user can be used for the first end
The business of second user is handled at end at a distance, improves the convenience of business handling operation.
Consistent with the embodiment of Fig. 1, referring to figure 3., Fig. 3 is another business handling method provided by the embodiments of the present application
Flow diagram, this method be applied to first terminal, specifically, as shown in figure 3, a kind of business handling method, comprising:
S301: first terminal is obtained for the information to be verified inputted to transacting business.
Wherein, the information to be verified is included at least with the next item down: image information, audio-frequency information, video information, brain wave
Information, finger print information.
S302: the first terminal sends the information to be verified to server.
S303: if the server obtains the information to be verified, corresponding identity characteristic information includes the first terminal
The first identity characteristic information of corresponding first user and the Second Identity of Local to the corresponding second user of transacting business
Information, and the target association value between first user and the second user is greater than first threshold, the then first terminal
It is handled based on the server described to transacting business.
In business handling method as shown in Figure 3, first terminal is obtained for the corresponding letter to be verified of transacting business
Breath, the first terminal send the information to be verified to server, if the server obtains the information to be verified and corresponds to
Identity characteristic information include corresponding first user of the first terminal the first identity characteristic information and the industry to be handled
The Second Identity of Local information for corresponding second user of being engaged in, and the target association between first user and the second user
Value is greater than first threshold, then the first terminal is handled described to transacting business based on the server.In this way, the first user can
The business for handling second user at a distance using first terminal improves the convenience of business handling operation.
In a kind of possible embodiment, the first terminal, which obtains, to be directed to the corresponding information to be verified of transacting business,
It include: that the first terminal sends service request to the server to transacting business for described in;The first terminal receives
The server is worth the prompt information that corresponding Authentication-Type is sent according to targeted security;The first terminal is to the server
Send the information to be verified for prompt information input.
It is appreciated that first terminal is sent to server to the corresponding service request of transacting business, then server obtain to
The corresponding targeted security value of transacting business, server obtain the corresponding Authentication-Type of targeted security value again, then server root
Prompt information is sent to first terminal according to the Authentication-Type, in this way, the corresponding user of first terminal can be defeated according to the prompt information
Enter corresponding information to be verified, then server carries out authentication to the information to be verified, so as to improve the accurate of authentication
Property.
Consistent with the embodiment of Fig. 1, referring to figure 4., Fig. 4 is a kind of business handling system of the application, specifically, system is held
Capable timing diagram is as shown in Figure 4, comprising:
S401: first terminal is obtained for the information to be verified inputted to transacting business.
S402: the first terminal sends the information to be verified to server.
S403: the server obtains the corresponding identity characteristic information of the information to be verified.
S404: if the identity characteristic information includes the first identity characteristic letter of corresponding first user of the first terminal
Breath and the Second Identity of Local information to the corresponding second user of transacting business, then the server obtains first use
Target association value between family and the second user.
S405: if the target association value is greater than first threshold, the first terminal is based on the server and handles institute
It states to transacting business.
In business handling system as shown in Figure 4, first terminal is obtained for the corresponding letter to be verified of transacting business
Breath, the first terminal send the information to be verified to server, and it is corresponding that the server obtains the information to be verified
Identity characteristic information.If the identity characteristic information includes the first identity characteristic letter of corresponding first user of the first terminal
Breath and the Second Identity of Local information to the corresponding second user of transacting business, then the server obtains first use
Target association value between family and the second user, if the target association value is greater than first threshold, the first terminal
It is handled based on the server described to transacting business.In this way, first terminal can be used to handle the second use at a distance for the first user
The business at family improves the convenience of business handling operation.
