CN110570286A - User authenticity verification method and device and electronic equipment - Google Patents

User authenticity verification method and device and electronic equipment Download PDF

Info

Publication number
CN110570286A
CN110570286A CN201910865766.9A CN201910865766A CN110570286A CN 110570286 A CN110570286 A CN 110570286A CN 201910865766 A CN201910865766 A CN 201910865766A CN 110570286 A CN110570286 A CN 110570286A
Authority
CN
China
Prior art keywords
user
registration
website
name
returned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910865766.9A
Other languages
Chinese (zh)
Inventor
章李杰
徐海钻
方舟
陈伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201910865766.9A priority Critical patent/CN110570286A/en
Publication of CN110570286A publication Critical patent/CN110570286A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a method and a device for verifying user authenticity and electronic equipment, wherein the method for verifying user authenticity comprises the following steps: acquiring a user name and a registration number input by a user; inquiring in a registration website according to the user name to obtain a registration name and a registration number returned by the registration website; comparing the user name input by the user with the registration name returned by the registration website, and comparing the registration number input by the user with the registration number returned by the registration website; and verifying the authenticity of the user according to the comparison result. The method and the device can verify the authenticity of the user through the information returned by the registration website and the third-party credit investigation website, improve the coverage rate of the user, and optimize the effect of verifying the authenticity of the user.

Description

user authenticity verification method and device and electronic equipment
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for verifying user authenticity, and an electronic device.
[ background of the invention ]
With the progress of e-commerce globalization, more and more international merchants reside in e-commerce platforms, and the authenticity of the resident merchants needs to be verified.
In the prior art, the authenticity of international merchants is generally verified by calling data of an external data provider, Dun & Bradstreet (hereinafter, referred to as D & B).
However, the coverage of D & B data to merchants is uneven, the coverage of D & B data to merchants which mainly contribute to Gross Domestic Product (hereinafter referred to as GDP) is weak, and the coverage of new registered companies which do not report transaction records is weak.
Moreover, the types of registration numbers in the data provided by the D & B are various and not completely covered, for example, for the merchants in hong Kong, the D & B mainly collects the Business registration (Company Register; hereinafter referred to as CR) numbers of the merchants, but collects the Business registration (Business Register; hereinafter referred to as BR) numbers of part of the merchants, and also collects part of the merchants, and no registration numbers exist in the data of the D & B.
Therefore, the D & B data has the problem of incomplete coverage to the international merchants, and the effect of verifying the authenticity of the international merchants by adopting the D & B data is poor.
[ summary of the invention ]
The embodiment of the application provides a method and a device for verifying user authenticity and electronic equipment, so that the authenticity of a user is verified through information returned by a registration website and a third-party credit investigation website, the coverage rate of the user is improved, and the effect of verifying the authenticity of the user is optimized.
In a first aspect, an embodiment of the present application provides a method for verifying user authenticity, including: acquiring a user name and a registration number input by a user; inquiring in a registration website according to the user name to obtain a registration name and a registration number returned by the registration website; comparing the user name input by the user with the registration name returned by the registration website, and comparing the registration number input by the user with the registration number returned by the registration website; and verifying the authenticity of the user according to the comparison result.
in one possible implementation manner, the verifying the authenticity of the user according to the comparison result includes: and if the registration name matched with the user name input by the user exists in the registration names returned by the registration website and the registration number matched with the registration number input by the user exists in the registration numbers returned by the registration website, determining that the authenticity of the user is verified.
In one possible implementation manner, after determining that the authenticity of the user is verified, the method further includes: if the registration number matched with the registration number input by the user and returned by the registration website is unique, acquiring first state information of the user from the registration website according to the unique registration number, and inquiring in the third-party credit investigation website according to the unique registration number to acquire second state information of the user returned by the third-party credit investigation website; comparing the first state information with the second state information; and acquiring the state information of the user according to the comparison result.
In one possible implementation manner, the method further includes: if the registration name returned by the registration website does not have a registration name matched with the user name input by the user, or the registration number returned by the registration website does not have a registration number matched with the registration number input by the user, acquiring the user address input by the user; inquiring in a third-party credit investigation website according to the user name and the user address input by the user to obtain credible information returned by the third-party credit investigation website; when the credible information is positive information, determining that the authenticity of the user is verified; the positive information includes that there is a user named the user name input by the user at the user address input by the user.
in one possible implementation manner, after determining that the authenticity of the user is verified, the method further includes: and inquiring in the third-party credit investigation website according to the user name and the user address input by the user to obtain the state information of the user.