Consistent with the embodiment of Fig. 1, referring to figure 5., Fig. 5 is that a kind of structure for business handling device that the application proposes is shown
It is intended to, described device is applied to server.As shown in figure 5, above-mentioned business handling device 500 includes:
Communication unit 501 is directed to the information to be verified sent to transacting business for receiving first terminal, described to be verified
Information is included at least with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Acquiring unit 502, for obtaining the corresponding identity characteristic information of the information to be verified;If the identity characteristic letter
Breath includes the first identity characteristic information of corresponding first user of the first terminal and described to transacting business corresponding second
The Second Identity of Local information of user then obtains the target association value between first user and the second user;
Unit 503 is handled, if being greater than first threshold for the target association value, is handled described to transacting business.
It is appreciated that server, which receives first terminal, is directed to the information to be verified that sends to transacting business, obtain described in
The corresponding identity characteristic information of verification information.If the identity characteristic information includes corresponding first user of the first terminal
First identity characteristic information and the Second Identity of Local information to the corresponding second user of transacting business, the then server
The target association value between first user and the second user is obtained, if the target association value is greater than first threshold,
Then the server is handled described to transacting business.In this way, first terminal can be used to handle second user at a distance for the first user
Business, improve business handling operation convenience.
In a possible example, it is described obtain the corresponding identity characteristic information of the information to be verified in terms of, institute
Acquiring unit 502 is stated to be specifically used for described in acquisition to the corresponding targeted security value of transacting business;Obtain the targeted security value pair
The Authentication-Type answered;Feature extraction is carried out to the information to be verified according to the Authentication-Type, to obtain the identity characteristic
Information.
In a possible example, if the Authentication-Type is vocal print feature, described according to the Authentication-Type
Feature extraction is carried out to the information to be verified, in terms of obtaining the identity characteristic information, the acquiring unit 502 is specifically used
In carrying out vocal print feature extraction to the information to be verified, to obtain vocal print feature information;Language is carried out to the information to be verified
Justice identification, to obtain text information;If the text information includes default identification information match corresponding with first user
First identifier information and default identification information match corresponding with the second user second identifier information, and the vocal print
Characteristic information default vocal print feature information matches success corresponding with first user, it is determined that the identity characteristic information packet
Include first identity characteristic information and the Second Identity of Local information.
In a possible example, described in the acquisition to the corresponding targeted security value of transacting business in terms of, it is described
Acquiring unit 502 is specifically used for obtaining the corresponding first area of the first terminal and described to corresponding secondth area of transacting business
Domain;The first safety value is obtained according to the first area and the second area;It obtains described to the corresponding business of transacting business
Type;The second safety value is obtained according to the type of service;Institute is obtained according to first safety value and second safety value
State targeted security value.
In a possible example, described in the acquisition to the corresponding second area of transacting business in terms of, it is described to obtain
Unit 502 is taken to be specifically used for acquisition described to the corresponding identification information of transacting business;It is corresponding recently to obtain the identification information
First use record;According to the last usage record corresponding address acquisition second area.
Target association in a possible example, between the acquisition first user and the second user
Value aspect, the acquiring unit 502 are specifically used for obtaining the incidence relation between first user and the second user;It obtains
Take the connection frequency between the first terminal and the corresponding second terminal of the second user;According to the incidence relation and institute
State target association value described in connection frequency acquisition.
In a possible example, if the communication unit 501 is also used to the target association value less than or equal to institute
First threshold is stated, then confirmation message is handled according to first identity characteristic information and the service generation to be handled;It will be described
It handles confirmation message and is sent to the corresponding second terminal of the second user;It receives the second terminal and handles confirmation for described
The confirmation instruction that information is sent;If it is described handle unit 502 and be also used to the communication unit 501 receive confirmation instruction,
It then handles described to transacting business.
It is consistent with the embodiment of Fig. 1, Fig. 6 is please referred to, Fig. 6 is the structure for another business handling device that the application proposes
Schematic diagram, described device are applied to first terminal.As shown in fig. 6, above-mentioned business handling device 600 includes:
Acquiring unit 601, for obtaining the information to be verified for being directed to and inputting to transacting business, the information to be verified is at least
Including with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Communication unit 602, for sending the information to be verified to server;
Unit 603 is handled, includes if obtaining the corresponding identity characteristic information of the information to be verified for the server
The first identity characteristic information of corresponding first user of the first terminal and described to the corresponding second user of transacting business
Second Identity of Local information, and the target association value between first user and the second user is greater than first threshold, then
It is handled based on the server described to transacting business.
It is appreciated that first terminal is obtained for the corresponding information to be verified of transacting business, the first terminal is to clothes
Business device sends the information to be verified, if the server determines the Information Authentication success to be verified, and first user
Target association value between the second user is greater than first threshold, then the first terminal is based on the server and handles institute
It states to transacting business.In this way, the usable first terminal of the first user handles the business of second user at a distance, the business of improving is done
Manage the convenience of operation.
In a kind of possible embodiment, obtain described for the corresponding message context to be verified of transacting business, institute
Communication unit 602 is stated to be specifically used for sending service request to the server to transacting business for described;Receive the service
Device is worth the prompt information that corresponding Authentication-Type is sent according to targeted security;It is sent to the server and is directed to the prompt information
The information to be verified of input.
It is consistent with the embodiment of Fig. 1, Fig. 7 is please referred to, Fig. 7 is that a kind of structure of server provided by the embodiments of the present application is shown
It is intended to.As shown in fig. 7, the server 700 includes processor 710, memory 720, communication interface 730 and one or more journeys
Sequence 740, wherein said one or multiple programs 740 are stored in above-mentioned memory 720, and are configured by above-mentioned processing
Device 710 executes, and above procedure 740 includes the instruction for executing following steps:
It receives first terminal and is directed to the information to be verified sent to transacting business, the information to be verified includes at least following
One: image information, audio-frequency information, video information, brain wave information, finger print information;
Obtain the corresponding identity characteristic information of the information to be verified;
If the identity characteristic information include corresponding first user of the first terminal the first identity characteristic information and
The Second Identity of Local information to the corresponding second user of transacting business then obtains first user and described second and uses
Target association value between family;
If the target association value is greater than first threshold, handle described to transacting business.
It is appreciated that server, which receives first terminal, is directed to the information to be verified that sends to transacting business, obtain described in
The corresponding identity characteristic information of verification information.If the identity characteristic information includes corresponding first user of the first terminal
First identity characteristic information and the Second Identity of Local information to the corresponding second user of transacting business, the then server
The target association value between first user and the second user is obtained, if the target association value is greater than first threshold,
Then the server is handled described to transacting business.In this way, first terminal can be used to handle second user at a distance for the first user
Business, improve business handling operation convenience.
In a possible example, it is described obtain the corresponding identity characteristic information of the information to be verified in terms of, institute
Program 740 is stated to be specifically used for executing the instruction of following steps:
It obtains described to the corresponding targeted security value of transacting business;
Obtain the corresponding Authentication-Type of the targeted security value;
Feature extraction is carried out to the information to be verified according to the Authentication-Type, to obtain the identity characteristic information.
In a possible example, if the Authentication-Type is vocal print feature, described according to the Authentication-Type
Feature extraction is carried out to the information to be verified, in terms of obtaining the identity characteristic information, described program 740 is specifically used for holding
The instruction of row following steps:
Vocal print feature extraction is carried out to the information to be verified, to obtain vocal print feature information;
Semantics recognition is carried out to the information to be verified, to obtain text information;
If the text information includes the first identifier information of default identification information match corresponding with first user
The second identifier information of default identification information match corresponding with the second user, and the vocal print feature information with it is described
The corresponding default vocal print feature information matches success of first user, it is determined that the identity characteristic information includes first identity
Characteristic information and the Second Identity of Local information.