In one possible implementation manner, the registration website includes a first registration website and a second registration website; the registration names returned by the registration websites comprise the registration names returned by the first registration website and/or the registration names returned by the second registration website; the registration number returned by the registration website comprises the registration number returned by the first registration website and/or the registration number returned by the second registration website.
In one possible implementation manner, after obtaining the user name and the registration number input by the user, the method further includes: removing invalid fields in the user name and the registration number input by the user; the querying in the registered website according to the user name comprises: and inquiring in the registered website according to the user name without the invalid field.
in a second aspect, an embodiment of the present application provides an apparatus for verifying user authenticity, including: the acquisition module is used for acquiring a user name and a registration number input by a user; the query module is used for querying in the registration website according to the user name acquired by the acquisition module to acquire a registration name and a registration number returned by the registration website; the comparison module is used for comparing the user name input by the user with the registration name returned by the registration website and comparing the registration number input by the user with the registration number returned by the registration website; and the verification module is used for verifying the authenticity of the user according to the comparison result of the comparison module.
In one possible implementation manner, the verification module is specifically configured to determine that the authenticity of the user passes the verification when a registration name matching the user name input by the user exists in registration names returned by the registration website and a registration number matching the registration number input by the user exists in registration numbers returned by the registration website.
In one possible implementation manner, the query module is further configured to, after the verification module determines that the authenticity of the user passes verification, obtain, according to a unique registration number, first state information of the user from the registration website when the registration number, which is returned by the registration website and matches with the registration number input by the user, is unique, and perform query in the third-party credit investigation website according to the unique registration number to obtain second state information of the user, which is returned by the third-party credit investigation website; the comparison module is further configured to compare the first state information with the second state information; the obtaining module is further configured to obtain the state information of the user according to the comparison result of the comparison module.
In one possible implementation manner, the obtaining module is further configured to obtain the user address input by the user when a registration name matching the user name input by the user does not exist in the registration names returned by the registration website, or a registration number matching the registration number input by the user does not exist in the registration numbers returned by the registration website; the inquiry module is also used for inquiring in a third-party credit investigation website according to the user name and the user address input by the user to obtain the credible information returned by the third-party credit investigation website; the verification module is further used for determining that the authenticity of the user is verified when the credible information obtained by the query module is positive information; the positive information includes that there is a user named the user name input by the user at the user address input by the user.
In one possible implementation manner, the query module is further configured to, after the verification module determines that the authenticity of the user passes the verification, query the third-party credit investigation website according to the user name and the user address input by the user, and obtain the state information of the user.
In one possible implementation manner, the apparatus further includes: the cleaning module is used for removing invalid fields in the user name and the registration number input by the user after the user name and the registration number input by the user are acquired by the acquisition module; the query module is specifically configured to query in the registered website according to the user name from which the invalid field is removed.
In a third aspect, an embodiment of the present application provides an electronic device, including: at least one processor; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, which when called by the processor are capable of performing the method as described above.
in a fourth aspect, embodiments of the present application provide a non-transitory computer-readable storage medium storing computer instructions that cause the computer to perform the method as described above.
In the technical scheme, after the user name and the registration number input by the user are acquired, the user name and the registration number are inquired in the registration website according to the user name, the registration name and the registration number returned by the registration website are acquired, the user name input by the user is compared with the registration name returned by the registration website, the registration number input by the user is compared with the registration number returned by the registration website, and finally the authenticity of the user is verified according to the comparison result, so that the authenticity of the user can be verified through the information returned by the registration website and the third-party credit investigation website, the coverage rate of the user is improved, and the effect of verifying the authenticity of the user is optimized.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of an embodiment of a method for verifying user authenticity according to the present application;
FIG. 2 is a flow chart of another embodiment of a method for verifying user authenticity according to the present application;
FIG. 3 is a flow chart of a method for verifying user authenticity according to yet another embodiment of the present application;
FIG. 4 is a flow chart of a method for verifying user authenticity according to yet another embodiment of the present application;
FIG. 5 is a flow chart of a method for verifying user authenticity according to yet another embodiment of the present application;
FIG. 6 is a schematic diagram of an embodiment of a device for verifying authenticity of a user according to the present application;
FIG. 7 is a schematic diagram of another embodiment of a device for verifying user authenticity according to the present application;
fig. 8 is a schematic structural diagram of an embodiment of an electronic device according to the present application.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Fig. 1 is a flowchart of an embodiment of a method for verifying user authenticity according to the present application, and as shown in fig. 1, the method for verifying user authenticity may include:
Step 101, obtaining a user name and a registration number input by a user.
specifically, the user may be a merchant applying for entering the e-commerce platform, and thus, the user name and the registration number input by the user may be the merchant name and the registration number input by the merchant.
and 102, inquiring in a registration website according to the user name to obtain a registration name and a registration number returned by the registration website.