In a possible example, described in the acquisition to the corresponding targeted security value of transacting business in terms of, it is described
Program 740 is specifically used for executing the instruction of following steps:
Obtain the corresponding first area of the first terminal and described to the corresponding second area of transacting business;
The first safety value is obtained according to the first area and the second area;
It obtains described to the corresponding type of service of transacting business;
The second safety value is obtained according to the type of service;
The targeted security value is obtained according to first safety value and second safety value.
In a possible example, described in the acquisition to the corresponding second area of transacting business in terms of, the journey
Sequence 740 is specifically used for executing the instruction of following steps:
It obtains described to the corresponding identification information of transacting business;
Obtain the corresponding the last usage record of the identification information;
According to the last usage record corresponding address acquisition second area.
Target association in a possible example, between the acquisition first user and the second user
Value aspect, described program 740 are specifically used for executing the instruction of following steps:
Obtain the incidence relation between first user and the second user;
Obtain the connection frequency between the first terminal and the corresponding second terminal of the second user;
According to target association value described in the incidence relation and the connection frequency acquisition.
In a possible example, described program 740 is also used to execute the instruction of following steps:
If the target association value is less than or equal to the first threshold, according to first identity characteristic information and institute
It states service generation to be handled and handles confirmation message;
The confirmation message of handling is sent to the corresponding second terminal of the second user;
If receiving the second terminal for the confirmation instruction for handling confirmation message transmission, handle described pending
Reason business.
It is consistent with the embodiment of Fig. 1, Fig. 8 is please referred to, Fig. 8 is a kind of structure of first terminal provided by the embodiments of the present application
Schematic diagram.As shown in figure 8, the first terminal 800 includes processor 810, memory 820, communication interface 830 and one or more
A program 840, wherein said one or multiple programs 840 are stored in above-mentioned memory 820, and are configured by above-mentioned
Processor 810 executes, and above procedure 840 includes the instruction for executing following steps:
It obtains for the information to be verified inputted to transacting business, the information to be verified is included at least with the next item down: figure
As information, audio-frequency information, video information, brain wave information, finger print information;
The information to be verified is sent to server;
If it includes that the first terminal is corresponding that the server, which obtains the corresponding identity characteristic information of the information to be verified,
The first user the first identity characteristic information and the Second Identity of Local information to the corresponding second user of transacting business,
And the target association value between first user and the second user is greater than first threshold, then is handled based on the server
It is described to transacting business.
It is appreciated that first terminal is obtained for the corresponding information to be verified of transacting business, the first terminal is to clothes
Business device sends the information to be verified, if the server determines the Information Authentication success to be verified, and first user
Target association value between the second user is greater than first threshold, then the first terminal is based on the server and handles institute
It states to transacting business.In this way, the usable first terminal of the first user handles the business of second user at a distance, the business of improving is done
Manage the convenience of operation.
In a kind of possible embodiment, obtain described for the corresponding message context to be verified of transacting business, institute
Program 840 is stated to be specifically used for executing the instruction of following steps:
Service request is sent to the server to transacting business for described;
It receives the server and the prompt information that corresponding Authentication-Type is sent is worth according to targeted security;
The information to be verified inputted for the prompt information is sent to the server.
The embodiment of the present application also provides a kind of computer storage medium, wherein the computer storage medium is stored for depositing
Computer program is stored up, which makes computer execute either record part of method or complete in such as embodiment of the method
Portion's step, computer include server or first terminal.
The embodiment of the present application also provides a kind of computer program product, and computer program product includes storing computer journey
The non-transient computer readable storage medium of sequence, computer program are operable to execute computer as remembered in embodiment of the method
Some or all of either load method step.The computer program product can be a software installation packet, and computer includes
Server or first terminal.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because
According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, related movement and mode not necessarily the application
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of unit, only a kind of logic
Function division, there may be another division manner in actual implementation, such as multiple unit or assemblies can combine or can collect
At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling
It closes or direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit can be with
It is electrical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit
Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple networks
On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also be realized in the form of software program mode.
If integrated unit is realized and when sold or used as an independent product in the form of software program mode, can
To be stored in a computer-readable access to memory.According to such understanding, the technical solution of the application is substantially in other words
The all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products
Come, which is stored in a memory, including some instructions are used so that a computer equipment (can be
Personal computer, server or network equipment etc.) execute each embodiment method of the application all or part of the steps.And it is preceding
The memory stated includes: USB flash disk, read-only memory (read-only memory, ROM), random access memory (random
Access memory, RAM), mobile hard disk, the various media that can store program code such as magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory
It may include: flash disk, ROM, RAM, disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and
Embodiment is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;
At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the application
There is change place, to sum up, the contents of this specification should not be construed as limiting the present application.
Claims (10)
1. a kind of business handling method, which is characterized in that be applied to server, which comprises
The server receives first terminal and is directed to the information to be verified sent to transacting business, and the information to be verified is at least wrapped
It includes with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
The server obtains the corresponding identity characteristic information of the information to be verified;
If the identity characteristic information includes the first identity characteristic information of corresponding first user of the first terminal and described
To the Second Identity of Local information of the corresponding second user of transacting business, then the server obtain first user with it is described
Target association value between second user;
If the target association value is greater than first threshold, the server is handled described to transacting business.
2. the method according to claim 1, wherein the server obtains the corresponding body of the information to be verified
Part characteristic information, comprising:
The server obtains described to the corresponding targeted security value of transacting business;
The server obtains the targeted security and is worth corresponding Authentication-Type;
The server carries out feature extraction to the information to be verified according to the Authentication-Type, to obtain the identity characteristic
Information.
3. according to the method described in claim 2, it is characterized in that, if the Authentication-Type is vocal print feature, the service
Device carries out feature extraction to the information to be verified according to the Authentication-Type, to obtain the identity characteristic information, comprising:
The server carries out vocal print feature extraction to the information to be verified, to obtain vocal print feature information;
The server carries out semantics recognition to the information to be verified, to obtain text information;
If the text information include default identification information match corresponding with first user first identifier information and with
The second identifier information of the corresponding default identification information match of the second user, and the vocal print feature information and described first
The corresponding default vocal print feature information matches success of user, it is determined that the identity characteristic information includes first identity characteristic
Information and the Second Identity of Local information.
4. according to the method described in claim 2, it is characterized in that, server acquisition is described to the corresponding mesh of transacting business
Mark safety value, comprising:
The server obtains the corresponding first area of the first terminal and described to the corresponding second area of transacting business;
The server obtains the first safety value according to the first area and the second area;
The server obtains described to the corresponding type of service of transacting business;
The server obtains the second safety value according to the type of service;
The server obtains the targeted security value according to first safety value and second safety value.
5. according to the method described in claim 4, it is characterized in that, the server obtain it is described to transacting business corresponding the
Two regions, comprising:
The server obtains described to the corresponding identification information of transacting business;
The server obtains the corresponding the last usage record of the identification information;
The server is according to the last usage record corresponding address acquisition second area.
6. method according to claim 1-5, which is characterized in that the server obtain first user with
Target association value between the second user, comprising:
The server obtains the incidence relation between first user and the second user;
The server obtains the connection frequency between the first terminal and the corresponding second terminal of the second user;
Server target association value according to the incidence relation and the connection frequency acquisition.
7. method according to claim 1-5, which is characterized in that the method also includes:
If the target association value is less than or equal to the first threshold, the server is believed according to first identity characteristic
Breath and the service generation to be handled handle confirmation message;
The confirmation message of handling is sent to the corresponding second terminal of the second user by the server;
If the server receives the second terminal for the confirmation instruction for handling confirmation message transmission, institute is handled
It states to transacting business.