The registration websites can include a first registration website and a second registration website;
the registration name returned by the registration website may include a registration name returned by the first registration website and/or a registration name returned by the second registration website;
the registration number returned by the registration website comprises a registration number returned by a first registration website and/or a registration number returned by a second registration website;
The registration name returned by the registration website may include an english name and a chinese name.
Taking the first registration website as a commercial registration website and the second registration website as a commercial registration website as an example, the registration name returned by the registration website may include one or a combination of the following: the registration name (br _ name _ en and/or br _ name _ cn) returned by the commercial registration website, and the registration name (cr _ name _ en and/or cr _ name _ cn) returned by the industrial and commercial registration website; the registration number returned by the registration website may include one or a combination of the following: the registration number (br _ number) returned by the business registration website, and the registration number (cr _ number) returned by the industry and commerce registration website.
step 103, comparing the user name input by the user with the registration name returned by the registration website, and comparing the registration number input by the user with the registration number returned by the registration website.
Specifically, when comparing the user name input by the user with the registration name returned by the registration website, the user name input by the user and the registration name returned by the registration website may be standardized to make the format of the user name input by the user consistent with the format of the registration name returned by the registration website;
Similarly, when comparing the registration number input by the user with the registration number returned from the registration website, the registration number input by the user and the registration number returned from the registration website may be standardized to match the format of the registration number input by the user and the format of the registration number returned from the registration website.
and 104, verifying the authenticity of the user according to the comparison result.
In the verification method for the authenticity of the user, after the user name and the registration number input by the user are obtained, the user name and the registration number returned by the registration website are inquired in the registration website according to the user name, the registration name and the registration number returned by the registration website are obtained, the user name input by the user is compared with the registration name returned by the registration website, the registration number input by the user is compared with the registration number returned by the registration website, and finally the authenticity of the user is verified according to the comparison result, so that the authenticity of the user can be verified through the information returned by the registration website and a third-party credit investigation website, the coverage rate of the user is improved, and the effect of verifying the authenticity of the user is optimized.
Fig. 2 is a flowchart of another embodiment of the method for verifying the authenticity of the user, as shown in fig. 2, in the embodiment shown in fig. 1 of the present application, step 104 may be:
Step 201, if a registration name matching with the user name input by the user exists in the registration names returned by the registration website, and a registration number matching with the registration number input by the user exists in the registration numbers returned by the registration website, determining that the authenticity of the user passes the verification.
Further, after step 201, the method may further include:
step 202, if the registration number matched with the registration number input by the user returned by the registration website is unique, acquiring first state information of the user from the registration website according to the unique registration number, and inquiring in a third-party credit investigation website according to the unique registration number to acquire second state information of the user returned by the third-party credit investigation website.
Taking the user as an example of a merchant applying for entering the e-commerce platform, the first state information may include business state information and/or sale prohibition state and the like of the merchant acquired from the registration website; the second state information may include business state information and/or sale prohibition state and the like of the merchant returned by the third-party credit investigation website.
The third-party credit investigation website may be a D & B website, or may be another credit investigation website, which is not limited in this embodiment.
step 203, comparing the first state information with the second state information.
And step 204, acquiring the state information of the user according to the comparison result.
specifically, after comparing the first status information with the second status information, the status information of the user may be obtained with high logic, for example, if the first status information is that the business status of the merchant is normal, and the second status information is that the business status of the merchant is not normal, the business status of the merchant is determined to be not normal.
by acquiring the state information of the user, the embodiment can prevent the user with abnormal business state from entering the e-commerce platform, and avoid the loss caused by the user with abnormal business state entering the e-commerce platform.
Fig. 3 is a flowchart of a further embodiment of the method for verifying the authenticity of the user according to the present application, as shown in fig. 3, in the embodiment shown in fig. 2, the method may further include:
step 301, if there is no registration name matching the user name input by the user in the registration names returned by the registration websites, or there is no registration number matching the registration number input by the user in the registration numbers returned by the registration websites, acquiring the user address input by the user.
step 302, inquiring in a third-party credit investigation website according to the user name and the user address input by the user, and obtaining the credible information returned by the third-party credit investigation website.
step 303, when the trusted information is positive information, determining that the authenticity of the user is verified.
Wherein the positive information includes a user whose name is the user name input by the user, which is present in the user address input by the user.
That is, if a user name matching with a user name input by a user is not queried in the registration website or a registration number matching with a registration number input by the user is not queried, a third-party credit investigation website is queried according to the user name input by the user and a user address, and if the credible information returned by the third-party credit investigation website is that the user with the name of the user exists in the user address input by the user, the user can be determined to pass the authenticity verification.
In a specific implementation, steps 301 to 303 may be executed in parallel with step 201, or may be executed sequentially, which is not limited in this embodiment.
Further, after step 303, the method may further include:
Step 304, inquiring in a third-party credit investigation website according to the user name and the user address input by the user, and obtaining the state information of the user.
The status information of the user may be business status information of the user and/or sale prohibition status.
In this embodiment, by obtaining the state information of the user, the user with an abnormal business state can be prevented from entering the e-commerce platform, and the loss caused by the user with an abnormal business state entering the e-commerce platform is avoided.
Fig. 4 is a flowchart of a further embodiment of the method for verifying the authenticity of the user according to the present application, as shown in fig. 4, in the embodiment shown in fig. 1 of the present application, after step 101, the method may further include:
Step 401, removing the invalid fields in the user name and the registration number input by the user.
Thus, step 102 may be:
step 402, inquiring in the registered website according to the user name without the invalid field, and obtaining the registration name and the registration number returned by the registered website.
that is, after the user name and the registration number input by the user are acquired, the user name and the registration number input by the user may be cleaned to remove invalid fields, for example: signs such as "+" and/or space, and then inquiring in the registered website according to the user name without the invalid field.
Fig. 5 is a flowchart of a further embodiment of the method for verifying user authenticity according to the present application, and as shown in fig. 5, the method for verifying user authenticity may include:
Step 501, obtaining a user name and a registration number input by a user.
Step 502, inquiring in the registration website according to the user name, and obtaining the registration name and the registration number returned by the registration website.
step 503, comparing the user name input by the user with the registration name returned by the registration website, and comparing the registration number input by the user with the registration number returned by the registration website.
Then, if a registration name matching the user name input by the user exists in the registration names returned by the registration website, and a registration number matching the registration number input by the user exists in the registration numbers returned by the registration website, that is, the matching is successful, then step 504 is executed;
if there is no registration name matching the user name input by the user in the registration names returned by the registration website, or there is no registration number matching the registration number input by the user in the registration numbers returned by the registration website, that is, the matching is unsuccessful, then step 508 is executed.
step 504, determining that the authenticity of the user is verified.
Step 505, if the registration number matched with the registration number input by the user returned by the registration website is unique, acquiring the first state information of the user from the registration website according to the unique registration number, and inquiring in the third-party credit investigation website according to the unique registration number to acquire the second state information of the user returned by the third-party credit investigation website.
step 506, comparing the first state information with the second state information.
And step 507, acquiring the state information of the user according to the comparison result.
Specifically, after comparing the first status information with the second status information, the status information of the user may be obtained with high logic, for example, if the first status information is that the business status of the merchant is normal, and the second status information is that the business status of the merchant is not normal, the business status of the merchant is determined to be not normal.
Step 508, obtaining the user address input by the user.
Step 509, querying in the third-party credit investigation website according to the user name and the user address input by the user, and obtaining the trusted information returned by the third-party credit investigation website.
And 510, when the credible information is positive information, determining that the authenticity of the user is verified.
Step 511, inquiring in a third party credit investigation website according to the user name and the user address input by the user, and obtaining the state information of the user.
In this embodiment, after the user name and the registration number input by the user are acquired, if the user name matching the user name input by the user is inquired in the registration website and the registration number matching the registration number input by the user is inquired, the authenticity of the user is determined to pass the verification by using the information inquired by the registration website, and if the user name matching the user name input by the user or the registration number matching the registration number input by the user is not inquired in the registration website, the inquiry is performed in the third-party credit investigation website according to the user name and the user address input by the user and the authenticity of the user is verified according to the information returned by the third-party credit investigation website, so that the coverage rate of the authenticity verification of the user can be improved.
And when the user name matched with the user name input by the user is inquired in the registration website and the registration number matched with the registration number input by the user is inquired, the state information of the user is acquired from the registration website and the third-party credit investigation website, and then the state information acquired from the registration website and the third-party credit investigation website is compared, so that the state information of the user is acquired at high logic, the accuracy of the acquired state information of the user can be improved, the user with an abnormal business state can be prevented from entering an e-commerce platform, and the loss caused by the user with an abnormal business state entering the e-commerce platform is avoided.
fig. 6 is a schematic structural diagram of an embodiment of an apparatus for verifying user authenticity according to the present application, where the apparatus for verifying user authenticity in the present embodiment may be used as an electronic device, or a part of an electronic device, to implement the method for verifying user authenticity according to the present application. As shown in fig. 6, the apparatus for verifying the authenticity of the user may include: the system comprises an acquisition module 61, a query module 62, a comparison module 63 and a verification module 64;
The acquiring module 61 is configured to acquire a user name and a registration number input by a user; specifically, the user may be a merchant applying for entering the e-commerce platform, and thus, the user name and the registration number input by the user may be the merchant name and the registration number input by the merchant.
the query module 62 is configured to query the registered website according to the user name obtained by the obtaining module 61, and obtain a registration name and a registration number returned by the registered website; the registration websites can include a first registration website and a second registration website;
the registration name returned by the registration website may include a registration name returned by the first registration website and/or a registration name returned by the second registration website;
The registration number returned by the registration website comprises a registration number returned by a first registration website and/or a registration number returned by a second registration website;
the registration name returned by the registration website may include an english name and a chinese name.
Taking the first registration website as a commercial registration website and the second registration website as a commercial registration website as an example, the registration name returned by the registration website may include one or a combination of the following: the registration name (br _ name _ en and/or br _ name _ cn) returned by the commercial registration website, and the registration name (cr _ name _ en and/or cr _ name _ cn) returned by the industrial and commercial registration website; the registration number returned by the registration website may include one or a combination of the following: the registration number (br _ number) returned by the business registration website, and the registration number (cr _ number) returned by the industry and commerce registration website.
A comparison module 63, configured to compare the user name input by the user with the registration name returned by the registration website, and compare the registration number input by the user with the registration number returned by the registration website; specifically, when the comparing module 63 compares the user name input by the user with the registration name returned by the registration website, the user name input by the user and the registration name returned by the registration website may be standardized to make the format of the user name input by the user consistent with the format of the registration name returned by the registration website;
Similarly, when the comparing module 63 compares the registration number input by the user with the registration number returned from the registration website, the registration number input by the user and the registration number returned from the registration website may be standardized to match the format of the registration number input by the user and the format of the registration number returned from the registration website.
and the verification module 64 is used for verifying the authenticity of the user according to the comparison result of the comparison module 63.
In the verification device for user authenticity, after the obtaining module 61 obtains the user name and the registration number input by the user, the query module 62 queries in the registration website according to the user name to obtain the registration name and the registration number returned by the registration website, the comparison module 63 compares the user name input by the user with the registration name returned by the registration website and compares the registration number input by the user with the registration number returned by the registration website, and finally the verification module 64 verifies the authenticity of the user according to the comparison result, thereby realizing the verification of the authenticity of the user through the information returned by the registration website and the third-party credit investigation website, improving the coverage rate of the user, and optimizing the effect of verifying the authenticity of the user.
Fig. 7 is a schematic structural diagram of another embodiment of the apparatus for verifying user authenticity according to the present application, in an implementation manner of this embodiment, the verification module 64 is specifically configured to determine that the authenticity of the user passes the verification when a registration name matching the user name input by the user exists in the registration names returned by the registration website, and a registration number matching the registration number input by the user exists in the registration numbers returned by the registration website.
Further, the query module 62 is further configured to, after the verification module 64 determines that the authenticity of the user passes the verification, when the registration number returned by the registration website and matching with the registration number input by the user is unique, obtain first state information of the user from the registration website according to the unique registration number, and perform a query in a third-party credit investigation website according to the unique registration number to obtain second state information of the user returned by the third-party credit investigation website;
Taking the user as an example of a merchant applying for entering the e-commerce platform, the first state information may include business state information and/or sale prohibition state and the like of the merchant acquired from the registration website; the second state information may include business state information and/or sale prohibition state and the like of the merchant returned by the third-party credit investigation website.
The third-party credit investigation website may be a D & B website, or may be another credit investigation website, which is not limited in this embodiment.
A comparing module 63, configured to compare the first state information with the second state information;
The obtaining module 61 is further configured to obtain the status information of the user according to the comparison result of the comparing module 63.
specifically, after the comparing module 63 compares the first status information with the second status information, the obtaining module 61 may obtain the status information of the user with high logic, for example, if the first status information is that the business status of the merchant is normal, and the second status information is that the business status of the merchant is not normal, the obtaining module 61 determines that the business status of the merchant is not normal.
In this embodiment, the obtaining module 61 can avoid the user with abnormal business state entering the e-commerce platform by obtaining the state information of the user, and avoid the loss caused by the user with abnormal business state entering the e-commerce platform.
in another implementation manner of this embodiment, the obtaining module 61 is further configured to obtain the user address input by the user when a registration name matching the user name input by the user does not exist in the registration names returned by the registration website, or a registration number matching the registration number input by the user does not exist in the registration numbers returned by the registration website;
The query module 62 is further configured to query in a third-party credit investigation website according to the user name and the user address input by the user, so as to obtain trusted information returned by the third-party credit investigation website;
The verification module 64 is further configured to determine that the authenticity of the user is verified when the trusted information obtained by the query module 62 is positive information; the positive information includes a user whose name is the user name input by the user, which is present in the user address input by the user.
That is, if the query module 62 does not query the registered website with the user name matching the user name input by the user or does not query the registered number matching the registered number input by the user, the query module 62 queries the third-party credit investigation website according to the user name and the user address input by the user, and if the trusted information returned by the third-party credit investigation website is that the user with the name of the user exists in the user address input by the user, the verification module 64 may determine that the user passes the authenticity verification.
Further, the query module 62 is further configured to, after the verification module 64 determines that the authenticity of the user is verified, query in a third-party credit investigation website according to the user name and the user address input by the user, so as to obtain the status information of the user.
The status information of the user may be business status information of the user and/or sale prohibition status.
in this embodiment, the query module 62 can avoid the user with abnormal business state entering the e-commerce platform by obtaining the state information of the user, and avoid the loss caused by the user with abnormal business state entering the e-commerce platform.
Further, the apparatus for verifying the authenticity of the user may further include: a cleaning module 65;
A cleaning module 65, configured to remove invalid fields in the user name and the registration number input by the user after the obtaining module 61 obtains the user name and the registration number input by the user;
The query module 62 is specifically configured to query the registered website according to the user name without the invalid field.
that is, after the obtaining module 61 obtains the user name and the registration number input by the user, the cleaning module 65 may clean the user name and the registration number input by the user to remove invalid fields, for example: the symbol such as "+" and/or space, and then the query module 62 queries the registered website according to the user name without the invalid field.
FIG. 8 is a schematic structural diagram of an embodiment of an electronic device according to the present application, as shown in FIG. 8, the electronic device may include at least one processor; and at least one memory communicatively coupled to the processor, wherein: the memory stores program instructions executable by the processor, and the processor calls the program instructions to execute the method for verifying the authenticity of the user provided by the embodiment of the application.
Wherein, above-mentioned electronic equipment can be for equipment such as smart mobile phone, smart watch or panel computer, also can be for the server, for example: the cloud server, in this embodiment, does not limit the form of the electronic device.
FIG. 8 illustrates a block diagram of an exemplary electronic device suitable for use in implementing embodiments of the present application. The electronic device shown in fig. 8 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 8, the electronic device is in the form of a general purpose computing device. Components of the electronic device may include, but are not limited to: one or more processors 410, a memory 430, and a communication bus 440 that connects the various system components (including the memory 430 and the processing unit 410).
communication bus 440 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. These architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, to name a few.
Electronic devices typically include a variety of computer system readable media. Such media may be any available media that is accessible by the electronic device and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 430 may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) and/or cache Memory. The electronic device may further include other removable/non-removable, volatile/nonvolatile computer system storage media. Although not shown in FIG. 8, a disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a Compact disk Read Only Memory (CD-ROM), a Digital versatile disk Read Only Memory (DVD-ROM), or other optical media) may be provided. In these cases, each drive may be connected to the communication bus 440 by one or more data media interfaces. Memory 430 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
a program/utility having a set (at least one) of program modules, including but not limited to an operating system, one or more application programs, other program modules, and program data, may be stored in memory 430, each of which examples or some combination may include an implementation of a network environment. The program modules generally perform the functions and/or methodologies of the embodiments described herein.
the electronic device may also communicate with one or more external devices (e.g., keyboard, pointing device, display, etc.), one or more devices that enable a user to interact with the electronic device, and/or any devices (e.g., network card, modem, etc.) that enable the electronic device to communicate with one or more other computing devices. Such communication may occur via communication interface 420. Furthermore, the electronic device may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public Network such as the Internet) via a Network adapter (not shown in FIG. 8) that may communicate with other modules of the electronic device via the communication bus 440. It should be appreciated that although not shown in FIG. 8, other hardware and/or software modules may be used in conjunction with the electronic device, including but not limited to: microcode, device drivers, Redundant processing units, external disk drive Arrays, disk array (RAID) systems, tape Drives, and data backup storage systems, among others.
The processor 410 executes various functional applications and data processing by executing programs stored in the memory 430, for example, to implement the user authenticity verification method provided by the embodiment of the present application.
the embodiment of the present application further provides a non-transitory computer-readable storage medium, which stores computer instructions, where the computer instructions cause the computer to execute the method for verifying user authenticity provided by the embodiment of the present application.
The non-transitory computer readable storage medium described above may take any combination of one or more computer readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read Only Memory (ROM), an Erasable Programmable Read Only Memory (EPROM), a flash Memory, an optical fiber, a portable compact disc Read Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of Network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
in the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that the terminal according to the embodiments of the present application may include, but is not limited to, a Personal Computer (Personal Computer; hereinafter, referred to as PC), a Personal Digital Assistant (Personal Digital Assistant; hereinafter, referred to as PDA), a wireless handheld device, a Tablet Computer (Tablet Computer), a mobile phone, an MP3 player, an MP4 player, and the like.
in the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present application. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
the above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (15)

1. A method of verifying authenticity of a user, comprising:
Acquiring a user name and a registration number input by a user;
inquiring in a registration website according to the user name to obtain a registration name and a registration number returned by the registration website;
comparing the user name input by the user with the registration name returned by the registration website, and comparing the registration number input by the user with the registration number returned by the registration website;
And verifying the authenticity of the user according to the comparison result.
2. the method of claim 1, wherein verifying the authenticity of the user based on the comparison comprises:
And if the registration name matched with the user name input by the user exists in the registration names returned by the registration website and the registration number matched with the registration number input by the user exists in the registration numbers returned by the registration website, determining that the authenticity of the user is verified.
3. The method of claim 2, wherein after determining that the authenticity of the user is verified, further comprising:
If the registration number matched with the registration number input by the user and returned by the registration website is unique, acquiring first state information of the user from the registration website according to the unique registration number, and inquiring in the third-party credit investigation website according to the unique registration number to acquire second state information of the user returned by the third-party credit investigation website;
Comparing the first state information with the second state information;
And acquiring the state information of the user according to the comparison result.
4. The method of claim 2, further comprising:
if the registration name returned by the registration website does not have a registration name matched with the user name input by the user, or the registration number returned by the registration website does not have a registration number matched with the registration number input by the user, acquiring the user address input by the user;
Inquiring in a third-party credit investigation website according to the user name and the user address input by the user to obtain credible information returned by the third-party credit investigation website;
When the credible information is positive information, determining that the authenticity of the user is verified; the positive information includes that there is a user named the user name input by the user at the user address input by the user.
5. the method of claim 4, wherein after determining that the authenticity of the user is verified, further comprising:
and inquiring in the third-party credit investigation website according to the user name and the user address input by the user to obtain the state information of the user.
6. The method of any one of claims 1-5, wherein the registration website comprises a first registration website and a second registration website;
The registration names returned by the registration websites comprise the registration names returned by the first registration website and/or the registration names returned by the second registration website;
The registration number returned by the registration website comprises the registration number returned by the first registration website and/or the registration number returned by the second registration website.
7. the method according to any one of claims 1 to 5, wherein after acquiring the user name and the registration number input by the user, the method further comprises:
removing invalid fields in the user name and the registration number input by the user;
the querying in the registered website according to the user name comprises:
and inquiring in the registered website according to the user name without the invalid field.
8. An apparatus for verifying authenticity of a user, comprising:
the acquisition module is used for acquiring a user name and a registration number input by a user;
the query module is used for querying in the registration website according to the user name acquired by the acquisition module to acquire a registration name and a registration number returned by the registration website;
the comparison module is used for comparing the user name input by the user with the registration name returned by the registration website and comparing the registration number input by the user with the registration number returned by the registration website;
and the verification module is used for verifying the authenticity of the user according to the comparison result of the comparison module.
9. The apparatus of claim 8,
the verification module is specifically configured to determine that the authenticity of the user passes verification when a registration name matching the user name input by the user exists in the registration names returned by the registration website and a registration number matching the registration number input by the user exists in the registration numbers returned by the registration website.
10. The apparatus of claim 9,
The query module is further configured to, after the verification module determines that the authenticity of the user passes the verification, obtain, when a registration number, which is returned by the registration website and matches the registration number input by the user, unique registration number, first state information of the user from the registration website according to the unique registration number, perform query in the third-party credit investigation website according to the unique registration number, and obtain second state information of the user, which is returned by the third-party credit investigation website;
The comparison module is further configured to compare the first state information with the second state information;
The obtaining module is further configured to obtain the state information of the user according to the comparison result of the comparison module.
11. The apparatus of claim 9,
The obtaining module is further configured to obtain the user address input by the user when a registration name matching the user name input by the user does not exist in the registration names returned by the registration website, or a registration number matching the registration number input by the user does not exist in the registration numbers returned by the registration website;
The inquiry module is also used for inquiring in a third-party credit investigation website according to the user name and the user address input by the user to obtain the credible information returned by the third-party credit investigation website;
the verification module is further used for determining that the authenticity of the user is verified when the credible information obtained by the query module is positive information; the positive information includes that there is a user named the user name input by the user at the user address input by the user.
12. The apparatus of claim 11,
And the query module is further used for querying in the third-party credit investigation website according to the user name and the user address input by the user to obtain the state information of the user after the verification module determines that the authenticity of the user passes the verification.
13. the apparatus of any one of claims 8-12, further comprising:
The cleaning module is used for removing invalid fields in the user name and the registration number input by the user after the user name and the registration number input by the user are acquired by the acquisition module;
The query module is specifically configured to query in the registered website according to the user name from which the invalid field is removed.
14. An electronic device, comprising:
at least one processor; and
at least one memory communicatively coupled to the processor, wherein:
The memory stores program instructions executable by the processor, the processor invoking the program instructions to perform the method of any of claims 1 to 7.
15. A non-transitory computer-readable storage medium storing computer instructions that cause a computer to perform the method of any one of claims 1 to 7.
CN201910865766.9A 2019-09-12 2019-09-12 User authenticity verification method and device and electronic equipment Pending CN110570286A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910865766.9A CN110570286A (en) 2019-09-12 2019-09-12 User authenticity verification method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910865766.9A CN110570286A (en) 2019-09-12 2019-09-12 User authenticity verification method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN110570286A true CN110570286A (en) 2019-12-13

Family

ID=68779797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910865766.9A Pending CN110570286A (en) 2019-09-12 2019-09-12 User authenticity verification method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN110570286A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105930335A (en) * 2016-03-31 2016-09-07 石平安 Browser system based on or including corporate credit module
US20170039612A1 (en) * 2015-08-03 2017-02-09 Mastercard Asia/Pacific Pte. Ltd. Method and system for website verification
CN106529979A (en) * 2016-12-05 2017-03-22 深圳微众税银信息服务有限公司 Enterprise identity authentication method and system
CN108346056A (en) * 2017-01-24 2018-07-31 阿里巴巴集团控股有限公司 The authentication method and device of group's situation
CN109002555A (en) * 2018-08-09 2018-12-14 郑州市景安网络科技股份有限公司 A kind of ICP puts on record method, apparatus, equipment and readable storage medium storing program for executing
CN109409900A (en) * 2018-01-26 2019-03-01 深圳市买买提信息科技有限公司 A kind of trade company's checking method and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170039612A1 (en) * 2015-08-03 2017-02-09 Mastercard Asia/Pacific Pte. Ltd. Method and system for website verification
CN105930335A (en) * 2016-03-31 2016-09-07 石平安 Browser system based on or including corporate credit module
CN106529979A (en) * 2016-12-05 2017-03-22 深圳微众税银信息服务有限公司 Enterprise identity authentication method and system
CN108346056A (en) * 2017-01-24 2018-07-31 阿里巴巴集团控股有限公司 The authentication method and device of group's situation
CN109409900A (en) * 2018-01-26 2019-03-01 深圳市买买提信息科技有限公司 A kind of trade company's checking method and server
CN109002555A (en) * 2018-08-09 2018-12-14 郑州市景安网络科技股份有限公司 A kind of ICP puts on record method, apparatus, equipment and readable storage medium storing program for executing

Similar Documents

Publication Publication Date Title
CN108427705B (en) Electronic device, distributed system log query method and storage medium
CN111090628B (en) Data processing method and device, storage medium and electronic equipment
CN108388598B (en) Electronic device, data storage method, and storage medium
CN108921552B (en) Evidence verification method and device
CN109271611B (en) Data verification method and device and electronic equipment
CN110688111A (en) Configuration method, device, server and storage medium of business process
CN111242462B (en) Data processing method and device, computer storage medium and electronic equipment
CN110675249A (en) Matching method, device, server and storage medium for network lending
CN104903865A (en) Restoring a previous version of a virtual machine image
CN111125656B (en) Service processing method and device and electronic equipment
CN110070383B (en) Abnormal user identification method and device based on big data analysis
CN110968860A (en) Security verification method for application account, computer equipment and computer-readable storage medium
CN107992457B (en) Information conversion method, device, terminal equipment and storage medium
CN110570286A (en) User authenticity verification method and device and electronic equipment
CN114707048A (en) Sensitive information detection method and device, electronic equipment and computer readable storage medium
CN112966671A (en) Contract detection method and device, electronic equipment and storage medium
CN109766499B (en) Group joining method and device and computer equipment
CN113393295A (en) Service data pushing method and device, electronic equipment and storage medium
CN108280139B (en) POI data processing method, device, equipment and computer readable storage medium
CN110969518A (en) Allocation method, device, server and storage medium for clearing account
CN112364268A (en) Resource acquisition method and device, electronic equipment and storage medium
CN110943982A (en) Document data encryption method and device, electronic equipment and storage medium
CN110648208B (en) Group identification method and device and electronic equipment
CN111369346B (en) User credit evaluation method, device, server and storage medium
CN110875876B (en) Electronic red packet identification method, electronic red packet identification device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191213