8. a kind of business handling device, which is characterized in that be applied to server, described device includes:
Communication unit is directed to the information to be verified sent to transacting business for receiving first terminal, and the information to be verified is extremely
It less include with the next item down: image information, audio-frequency information, video information, brain wave information, finger print information;
Acquiring unit, for obtaining the corresponding identity characteristic information of the information to be verified;If the identity characteristic information includes
The first identity characteristic information of corresponding first user of the first terminal and described to the corresponding second user of transacting business
Second Identity of Local information then obtains the target association value between first user and the second user;
Unit is handled, if being greater than first threshold for the target association value, is handled described to transacting business.
9. a kind of server, which is characterized in that including processor, memory, communication interface and one or multiple programs,
In, one or multiple programs are stored in the memory, and are configured to be executed by the processor, described program
Include the steps that requiring the instruction in any one of 1-7 method for perform claim.
10. a kind of computer readable storage medium, which is characterized in that it is used to store computer program, wherein the computer
Program makes computer execute the method according to claim 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910426567.8A CN110225002B (en) | 2019-05-21 | 2019-05-21 | Business handling method and related product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910426567.8A CN110225002B (en) | 2019-05-21 | 2019-05-21 | Business handling method and related product |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110225002A true CN110225002A (en) | 2019-09-10 |
CN110225002B CN110225002B (en) | 2023-03-24 |
Family
ID=67821721
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910426567.8A Active CN110225002B (en) | 2019-05-21 | 2019-05-21 | Business handling method and related product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225002B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110929237A (en) * | 2019-11-22 | 2020-03-27 | 支付宝(杭州)信息技术有限公司 | Identity verification system, method and device and information verification system |
CN111209546A (en) * | 2020-01-03 | 2020-05-29 | 数字广东网络建设有限公司 | Online multi-person identity authentication method, system and device and identity authentication equipment |
CN111586019A (en) * | 2020-04-30 | 2020-08-25 | 中国银行股份有限公司 | Identity authentication method and device and service equipment |
CN111583931A (en) * | 2020-04-30 | 2020-08-25 | 中国银行股份有限公司 | Service data processing method and device |
CN113068155A (en) * | 2021-03-25 | 2021-07-02 | 中国联合网络通信集团有限公司 | Service provisioning method and server |
CN113486311A (en) * | 2021-07-22 | 2021-10-08 | 中国联合网络通信集团有限公司 | Access authorization method and device |
CN113838238A (en) * | 2021-09-26 | 2021-12-24 | 北京紫光展锐通信技术有限公司 | Service processing method, device and equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140172895A1 (en) * | 2012-12-18 | 2014-06-19 | Michael Hartel | Modeled Associations for Business Object Data Structures |
CN105577385A (en) * | 2015-12-21 | 2016-05-11 | 东莞酷派软件技术有限公司 | Method and device of obtaining signature authority |
CN106778354A (en) * | 2017-01-17 | 2017-05-31 | 泰康保险集团股份有限公司 | The method and device of rights management |
US9928272B1 (en) * | 2013-11-26 | 2018-03-27 | Sugarcrm Inc. | Determining contact-related information |
CN108206803A (en) * | 2016-12-16 | 2018-06-26 | 腾讯科技(深圳)有限公司 | Business acts on behalf processing method and processing device |
CN108416334A (en) * | 2018-04-13 | 2018-08-17 | 小草数语(北京)科技有限公司 | Proof of identity method, apparatus and equipment |
CN109308416A (en) * | 2017-07-26 | 2019-02-05 | 财付通支付科技有限公司 | Business service data processing method, device, system, storage medium and equipment |
-
2019
- 2019-05-21 CN CN201910426567.8A patent/CN110225002B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140172895A1 (en) * | 2012-12-18 | 2014-06-19 | Michael Hartel | Modeled Associations for Business Object Data Structures |
US9928272B1 (en) * | 2013-11-26 | 2018-03-27 | Sugarcrm Inc. | Determining contact-related information |
CN105577385A (en) * | 2015-12-21 | 2016-05-11 | 东莞酷派软件技术有限公司 | Method and device of obtaining signature authority |
CN108206803A (en) * | 2016-12-16 | 2018-06-26 | 腾讯科技(深圳)有限公司 | Business acts on behalf processing method and processing device |
CN106778354A (en) * | 2017-01-17 | 2017-05-31 | 泰康保险集团股份有限公司 | The method and device of rights management |
CN109308416A (en) * | 2017-07-26 | 2019-02-05 | 财付通支付科技有限公司 | Business service data processing method, device, system, storage medium and equipment |
CN108416334A (en) * | 2018-04-13 | 2018-08-17 | 小草数语(北京)科技有限公司 | Proof of identity method, apparatus and equipment |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110929237A (en) * | 2019-11-22 | 2020-03-27 | 支付宝(杭州)信息技术有限公司 | Identity verification system, method and device and information verification system |
CN111209546A (en) * | 2020-01-03 | 2020-05-29 | 数字广东网络建设有限公司 | Online multi-person identity authentication method, system and device and identity authentication equipment |
CN111586019A (en) * | 2020-04-30 | 2020-08-25 | 中国银行股份有限公司 | Identity authentication method and device and service equipment |
CN111583931A (en) * | 2020-04-30 | 2020-08-25 | 中国银行股份有限公司 | Service data processing method and device |
CN113068155A (en) * | 2021-03-25 | 2021-07-02 | 中国联合网络通信集团有限公司 | Service provisioning method and server |
CN113486311A (en) * | 2021-07-22 | 2021-10-08 | 中国联合网络通信集团有限公司 | Access authorization method and device |
CN113486311B (en) * | 2021-07-22 | 2023-06-02 | 中国联合网络通信集团有限公司 | Access authorization method and device |
CN113838238A (en) * | 2021-09-26 | 2021-12-24 | 北京紫光展锐通信技术有限公司 | Service processing method, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110225002B (en) | 2023-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110225002A (en) | Business handling method and Related product | |
US20210166241A1 (en) | Methods, apparatuses, storage mediums and terminal devices for authentication | |
KR101415887B1 (en) | Method for providing services of user identification processing | |
CN106910057B (en) | Mobile terminal and security authentication method and device on mobile terminal side | |
US20150121496A1 (en) | Remote authentication using mobile single sign on credentials | |
CN103679452A (en) | Payment authentication method, device thereof and system thereof | |
JP2013097650A (en) | Authentication system, authentication method and authentication server | |
US9918223B2 (en) | Fingerprint based communication terminal and method, server and method thereof | |
CN107231232A (en) | A kind of auth method and device | |
CN110225035A (en) | The binding of third party's account and login method, server, terminal and device | |
CN105681258A (en) | Session method and session device based on third-party server | |
CN104348875A (en) | Method, cloud server and system for performing pocket transmission of data | |
CN108235823A (en) | Agency is without roaming cellular | |
CN108966230A (en) | Share the method and apparatus of wireless access point | |
JP2017102842A (en) | Personal identification system, personal identification information output system, authentication server, personal identification method, personal identification information output method, and program | |
CN107241362A (en) | Recognize the method and apparatus that identifying code inputs user identity | |
CN109040050A (en) | Data interactive method and Related product | |
CN113076533B (en) | Service processing method and device | |
KR101441372B1 (en) | Method for conducting a public opinion poll using mobile phone | |
KR20170051916A (en) | Mobile simple payment support device based on the connection information and operating method thereof | |
CN106302558B (en) | Service processing method and device | |
CN109164986A (en) | Cloud disk data processing method, device, electronic equipment and storage medium | |
JP2012050034A (en) | Information server device and information service method | |
KR101484187B1 (en) | Method and System for non-repudiation using voice recognition on telephone authentication | |
CN103595848A (en) | Method and device for identifying information of communication contact persons |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |