CN113159800B - Identity authentication processing method and device - Google Patents

Identity authentication processing method and device Download PDF

Info

Publication number
CN113159800B
CN113159800B CN202110374317.1A CN202110374317A CN113159800B CN 113159800 B CN113159800 B CN 113159800B CN 202110374317 A CN202110374317 A CN 202110374317A CN 113159800 B CN113159800 B CN 113159800B
Authority
CN
China
Prior art keywords
driver
authentication
authenticated
identity
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110374317.1A
Other languages
Chinese (zh)
Other versions
CN113159800A (en
Inventor
耿浩
苏千秋
杨鹏
陈重远
颜陈宇
许觅秋
高俊树
巩鑫
雷锦华
秦芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202211581388.XA priority Critical patent/CN115860763A/en
Priority to CN202110374317.1A priority patent/CN113159800B/en
Publication of CN113159800A publication Critical patent/CN113159800A/en
Application granted granted Critical
Publication of CN113159800B publication Critical patent/CN113159800B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Finance (AREA)

Abstract

The embodiment of the specification provides an identity authentication processing method and an identity authentication processing device, wherein the identity authentication processing method comprises the following steps: acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel; inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform; if the driver to be authenticated does not exist, detecting the authentication and verification state of the driver to be authenticated; if the detected authentication and verification state is that the identity is not authenticated, acquiring identity related information submitted by the driver to be authenticated and creating an authentication and verification work order; and after the verification of the certification and verification work order is passed, carrying out certification and marking on the driver identification.

Description

Identity authentication processing method and device
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to an identity authentication processing method and apparatus.
Background
With the development of internet technology, users all use the internet to perform data transmission or service communication. In order to prevent information from being stolen and ensure the internet transaction safety, and to supervise whether the activities of users or enterprises meet the regulations or rules such as laws, regulations and industrial rules, identity authentication is performed on users who perform data transmission or service communication, and the authentication is a credit guarantee form and refers to a process of proving after relevant organizations check the authenticity of information provided by the users.
Disclosure of Invention
One or more embodiments of the present specification provide an identity authentication processing method. The identity authentication processing method comprises the following steps: and acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel. Inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform; and if the driver to be authenticated does not exist, detecting the authentication and verification state of the driver to be authenticated. And if the detected authentication and verification state is that the identity is not authenticated, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication and verification work order. And after the verification of the certification and verification work order is passed, carrying out certification and marking on the driver identification.
One or more embodiments of the present specification provide an identity authentication processing method based on a federation chain, which is applied to federation chain nodes in the federation chain, and includes: and receiving an identity authentication request which is sent by the authentication server and carries the driver identifier of the driver to be authenticated. Calling intelligent contract deployed by the alliance chain node to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain; if the driver is not authenticated, the authentication and audit state of the driver to be authenticated is detected, and if the detected authentication and audit state is that the identity is not authenticated, the detected authentication and audit state is sent to the authentication server. And after the authentication server creates an authentication and verification work order and confirms that the verification is passed, calling the intelligent contract to authenticate and mark the driver identifier.
One or more embodiments of the present specification provide another identity authentication processing method based on a federation chain, which is applied to a server accessing the federation chain, and includes: the method comprises the steps of obtaining a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node. And if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication and verification work order. And sending an audit result to the coalition link points after the certification audit work order is approved.
One or more embodiments of the present specification provide an identity authentication processing apparatus including: the obtaining module is configured to obtain a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel. And the query module is configured to query whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with the third-party platform. And if the driver authentication request does not exist, operating a detection module, wherein the detection module is configured to detect the authentication and verification state of the driver to be authenticated. And if the detected authentication and verification state is that the identity is not authenticated, operating a creation module, wherein the creation module is configured to acquire identity related information submitted by the driver to be authenticated and create an authentication and verification work order. And the marking module is configured to perform certification marking on the driver identifier after the certification and audit work order passes the audit.
One or more embodiments of the present specification provide an identity authentication processing apparatus based on a federation chain, operating in a federation chain node in the federation chain, including: the request receiving module is configured to receive an identity authentication request which is sent by the authentication server and carries a driver identifier of a driver to be authenticated. The identity query module is configured to call intelligent contract of the alliance link point deployment to query whether an authentication marking driver identity matched with the driver identity exists in an authentication driver table stored in the alliance chain; and if the driver is not authenticated, operating a state detection module, wherein the state detection module is configured to detect the authentication and audit state of the driver to be authenticated, and if the detected authentication and audit state is that the identity is not authenticated, sending the detected authentication and audit state to the authentication server. And the authentication marking module is configured to call the intelligent contract to perform authentication marking on the driver identifier after the authentication server creates an authentication and verification work order and confirms that the verification is passed.
One or more embodiments of the present specification provide another identity authentication processing apparatus based on a federation chain, which is run in a server accessing the federation chain, and includes: the request sending module is configured to obtain a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and send an identity authentication request carrying the driver identifier to a corresponding alliance link node. And if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, operating a work order creating module, wherein the work order creating module is configured to acquire identity related information submitted by the driver to be authenticated and create an authentication and verification work order. And the result sending module is configured to send a checking result to the alliance chain node after the certification and checking work order passes the checking.
One or more embodiments of the present specification provide an identity authentication processing apparatus including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: and acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel. Inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform; and if the driver to be authenticated does not exist, detecting the authentication and verification state of the driver to be authenticated. And if the detected authentication and verification state is that the identity is not authenticated, acquiring identity related information submitted by the driver to be authenticated and creating an authentication and verification work order. And after the verification of the certification and verification work order is passed, carrying out certification and marking on the driver identification.
One or more embodiments of the present specification provide an identity authentication processing apparatus based on a federation chain, including: a processor; and a memory configured to store computer executable instructions that, when executed, cause the processor to: and receiving an identity authentication request which is sent by the authentication server and carries the driver identifier of the driver to be authenticated. Calling an intelligent contract deployed by the alliance chain node to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain or not; if the driver is not authenticated, the authentication and audit state of the driver to be authenticated is detected, and if the detected authentication and audit state is that the identity is not authenticated, the detected authentication and audit state is sent to the authentication server. And after the authentication server creates an authentication and verification work order and confirms that the verification is passed, calling the intelligent contract to authenticate and mark the driver identifier.
One or more embodiments of the present specification provide another identity authentication processing apparatus based on a federation chain, including: a processor; and a memory configured to store computer-executable instructions that, when executed, cause the processor to: the method comprises the steps of obtaining a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node. And if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication and verification work order. And sending an audit result to the coalition link points after the certification audit work order is approved.
One or more embodiments of the present specification provide a storage medium storing computer-executable instructions that, when executed, implement the following: and acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel. Inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform; and if the driver does not exist, detecting the authentication and verification state of the driver to be authenticated. And if the detected authentication and verification state is that the identity is not authenticated, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication and verification work order. And after the verification of the verification work order is passed, the driver identification is subjected to verification marking.
One or more embodiments of the present specification provide a second storage medium storing computer-executable instructions that, when executed, implement the following: and receiving an identity authentication request which is sent by the authentication server and carries the driver identifier of the driver to be authenticated. Calling an intelligent contract deployed by the alliance chain node to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain or not; if the driver is not authenticated, the authentication and audit state of the driver to be authenticated is detected, and if the detected authentication and audit state is that the identity is not authenticated, the detected authentication and audit state is sent to the authentication server. And after the authentication server creates an authentication and verification work order and confirms that the authentication and verification pass, calling the intelligent contract to carry out authentication and marking on the driver identifier.
One or more embodiments of the present specification provide a third storage medium storing computer-executable instructions that, when executed, implement the following flow: the method comprises the steps of obtaining a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node. And if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication and verification work order. And sending an audit result to the coalition link points after the certification audit work order is approved.
Drawings
In order to more clearly illustrate one or more embodiments or prior art solutions in the present specification, the drawings used in the description of the embodiments or prior art will be briefly described below, it is obvious that the drawings in the description below are only some embodiments described in the present specification, and for those skilled in the art, other drawings may be obtained according to these drawings without inventive labor;
fig. 1 is a flowchart of a processing method of an identity authentication processing method according to one or more embodiments of the present disclosure;
fig. 2 is a flowchart of an identity authentication processing method applied to a driver identity authentication scenario according to one or more embodiments of the present disclosure;
FIG. 3 is a flowchart of a federation chain-based identity authentication processing method provided in one or more embodiments of the present specification;
FIG. 4 is a flowchart of another federation chain-based identity authentication processing method provided in one or more embodiments of the present specification;
fig. 5 is a schematic diagram of an identity authentication processing apparatus according to one or more embodiments of the present disclosure;
fig. 6 is a schematic diagram of an identity authentication processing apparatus based on a federation chain according to one or more embodiments of the present specification;
fig. 7 is a schematic diagram of another identity authentication processing apparatus based on a federation chain according to one or more embodiments of the present specification;
fig. 8 is a schematic structural diagram of an identity authentication processing apparatus according to one or more embodiments of the present specification;
fig. 9 is a schematic structural diagram of an identity authentication processing apparatus based on a federation chain according to one or more embodiments of the present specification;
fig. 10 is a schematic structural diagram of another identity authentication processing device based on a federation chain according to one or more embodiments of the present specification.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in one or more embodiments of the present disclosure, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
An embodiment of an identity authentication processing method provided in this specification:
referring to fig. 1, which shows a processing flow chart of an identity authentication processing method provided in this embodiment, and referring to fig. 2, which shows a processing flow chart of an identity authentication processing method applied to a driver identity authentication scenario provided in this embodiment.
Referring to fig. 1, the identity authentication processing method provided in this embodiment specifically includes step S102 to step S110.
And step S102, acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel.
In practical application, when the taxi taking platform authenticates a driver, a single channel is adopted for driver authentication, such as manual auditing or machine auditing, and the requirements of large-scale driver authentication cannot be met due to high cost, low efficiency and single channel.
The identity authentication processing method provided by the embodiment improves the convenience of identity authentication of a driver by judging whether the driver identifier can perform identity authentication in a short time and utilizing a manual authentication auditing mode under the condition that the driver identifier cannot perform identity authentication in a short time, concretely, firstly, the driver identifier carried in an access request submitted by the driver to be authenticated through any access channel is obtained, then, whether the driver identifier is consistent with any authentication marking driver identifier in an authentication driver table synchronized with a third-party platform is inquired, if so, the driver identifier of the driver to be authenticated is authenticated and marked, if not, the manual authentication auditing is called for further authentication auditing, in the process of manual auditing, the manual authentication auditing can be performed only under the condition that the authentication auditing state is that the identity is not authenticated, therefore, firstly, the authentication auditing state of the driver to be authenticated is detected, when the inquired authentication state is that the identity is not authenticated, the driver identifier is created according to the identity related information submitted by the driver to be authenticated, and the driver identifier is verified and verified, and if the driver identifier exists in the condition that the driver identifier is not authenticated, the driver identifier is established, and the driver authentication auditing process, and the driver identifier is improved.
The identity authentication processing method provided by the embodiment is applied to identity authentication applications, and the identity authentication applications are loaded on third-party applications, such as applets in the third-party applications.
The access channel in this embodiment includes an access link channel, an application identification channel of the identity authentication application, or an access material channel. Specifically, the access link channel refers to an access channel through which an access link sent by a driver to be authenticated triggers the driver to be authenticated to enter the identity authentication application, the application identification channel of the identity authentication application refers to an access channel through which the driver to be authenticated triggers the application identification of the identity authentication application configured in the third-party application to enter the identity authentication application, and the access material channel refers to an access channel through which the access material configured under a scanning line of the driver to be authenticated enters the identity authentication application. In an optional implementation manner provided in this embodiment, the process of obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the access channel is also a process of obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the trigger access link, or obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the application identifier that triggers the identity authentication application, or obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the scan access material.
In specific implementation, in order to reduce the processes required to be executed in the identity authentication process and avoid resource consumption caused by authentication and verification of an authenticated driver, whether the driver identifier of the driver to be authenticated is authenticated and marked or not needs to be judged at first, if the driver identifier of the driver to be authenticated is authenticated and marked, an authentication and verification state prompt with authenticated identity is sent to a user terminal of the driver to be authenticated, an access home page of identity authentication application is displayed through the user terminal, and if the driver identifier is not authenticated and marked, whether the driver to be authenticated submits an identity information authorization instruction or not is judged. In an optional implementation manner provided by this embodiment, after the driver identifier is obtained, the following steps are performed:
judging whether the driver identification is marked by authentication;
if so, sending an authentication and verification state prompt with authenticated identity to the driver to be authenticated and displaying an access page of the identity authentication application;
if not, judging whether the driver to be authenticated submits an identity information authorization instruction or not; if yes, the following step S104 is executed, and whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform is inquired.
Further, in the process of dispatching an order for an authenticated driver with authenticated identity, in order to improve the confidence of the passenger and protect the safety of the passenger, the driver identity information of the order accepting driver needs to be displayed for the passenger, therefore, the driver identity information of the authenticated driver needs to be read first, but the driver identity information belongs to the privacy of the authenticated driver, in order to ensure the safety of the privacy data of the authenticated driver, the privacy data is prevented from being leaked, and the authorization of the authenticated driver needs to be obtained before the driver identity information is read, in an optional implementation manner provided by this embodiment, if the driver to be authenticated does not submit an identity information authorization instruction through judgment, the following steps are executed:
sending an identity information authorization protocol to a user terminal of the driver to be authenticated and displaying an authorization reminding page carrying the identity information authorization protocol through the user terminal;
acquiring an identity information authorization instruction submitted by the driver to be authenticated through the authorization reminding page;
and signing the identity information authorization protocol based on the identity information authorization instruction, and executing the following step S104 to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform.
For example, a driver to be authenticated accesses an identity authentication application by triggering an access link of the identity authentication application, obtains a driver identifier carried in an access request submitted by the driver to be authenticated, inquires that the driver identifier is not authenticated and marked, judges whether the driver to be authenticated submits an identity information authorization instruction, if not, sends an identity information authorization protocol to a user terminal of the driver to be authenticated, and the user terminal displays an authorization reminding page carrying the identity information authorization protocol; and receiving an identity information authorization instruction submitted by the user terminal under the condition that the driver to be authenticated submits the authorization instruction, and writing the driver identifier of the driver to be authenticated into an identity information authorization protocol.
And step S104, inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform.
The third party platform comprises a third party order dispatching platform and/or a third party authentication platform. And the authentication driver mark passing the authentication and verification of the third-party platform is recorded in the authentication driver table.
In specific implementation, due to the fact that the plurality of third-party platforms exist, in order to improve query efficiency and prevent repeated query of one authentication driver list, priority ranking is carried out on the authentication driver lists synchronized by the plurality of third-party platforms, and sequential query is carried out according to the ranked sequence. In an optional implementation manner provided by this embodiment, querying whether there is an authentication marking driver identifier matching with the driver identifier is implemented in the following manner:
performing priority ordering on at least one authentication driver table synchronized by a third-party platform;
and sequentially inquiring whether the driver identification is consistent with any authentication marking driver identification in any authentication driver table according to the priority sequence.
Specifically, the authentication driver table synchronized by at least one third-party platform is subjected to priority sorting according to a preset priority sorting rule, and inquiry is sequentially performed according to the sequence of the sorted authentication driver tables.
For example, an authentication driver table with an A dispatching platform, a B dispatching platform and an authentication platform in synchronization is stored, priority ranking is carried out according to the number of authentication marking driver identifications in each authentication driver table, the authentication marking driver identification recorded in the authentication driver table with the A dispatching platform in synchronization is the most, the authentication platform is the next to the last, and the B dispatching platform is the least, so that whether the authentication marking driver identification consistent with the driver identification of the driver to be authenticated exists in the authentication driver table with the A dispatching platform in synchronization is firstly inquired, if not, whether the authentication marking driver identification consistent with the driver identification of the driver to be authenticated exists in the authentication driver table with the authentication platform in synchronization is inquired, and if not, whether the authentication marking driver identification consistent with the driver identification of the driver to be authenticated exists in the authentication driver table with the B dispatching platform in synchronization is inquired.
In specific implementation, if the driver identifier of the driver to be authenticated is consistent with any authentication marking driver identifier in any authentication driver table, it indicates that the driver to be authenticated has passed the identity authentication on the third-party platform to which the authentication driver table belongs, and then authentication and verification do not need to be performed again, so in an optional implementation manner provided by this embodiment, if it is found that the authentication marking driver identifier matching with the driver identifier exists in the authentication driver table synchronized with the third-party platform, the following steps are performed:
updating the authentication and verification state of the driver to be authenticated into the authenticated state in a driver information table;
judging whether the driver to be authenticated submits an opening instruction for a cash register service;
if not, carrying out authentication marking on the driver identifier under the condition that the authenticated driver submits the opening instruction.
Specifically, after the driver identification consistent with the driver identification is found, the authentication and verification state of the driver to be authenticated in the driver information table is updated to be authenticated; the driver identity authentication is carried out to ensure that passengers can pay by scanning and authenticating a cash register of the driver and check the identity information of the driver after the journey is finished, so that after the authentication and verification state of the driver to be authenticated in a driver information table is updated to be authenticated, the driver identification can be authenticated and marked only after the driver to be authenticated opens the cash register service. Wherein, the driver information table records information of all drivers accessing the identity authentication application, including: the driver identification and/or the identity authentication state, and the specific content recorded in the driver information table are determined according to the driver information required in the practical application, which is not limited herein.
According to the method, the authentication marking driver identification which is consistent with the driver identification of the driver to be authenticated is inquired in an authentication driver table of the driver to be authenticated and the authentication platform, the authentication and verification state of the driver to be authenticated in a driver information table is updated from the state of non-authentication to the state of authenticated, whether the driver to be authenticated opens a cash register service is judged, if yes, the driver identification of the driver to be authenticated is authenticated and marked, if not, a cash register opening prompt is sent to a user terminal of the driver to be authenticated, an opening instruction which is submitted by the user terminal and is used for the same cash register service is obtained, and the cash register service of the driver to be authenticated is opened and the driver identification is authenticated and marked based on the opening instruction.
In specific implementation, if the driver identification of the authentication marking consistent with the driver identification of the driver to be authenticated is not inquired in the authentication driver table synchronized with the third-party platform, further manual authentication and verification are required to be performed on the driver to be authenticated, and the driver to be authenticated is subjected to authentication marking under the condition that the manual authentication and verification are passed. Specifically, if the execution result after the step of inquiring whether the driver identification matched with the driver identification exists in the authentication driver table synchronized with the third-party platform is executed is not present, step S106 is executed to detect the authentication and verification state of the driver to be authenticated.
Specifically, the authentication and verification state includes that the identity is not authenticated and the identity is authenticated in the identity authentication. In a specific implementation, for a driver to be authenticated whose authentication and verification state is identity authentication or identity authentication, no further manual authentication and verification can be performed on the driver to be authenticated, in an optional implementation manner provided in this embodiment, if the detected authentication and verification state is identity authentication, an authentication and verification state prompt in identity authentication is sent to the driver to be authenticated; if the detected authentication and verification state is that the identity is authenticated, sending an authentication and verification state prompt with the authenticated identity to the driver to be authenticated and displaying an access page of the identity authentication application; if the inquired authentication and verification state is that the identity is not authenticated, the following step S108 is executed to obtain the identity related information submitted by the driver to be authenticated and create an authentication and verification work order.
And step S106, detecting the authentication and verification state of the driver to be authenticated.
The authentication and verification states comprise identity authentication, identity non-authentication, identity authentication and identity authentication failure. In a specific implementation, for a driver to be authenticated whose authentication and verification state is identity authentication or identity authentication, no further manual authentication and verification can be performed on the driver to be authenticated, in an optional implementation manner provided in this embodiment, if the detected authentication and verification state is identity authentication, an authentication and verification state prompt in identity authentication is sent to the driver to be authenticated; if the detected authentication and audit state is that the identity is authenticated, sending an authentication and audit state prompt with the authenticated identity to the driver to be authenticated and displaying an access page of the identity authentication application; if the inquired authentication and verification state is that the identity is not authenticated, executing the following step S108, acquiring identity related information submitted by the driver to be authenticated and creating an authentication and verification work order; if the inquired authentication and verification state is the identity authentication failure, the following step S108 is executed to obtain the identity related information submitted by the driver to be authenticated and establish an authentication and verification work order.
For example, when the authentication and audit state of the driver to be authenticated is detected to be in identity authentication, an authentication and audit state prompt in the identity authentication is sent to a user terminal of the driver to be authenticated, the user terminal receives the authentication and audit state prompt, shows that information carrying a text prompt is in audit, and asks for patience waiting, and predicts that the audit is finished before a xxx point of x month, and a page of an information viewing control, wherein the time can extend for 48 hours according to the time for submitting the audit. After triggering the information viewing control, the driver to be authenticated jumps to an information submission page of the driver to be authenticated, the photo controls in the page are unavailable, photo information when the user submits is displayed, the submission control cannot be clicked, the return control can be clicked, and a prompt in identity authentication is rendered.
For another example, when the authentication and verification state of the driver to be authenticated is detected to be identity authentication failure, an authentication failure state prompt of the identity authentication failure is sent to a user terminal of the driver to be authenticated, the user terminal receives the authentication failure state prompt, displays the verification failure of the information carrying character prompt, and submits the information again after checking the information, wherein the failure reason is xxxx and the page of the re-authentication control, and the verification failure feedback is read and displayed in the verification result of the auditor. After triggering the re-authentication control, the driver to be authenticated jumps to an information submission page of the driver to be authenticated, the photo controls in the page are all available, photo information submitted by the user is displayed, and the submission control and the return control can be clicked. It should be noted that, for a driver to be authenticated whose authentication check state is an identity authentication failure, processing may be performed in a processing manner in which the authentication check state is an identity unauthenticated state.
For another example, if the authentication and audit state of the driver to be authenticated is detected to be identity unauthenticated, an authentication and audit state prompt with the unauthenticated identity is sent to a user terminal of the driver to be authenticated, the user terminal receives the authentication and audit state prompt and displays a page carrying a character prompt that information is not audited and information needs to be submitted for auditing and an authentication control, after the authentication control is triggered, the driver to be authenticated jumps to an information submission page, photo controls in the page are all available and have no default value, and the submission control and the return control can be clicked.
And step S108, obtaining the identity related information submitted by the driver to be authenticated and creating an authentication and audit work order.
The identity-related information comprises driver information and/or associated information; wherein the driver information includes: driver name and/or driver identity credential identification; the associated information includes: city, vehicle identification, driver's professional credentials picture, and/or vehicle picture.
In specific implementation, in order to reduce the content input by the driver to be authenticated, improve the authentication experience of the driver to be authenticated, and improve the authentication efficiency, in an optional implementation manner provided in this embodiment, the processes of obtaining the identity-related information submitted by the driver to be authenticated and creating the authentication audit work order are specifically implemented in the following manner:
judging whether the driver to be authenticated is a real-name authenticated driver;
if so, reading the driver information of the driver to be authenticated, and desensitizing the driver information; desensitizing acquired desensitizing driver information is sent to a user terminal of the driver to be authenticated and displayed through an application page; acquiring the associated information submitted by the driver to be authenticated through the application page; creating the authentication and audit work order based on the driver information and the associated information;
if not, sending a real-name authentication prompt to the driver to be authenticated;
after the driver to be authenticated passes the real-name authentication, reading the driver information of the driver to be authenticated, and carrying out desensitization processing on the driver information;
desensitizing acquired desensitizing driver information is sent to a user terminal of the driver to be authenticated and displayed through an application page;
acquiring the associated information submitted by the driver to be authenticated through the application page;
creating the authentication and audit work order based on the driver information and the associated information;
wherein the identity-related information is composed of the driver information and the associated information.
For example, when the authentication and verification state of the driver to be authenticated is identity non-authentication, whether the driver to be authenticated is a real-name authenticated driver is judged, if so, the name and identity certificate identification of the driver to be authenticated are read, desensitization processing is carried out on the name and identity certificate identification, the desensitized name and identity certificate identification are sent to the driver to be authenticated, a city, a vehicle identification, a driver working qualification certificate photo and a vehicle photo submitted by an information submission page displayed by the driver to be authenticated through a user terminal are obtained, and an authentication and verification work order is created according to the name, the identity certificate identification, the city, the vehicle identification, the driver working qualification certificate photo and the vehicle photo of the driver to be authenticated.
It should be noted that, the management modes of each city for the authenticated drivers are different, and the associated information that needs to be submitted by the driver to be authenticated can be adjusted according to the specifically selected city, which is not limited herein in this embodiment.
In order to ensure the safety and reliability of the associated information submitted by the driver to be authenticated, the driver only supports photo-taking submission and does not support selective submission from the photo album for the qualification photo, in order to improve the perception degree of the driver to be authenticated, the example pattern can be displayed to the driver to be authenticated, the vehicle photo also only supports photo-taking submission and does not support selective submission from the photo album, and meanwhile, the example pattern can also be displayed to the driver to be authenticated.
In addition, in order to further control the information security of the driver to be authenticated, credit identification needs to be performed when the identity-related information submitted by the driver to be authenticated is acquired, and an authentication and audit work order is created when the credit identification is passed. In an optional implementation manner provided by this embodiment, in the process of acquiring the identity-related information submitted by the driver to be authenticated and creating an authentication audit work order, the identity-related information submitted by the driver to be authenticated is first acquired; then inputting the identity-related information into a credit recognition system; if the credit identification is passed, establishing the authentication and audit work order based on the identity related information; and if the credit identification is not passed, sending an information exception prompt to the driver to be authenticated, and acquiring identity related information resubmitted by the driver to be authenticated.
It should be noted that after the authentication and audit work order is created, the authentication and audit worker is sent to the auditor; and (4) performing authentication and verification by an auditor, specifically, auditing whether information on the qualification certificate picture and the vehicle picture used by the driver is clear and visible by the auditor, judging whether the qualification certificate picture and the vehicle picture used by the driver have a counterfeit trace according to experience, and judging whether the qualification certificate picture and the vehicle picture used by the driver are real photographed objects. In addition, the auditor needs to audit whether the name and the identification of the driver from the certificate photo are consistent with the read name and identification of the certificate, and whether the information of the driver from the certificate photo and the vehicle photo is wrong or not. Obtaining an auditing result submitted by an auditor aiming at the authentication auditing work order after the auditor audits; and the verification result comprises that the verification is passed and the verification is failed, and the following step S110 is executed under the condition that the verification is passed, and the driver identification is authenticated and marked after the verification of the authentication and verification work order is passed. Reading feedback data of audit failure under the condition that audit is not passed; and sending an information exception prompt to the driver to be authenticated based on the audit failure feedback data, executing the step S108, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication audit work order. In order to further improve the perception degree of the driver to be authenticated on the audit result, the audit result needs to be sent to the driver to be authenticated in a message pushing mode in the application after the audit result is obtained.
And S110, after the verification of the verification work order is passed, performing verification marking on the driver identifier.
In an optional implementation manner provided by this embodiment, in the process of performing authentication marking on a driver identifier, an audit result reminder that the driver to be authenticated passes the audit is sent to the driver to be authenticated; and then marking the driver identification based on the identity authentication label, and confirming the driver to be authenticated as an authenticated driver after marking.
In addition, the identity authentication of the driver is carried out in order to ensure that passengers can pay by scanning a cash register of the authenticated driver and check the identity information of the driver after the journey is finished, so that whether the driver to be authenticated submits an opening instruction for the cash register service is judged after the driver to be authenticated passes the audit and updates the authentication audit state of the driver to be authenticated in a driver information table into the authenticated identity; if not, carrying out authentication marking on the driver identifier under the condition that the authenticated driver submits the opening instruction.
It should be noted that, in order to improve the authentication rate of the driver, the participation degree of the driver to be authenticated is improved by issuing an authentication reward to the driver to be authenticated, and specifically, after the driver identifier is authenticated and marked, the driver to be authenticated is confirmed as the authenticated driver; in an optional implementation manner provided by this embodiment, after performing authentication marking on a driver identifier, determining an authentication reward of the authenticated driver according to a rights and interests algorithm corresponding to the access channel; issuing the certification reward to the certified driver.
The identity authentication processing method provided in this embodiment is further described below by taking an application of the identity authentication processing method provided in this embodiment to a driver identity authentication scenario as an example, referring to fig. 2, the identity authentication processing method applied to the driver identity authentication scenario specifically includes steps S202 to S222.
Step S202, a driver identifier carried in an access request aiming at the identity authentication application submitted by a driver to be authenticated is obtained.
Step S204, judging whether the driver mark is marked by authentication;
if yes, go to step S206;
if not, go to step S208.
And step S206, sending an authentication and audit state prompt to the driver to be authenticated and returning to an access page of the identity authentication application.
Step S208, judging whether the driver to be authenticated submits an identity information authorization instruction or not;
if not, executing step S210 to step S212;
if yes, go to step S212.
And step S210, acquiring an identity information authorization instruction submitted by the driver to be authenticated.
Step S212, inquiring whether an authentication driver mark matched with the driver mark exists in an authentication driver table synchronized with the dispatching platform;
if yes, the driver identification is identified and marked, and step S206 is executed;
if not, go to step S214.
Step S214, detecting the authentication and verification state of the driver to be authenticated;
if the authentication and verification status is that the identity is authenticated, step S206 is executed;
if the authentication and verification status is that the identity is not authenticated, step S216 to step S218 are executed;
if the authentication verification status is authentication, step S218 is executed.
Step S216, obtaining the identity related information submitted by the driver to be authenticated, and creating an authentication and audit work order according to the identity related information.
Step S218, detecting whether the checking result of the authentication checking work order is passed;
if yes, a prompt that the verification is passed is sent to the driver to be authenticated, and step S220 is executed;
if not, go to step S222.
And step S220, marking the driver identification, and confirming the driver to be authenticated as the authenticated driver.
And step S222, reading the feedback result of the verification failure, and sending a prompt of the verification failure to the driver to be authenticated based on the feedback result of the verification.
In summary, in the identity authentication processing method provided in this embodiment, a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel is first obtained, then, whether an authentication marking driver identifier matching with the driver identifier exists in an authentication driver table synchronized with a third-party platform is queried, if not, an authentication verification state of the driver to be authenticated is detected, if the authentication verification state is unauthenticated, identity-related information submitted by the driver to be authenticated is obtained, an authentication verification work order is created according to the identity-related information, and finally, the driver identifier is marked and authenticated under the condition that the authentication of the authentication verification work order is passed, so that the efficiency of performing identity authentication on the driver to be authenticated is improved.
The embodiment of the identity authentication processing method based on the alliance chain provided by the specification comprises the following steps:
referring to fig. 3, it shows a flowchart of a processing method for identity authentication based on federation chain according to this embodiment.
The identity authentication processing method based on the federation chain provided by the embodiment is applied to federation chain nodes corresponding to authentication servers in the federation chain; the method specifically includes steps S302 to S308.
Step S302, receiving an identity authentication request which is sent by the authentication server and carries the driver identifier of the driver to be authenticated.
In this embodiment, after receiving the identity authentication request, the alliance link node performs authentication and verification on the driver to be authenticated, performs authentication and marking on the driver identifier of the driver to be authenticated under the condition that the driver is approved, and confirms the driver to be authenticated as the authenticated driver.
And S304, calling the intelligent contract deployed by the alliance chain node to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain.
In this embodiment, the authentication server table stored in the federation chain is uploaded by the federation link point corresponding to the third-party platform, and meanwhile, may also be uploaded by the federation link point corresponding to the authentication server. The third party platform comprises a third party order dispatching platform and/or a third party authentication platform. And the authentication driver mark passing the authentication and verification of the third-party platform is recorded in the authentication driver table.
In specific implementation, because a plurality of third-party platforms exist, namely a plurality of alliance link nodes exist, in order to improve query efficiency and prevent repeated query of an authenticated driver list, priority ranking is performed on the authenticated driver lists with synchronous alliance link points corresponding to the plurality of third-party platforms, and the authenticated driver lists are sequentially queried according to the ranked order. In an optional implementation manner provided by this embodiment, querying whether there is an authentication marking driver identifier matching with the driver identifier is implemented in the following manner:
performing priority sequencing on the authentication driver tables synchronized with the alliance link nodes corresponding to at least one third-party platform;
and sequentially inquiring whether the driver identification is consistent with any authentication marking driver identification in any authentication driver table according to the priority sequence.
Specifically, if the driver identification matched with the driver identification is found in the authentication driver table stored in the alliance chain, the driver identification is authenticated and marked, and the uplink storage is carried out. It should be noted that, in the process of performing uplink storage, the driver identifier subjected to the certification marking may be uplink stored, or the certification driver table may be updated according to the driver identifier subjected to the certification marking, and the updated new certification driver table is uplink stored.
In the specific implementation, in order to reduce the flow required to be executed in the identity authentication process and avoid resource consumption caused by authentication and verification of an authenticated driver, after an identity authentication request is received, it is required to firstly judge whether the driver identifier of the driver to be authenticated is authenticated and marked, if the driver identifier is authenticated and marked, an authentication and verification state with authenticated identity is sent to an authentication server, so that the authentication server sends an authentication and verification state prompt with authenticated identity to a user terminal of the driver to be authenticated and displays an access home page of an identity authentication application through the user terminal, and if the driver identifier is not authenticated and marked, it is judged whether the driver to be authenticated submits an identity information authorization instruction.
In an optional implementation manner provided by this embodiment, after receiving an identity authentication request and before querying whether a matched authentication marking driver identifier exists, invoking an intelligent contract to query whether the driver identifier has an authentication identifier in a alliance chain, so as to determine whether the driver identifier is marked, and if so, issuing an authentication and verification state prompt with authenticated identity to an authentication server, so that the authentication server sends the authentication and verification state prompt with authenticated identity to the driver to be authenticated and displays an access page of an identity authentication application; if not, judging whether the driver to be authenticated submits an identity information authorization instruction or not; if yes, inquiring whether a matched authentication marking driver mark exists; if not, an authorization prompt is sent to an authentication server, an identity information authorization instruction which is acquired and uploaded by the authentication server and submitted by the driver to be authenticated through the authorization prompt page is received, the identity information authorization protocol is signed based on the identity information authorization instruction, and whether a matched authentication marking driver identifier exists is inquired.
When the authentication method is implemented specifically, if the driver identifier of the driver to be authenticated is consistent with any authentication marking driver identifier in any authentication driver table, the driver to be authenticated is indicated to pass identity authentication on a third-party platform to which the authentication driver table belongs, authentication and verification are not required to be carried out again, the authentication and verification state of the driver to be authenticated in the driver information table on the chain of the alliance chain nodes corresponding to the authentication server is updated to be authenticated, an intelligent contract is called to judge whether the driver to be authenticated submits an opening instruction for the cash register service, if yes, the driver identifier of the driver to be authenticated is subjected to authentication marking, and if not, the driver identifier is subjected to authentication marking under the condition that the opening instruction submitted by the driver to be authenticated, which is acquired and sent by the authentication server, is detected. Wherein, the driver information table records information of all drivers accessing the identity authentication application, including: the driver identification and/or the identity authentication state, and the specific content recorded in the driver information table are determined according to the driver information required in the practical application, which is not limited herein.
If the driver identification which is consistent with the driver identification of the driver to be authenticated is not inquired, further manual authentication and verification are required to be carried out on the driver to be authenticated, and the driver to be authenticated is authenticated and marked under the condition that the manual authentication and verification are passed. If the driver identification matched with the driver identification does not exist in the authentication driver table, executing step S306, detecting the authentication and verification state of the driver to be authenticated, and if the detected authentication and verification state is that the identity is not authenticated, sending the detected authentication and verification state to the authentication server.
Step S306, detecting the authentication and audit state of the driver to be authenticated, and if the detected authentication and audit state is that the identity is not authenticated, sending the detected authentication and audit state to the authentication server.
And the authentication and verification state comprises that the identity is not authenticated and the identity is authenticated in the identity authentication.
In specific implementation, the driver to be authenticated in the authentication and verification state of authenticated or identity authentication cannot be further manually authenticated and verified, so that when the authentication and verification state is detected to be the state of unauthenticated identity, the authentication and verification state of unauthenticated identity is sent to the authentication server. In addition, if the detected authentication and verification state is in identity authentication, an authentication and verification state prompt in the identity authentication is sent to the authentication server; and if the detected authentication and verification state is that the identity is authenticated, sending an authentication and verification state prompt with the authenticated identity to the authentication server.
And after receiving the authentication and verification state of which the identity is not authenticated, the authentication server acquires the identity related information submitted by the driver to be authenticated and creates an authentication and verification work order.
The identity-related information comprises driver information and/or associated information; wherein the driver information includes: driver name and/or driver identity credential identification; the associated information includes: city, vehicle identification, driver's professional credentials picture, and/or vehicle picture.
After the authentication and audit work order is created, the authentication and audit worker is sent to an auditor; and (4) performing authentication and verification by an auditor, executing the following step S308 under the condition that the audit is passed, and calling the intelligent contract to perform authentication marking on the driver identifier after the authentication server creates an authentication and verification work order and confirms that the audit is passed.
And step S308, after the authentication server creates an authentication and verification work order and confirms that the authentication is passed, calling the intelligent contract to authenticate and mark the driver identifier.
In the process of identifying and marking the driver identification, the driver identification is marked based on the identity identification label, and the driver to be identified is confirmed as an identified driver after marking.
In an optional implementation manner provided by this embodiment, in the process of performing authentication marking on a driver identifier, an audit result reminder that the driver to be authenticated passes the audit is sent to the driver to be authenticated; and then marking the driver identification based on the identity authentication label, and confirming the driver to be authenticated as an authenticated driver after marking.
In addition, the identity authentication of the driver is carried out in order to ensure that passengers can pay by scanning a cash register of the authenticated driver and check the identity information of the driver after the journey is finished, so that whether the driver to be authenticated submits an opening instruction for the cash register service is judged after the driver to be authenticated passes the audit and updates the authentication audit state of the driver to be authenticated in a driver information table into the authenticated identity; if not, carrying out authentication marking on the driver identifier under the condition that the authenticated driver submits the opening instruction.
In specific implementation, in order to improve the identity authentication rate of a driver, the participation degree of the driver to be authenticated is improved by issuing authentication rewards to the driver to be authenticated, and specifically, the driver to be authenticated is confirmed as an authenticated driver after the driver identification is authenticated and marked; in an optional implementation manner provided by this embodiment, the identity authentication request further carries an access channel identifier of the driver to be authenticated, and the intelligent contract performs chain loading and certificate storing on the access channel identifier of the driver to be authenticated; after the driver to be authenticated is confirmed to be an authenticated driver, inquiring an access channel identifier of the driver to be authenticated in the alliance chain, and determining an access channel corresponding to the access channel identifier; and determining the authentication reward of the authenticated driver according to the equity algorithm corresponding to the access channel and issuing the authentication reward to the authentication server so that the authentication server issues the authentication reward to the authenticated driver.
The access channel in this embodiment includes an access link channel, an application identification channel of the identity authentication application, or an access material channel. Specifically, the access link channel refers to an access channel through which an access link sent by a driver to be authenticated triggers the driver to be authenticated to enter the identity authentication application, the application identification channel of the identity authentication application refers to an access channel through which the driver to be authenticated triggers the application identification of the identity authentication application configured in the third-party application to enter the identity authentication application, and the access material channel refers to an access channel through which the access material configured under a scanning line of the driver to be authenticated enters the identity authentication application.
Another embodiment of an identity authentication processing method based on a federation chain is provided in this specification:
referring to fig. 4, it shows a processing flow chart of an identity authentication processing method based on a federation chain according to the present embodiment.
The identity authentication processing method based on the federation chain provided by the embodiment is applied to an authentication server; the method specifically includes step S402 to step S406.
In the identity authentication processing method based on a federation chain applied to an authentication server provided in this embodiment, the execution process is matched with the identity authentication processing method based on a federation chain applied to a federation chain node corresponding to an authentication server in a federation chain, so that, in the process of reading the identity authentication processing method based on a federation chain provided in this embodiment, please combine the above embodiment of the identity authentication processing method based on a federation chain applied to a federation chain node corresponding to an authentication server in a federation chain.
Step S402, obtaining a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node.
The access channel in this embodiment includes an access link channel, an application identification channel of the identity authentication application, or an access material channel. Specifically, the access link channel refers to an access channel through which an access link sent by a driver to be authenticated triggers the driver to be authenticated to enter the identity authentication application, the application identification channel of the identity authentication application refers to an access channel through which the driver to be authenticated triggers the application identification of the identity authentication application configured in the third-party application to enter the identity authentication application, and the access material channel refers to an access channel through which the access material configured under a scanning line of the driver to be authenticated enters the identity authentication application. In an optional implementation manner provided in this embodiment, the process of obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the access channel is also a process of obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the trigger access link, or obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the application identifier that triggers the identity authentication application, or obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the scan access material.
The identity authentication request in this embodiment includes authenticating and checking a driver to be authenticated, authenticating and marking a driver identifier of the driver to be authenticated under the condition that the driver to be authenticated passes the authentication, and confirming the driver to be authenticated as an authenticated driver.
In specific implementation, after the driver identifier is obtained, an identity authentication request is generated according to the access channel and the driver identifier and is sent to the corresponding alliance link node.
And S404, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication and audit work order.
The authentication and verification states comprise identity authentication, identity non-authentication, identity authentication and identity authentication failure. When the method is implemented specifically, the driver to be authenticated with the authentication and verification state of authenticated or identity authentication cannot be subjected to further manual authentication and verification, and if the detected authentication and verification state is identity authentication, an authentication and verification state prompt in the identity authentication is sent to the driver to be authenticated; if the detected authentication and audit state is that the identity is authenticated, sending an authentication and audit state prompt with the authenticated identity to the driver to be authenticated and displaying an access page of the identity authentication application; and if the detected authentication and verification state is that the identity is not authenticated, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication and verification work order. The identity-related information comprises driver information and/or associated information; wherein the driver information includes: driver name and/or driver identity credential identification; the associated information includes: city, vehicle identification, driver's professional credentials picture, and/or vehicle picture.
In a specific implementation, in order to reduce content input by a driver to be authenticated, improve authentication experience of the driver to be authenticated, and improve authentication efficiency, in an optional implementation manner provided in this embodiment, a process of acquiring identity-related information submitted by the driver to be authenticated and creating an authentication audit work order is specifically implemented in the following manner:
judging whether the driver to be authenticated is a real-name authenticated driver;
if so, reading the driver information of the driver to be authenticated, and desensitizing the driver information; sending desensitization driver information obtained by desensitization to a user terminal of the driver to be authenticated, and displaying the desensitization driver information through an application page; acquiring the associated information submitted by the driver to be authenticated through the application page; creating the authentication and audit work order based on the driver information and the associated information;
if not, sending a real-name authentication prompt to the driver to be authenticated;
after the real-name authentication of the driver to be authenticated is passed, reading the driver information of the driver to be authenticated, and desensitizing the driver information;
sending desensitization driver information obtained by desensitization to a user terminal of the driver to be authenticated, and displaying the desensitization driver information through an application page;
acquiring the associated information submitted by the driver to be authenticated through the application page;
creating the authentication and audit work order based on the driver information and the associated information;
wherein the identity-related information is composed of the driver information and the associated information.
It should be noted that, the management modes of the driver to be authenticated are different for each city, and the associated information that needs to be submitted by the driver to be authenticated can be adjusted according to the specifically selected city, which is not limited herein in this embodiment.
In specific implementation, in order to ensure the safety and reliability of the associated information submitted by the driver to be authenticated, the driver only supports photo submission and does not support selective submission from the photo album for the qualified photo, in order to improve the perception degree of the driver to be authenticated, the example style can be displayed to the driver to be authenticated, and the vehicle photo also only supports photo submission and does not support selective submission from the photo album, and simultaneously, the example style can be displayed to the driver to be authenticated.
In addition, in order to further control the information security of the driver to be authenticated, credit identification needs to be performed when the identity-related information submitted by the driver to be authenticated is acquired, and an authentication audit work order is created when the credit identification is passed. In the process of acquiring the identity related information submitted by the driver to be authenticated and creating an authentication and audit work order, firstly acquiring the identity related information submitted by the driver to be authenticated; then inputting the identity-related information into a credit recognition system; if the credit identification is passed, establishing the authentication and audit work order based on the identity related information; and if the credit identification is not passed, sending an information exception prompt to the driver to be authenticated, and acquiring identity related information resubmitted by the driver to be authenticated.
It should be noted that after the certification audit work order is created, the certification audit worker is sent to the auditor; and (4) carrying out authentication and verification by an auditor, specifically, auditing whether the information on the qualification certificate photo and the vehicle photo taken by the driver is clear and visible by the auditor, judging whether the qualification certificate photo and the vehicle photo taken by the driver have forged traces according to experience, and judging whether the qualification certificate photo and the vehicle photo taken by the driver are real photo objects. In addition, the auditor needs to audit whether the name and the identification of the driver from the certificate photo are consistent with the read name and identification of the certificate, and whether the information of the driver from the certificate photo and the vehicle photo is wrong or not. After the auditors audit, acquiring audit results submitted by the auditors aiming at the authentication audit work order and sending the audit results to the corresponding alliance link nodes; and the auditing result comprises auditing pass and auditing failure, and the following step S406 is executed under the condition of auditing pass, and the auditing result is sent to the coalition link nodes after the auditing of the authentication auditing worksheet is passed. Reading feedback data of audit failure under the condition that audit is not passed; and sending an information exception prompt to the driver to be authenticated based on the audit failure feedback data, executing the step S404, acquiring the identity related information submitted by the driver to be authenticated and creating an authentication audit work order. In order to further improve the perception degree of the driver to be authenticated on the audit result, the audit result needs to be sent to the driver to be authenticated in a message pushing mode in the application after the audit result is obtained.
And step S406, sending a checking result to the coalition link nodes after the verification of the authentication checking work order is passed.
And after the audit result that the audit of the auditor is passed is obtained, the audit result that the audit is passed is sent to the alliance chain node, so that the alliance chain node can carry out authentication marking on the driver identifier and can carry out chain link storage. In order to further improve the perception degree of the driver to be authenticated on the audit result, the audit result needs to be sent to the driver to be authenticated in a message pushing mode in the application after the audit result is obtained.
In addition, reading feedback data of audit failure under the condition that audit is not passed; and sending an information exception prompt to the driver to be authenticated based on the audit failure feedback data, and sending the audit result of the audit failure and the audit failure feedback data to the corresponding alliance chain node so as to store the alliance chain node.
And when receiving the authentication reward issued by the alliance link node, issuing the authentication reward to an authentication driver.
An embodiment of an identity authentication processing apparatus provided in this specification is as follows:
in the above embodiment, an identity authentication processing method is provided, and correspondingly, an identity authentication processing apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 5, a schematic diagram of an identity authentication processing apparatus provided in this embodiment is shown.
Since the apparatus embodiments correspond to the method embodiments, the description is relatively simple, and reference may be made to the corresponding description of the method embodiments provided above for relevant portions. The device embodiments described below are merely illustrative.
The present embodiment provides an identity authentication processing apparatus, including:
the obtaining module 502 is configured to obtain a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel;
a query module 504 configured to query whether an authentication driver identifier matching the driver identifier exists in an authentication driver table synchronized with a third party platform;
if not, running a detection module 506, wherein the detection module 506 is configured to detect an authentication and verification status of the driver to be authenticated;
if the detected authentication and verification state is that the identity is not authenticated, operating a creation module 508, wherein the creation module 508 is configured to obtain identity-related information submitted by the driver to be authenticated and create an authentication and verification work order;
and the marking module 510 is configured to perform certification marking on the driver identifier after the certification and audit work order is approved.
The embodiments of an identity authentication processing apparatus based on a federation chain provided in this specification are as follows:
in the foregoing embodiment, an identity authentication processing method based on a federation chain is provided, which is applied to a federation chain node corresponding to an authentication server in the federation chain, and correspondingly, an identity authentication processing apparatus based on a federation chain is provided, which operates on a federation chain node corresponding to an authentication server in the federation chain, and the following description is provided with reference to the accompanying drawings.
Referring to fig. 6, a schematic diagram of an identity authentication processing apparatus based on a federation chain according to the present embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity authentication processing apparatus based on a federation chain, including:
a request receiving module 602 configured to receive an identity authentication request carrying a driver identifier of a driver to be authenticated, sent by the authentication server;
an identity query module 604 configured to invoke an intelligent contract for deployment of the alliance link points to query whether an authentication brander driver identity matching the driver identity exists in an authentication driver table stored in the alliance link;
if the driver authentication verification state does not exist, a state detection module 606 is operated, the state detection module 606 is configured to detect the authentication verification state of the driver to be authenticated, and if the detected authentication verification state is that the identity is not authenticated, the detected authentication verification state is sent to the authentication server;
and the authentication marking module 608 is configured to call the intelligent contract to perform authentication marking on the driver identifier after the authentication server creates an authentication and verification work order and confirms that the verification is passed.
Another embodiment of an identity authentication processing apparatus based on a federation chain provided in this specification is as follows:
in the above embodiment, an identity authentication processing method based on a federation chain is provided, which is applied to an authentication server, and correspondingly, an identity authentication processing apparatus based on a federation chain is provided, which operates in the authentication server, and is described below with reference to the accompanying drawings.
Referring to fig. 7, a schematic diagram of an identity authentication processing apparatus based on a federation chain according to the present embodiment is shown.
Since the device embodiments correspond to the method embodiments, the description is relatively simple, and the relevant portions may refer to the corresponding description of the method embodiments provided above. The device embodiments described below are merely illustrative.
The embodiment provides an identity authentication processing apparatus based on a federation chain, including:
the request sending module 702 is configured to obtain a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and send an identity authentication request carrying the driver identifier to a corresponding alliance link node;
if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, operating a work order creating module 704, wherein the work order creating module 704 is configured to obtain identity related information submitted by the driver to be authenticated and create an authentication and verification work order;
and the result sending module 706 is configured to send a review result to the federation chain node after the certification review worksheet passes the review.
An embodiment of an identity authentication processing apparatus provided in this specification is as follows:
on the basis of the same technical concept, corresponding to the identity authentication processing method described above, one or more embodiments of the present specification further provide an identity authentication processing device, where the identity authentication processing device is configured to execute the identity authentication processing method provided above, and fig. 8 is a schematic structural diagram of an identity authentication processing device provided in one or more embodiments of the present specification.
An identity authentication processing apparatus provided in this embodiment includes:
as shown in fig. 8, the identity authentication processing device may have a relatively large difference due to different configurations or performances, and may include one or more processors 801 and a memory 802, where one or more stored applications or data may be stored in the memory 802. Wherein the memory 802 may be a transient storage or a persistent storage. The application program stored in memory 802 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in an identity authentication processing device. Still further, the processor 801 may be configured to communicate with the memory 802 to execute a series of computer-executable instructions in the memory 802 on the identity authentication processing device. The identity authentication processing apparatus may also include one or more power supplies 803, one or more wired or wireless network interfaces 804, one or more input/output interfaces 805, one or more keyboards 806, and the like.
In one particular embodiment, an authentication processing apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the authentication processing apparatus, and the one or more programs configured to be executed by the one or more processors include computer-executable instructions for:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel;
inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform;
if the driver to be authenticated does not exist, detecting the authentication and verification state of the driver to be authenticated;
if the detected authentication and verification state is that the identity is not authenticated, acquiring identity related information submitted by the driver to be authenticated and creating an authentication and verification work order;
and after the verification of the verification work order is passed, the driver identification is subjected to verification marking.
An embodiment of an identity authentication processing device based on a federation chain provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide an identity authentication processing apparatus based on a federation chain, where the identity authentication processing apparatus based on a federation chain is used to execute the above-mentioned identity authentication processing method based on a federation chain, and fig. 9 is a schematic structural diagram of an identity authentication processing apparatus based on a federation chain provided in one or more embodiments of the present specification.
The identity authentication processing device based on a federation chain provided in this embodiment is applied to a federation chain node corresponding to an authentication server in the federation chain, and includes:
as shown in fig. 9, the identity authentication processing device based on the federation chain may have a relatively large difference due to different configurations or performances, and may include one or more processors 901 and a memory 902, where one or more stored applications or data may be stored in the memory 902. Memory 902 may be, among other things, transient storage or persistent storage. The application stored in memory 902 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in an identity authentication processing device. Still further, the processor 901 may be configured to communicate with the memory 902 to execute a series of computer-executable instructions in the memory 902 on a federation chain-based authentication processing device. The federation chain-based identity authentication processing apparatus may also include one or more power supplies 903, one or more wired or wireless network interfaces 904, one or more input/output interfaces 905, one or more keyboards 906, and the like.
In one particular embodiment, a federation chain-based identity authentication processing apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the federation chain-based identity authentication processing apparatus, and execution of the one or more programs by one or more processors includes computer-executable instructions for:
receiving an identity authentication request which is sent by the authentication server and carries a driver identifier of a driver to be authenticated;
calling an intelligent contract deployed by the alliance chain node to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain or not;
if the driver is not authenticated, detecting the authentication and verification state of the driver to be authenticated, and if the detected authentication and verification state is that the identity is not authenticated, sending the detected authentication and verification state to the authentication server;
and after the authentication server creates an authentication and verification work order and confirms that the authentication and verification pass, calling the intelligent contract to carry out authentication and marking on the driver identifier.
Another embodiment of an identity authentication processing apparatus based on a federation chain provided in this specification is as follows:
corresponding to the above-described identity authentication processing method based on a federation chain, which is applied to an authentication server, based on the same technical concept, one or more embodiments of the present specification further provide an identity authentication processing device based on a federation chain, where the identity authentication processing device based on a federation chain is configured to execute the above-described identity authentication processing method based on a federation chain, and fig. 10 is a schematic structural diagram of an identity authentication processing device based on a federation chain provided in one or more embodiments of the present specification.
The identity authentication processing device based on the federation chain provided by the embodiment is applied to an authentication server, and comprises:
as shown in fig. 10, the identity authentication processing device based on federation chain may have a relatively large difference due to different configurations or performances, and may include one or more processors 1001 and a memory 1002, where the memory 1002 may store one or more stored applications or data. Memory 1002 may be, among other things, transient storage or persistent storage. The application stored in memory 1002 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in an identity authentication processing device. Still further, the processor 1001 may be configured to communicate with the memory 1002 to execute a series of computer-executable instructions in the memory 1002 on a federation chain-based identity authentication processing apparatus. The federation chain-based identity authentication processing apparatus may also include one or more power supplies 1003, one or more wired or wireless network interfaces 1004, one or more input/output interfaces 1005, one or more keyboards 1006, etc.
In a particular embodiment, a federation chain-based identity authentication processing apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the federation chain-based identity authentication processing apparatus, and execution of the one or more programs by one or more processors configured to include computer-executable instructions for:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node;
if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, obtaining identity related information submitted by the driver to be authenticated and creating an authentication and verification work order;
and sending an audit result to the coalition link points after the certification audit work order is approved.
An embodiment of a storage medium provided in this specification is as follows:
on the basis of the same technical concept, one or more embodiments of the present specification further provide a storage medium corresponding to the above-described identity authentication processing method.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel;
inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform;
if the driver to be authenticated does not exist, detecting the authentication and verification state of the driver to be authenticated;
if the detected authentication and verification state is that the identity is not authenticated, acquiring identity related information submitted by the driver to be authenticated and creating an authentication and verification work order;
and after the verification of the verification work order is passed, the driver identification is subjected to verification marking.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the identity authentication processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated details are not described here.
The second storage medium example provided in this specification is as follows:
correspondingly, the identity authentication processing method based on the federation chain is applied to federation chain nodes corresponding to authentication servers in the federation chain, and based on the same technical concept, one or more embodiments of the present specification further provide a storage medium.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
receiving an identity authentication request which is sent by the authentication server and carries a driver identifier of a driver to be authenticated;
calling an intelligent contract deployed by the alliance chain node to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain or not;
if the driver is not authenticated, detecting the authentication and verification state of the driver to be authenticated, and if the detected authentication and verification state is that the identity is not authenticated, sending the detected authentication and verification state to the authentication server;
and after the authentication server creates an authentication and verification work order and confirms that the authentication and verification pass, calling the intelligent contract to carry out authentication and marking on the driver identifier.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the identity authentication processing method based on a federation chain in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated parts are not described again.
The third storage medium embodiment provided in this specification is as follows:
corresponding to the identity authentication processing method based on the federation chain described above, the identity authentication processing method is applied to an authentication server, and based on the same technical concept, one or more embodiments of the present specification further provide a storage medium.
The storage medium provided in this embodiment is used to store computer-executable instructions, and when executed, the computer-executable instructions implement the following processes:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node;
if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, obtaining identity related information submitted by the driver to be authenticated and creating an authentication and verification work order;
and sending an audit result to the coalition link points after the certification audit work order is approved.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the identity authentication processing method based on a federation chain in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the foregoing corresponding method, and repeated parts are not described again.
The foregoing description of specific embodiments has been presented for purposes of illustration and description. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 30 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain a corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD) (e.g., a Field Programmable Gate Array (FPGA)) is an integrated circuit whose Logic functions are determined by a user programming the Device. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually manufacturing an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as ABEL (Advanced Boolean Expression Language), AHDL (alternate Hardware Description Language), traffic, CUPL (core universal Programming Language), HDCal, jhddl (Java Hardware Description Language), lava, lola, HDL, PALASM, rhyd (Hardware Description Language), and vhigh-Language (Hardware Description Language), which is currently used in most popular applications. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, apparatuses, modules or units described in the above embodiments may be specifically implemented by a computer chip or an entity, or implemented by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, respectively. Of course, the functions of the units may be implemented in the same software and/or hardware or in multiple software and/or hardware when implementing the embodiments of the present description.
One skilled in the art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus comprising the element.
One or more embodiments of the specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of this document and is not intended to limit this document. Various modifications and changes may occur to those skilled in the art. Any modifications, equivalents, improvements, etc. which come within the spirit and principle of the disclosure are intended to be included within the scope of the claims of this document.

Claims (25)

1. An identity authentication processing method, comprising:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel;
inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform;
if the driver to be authenticated does not exist, detecting the authentication and verification state of the driver to be authenticated;
if the detected authentication and verification state is that the identity is not authenticated, acquiring identity related information submitted by the driver to be authenticated and creating an authentication and verification work order; the authentication and audit work order is a manual authentication and audit work order;
and after the verification of the certification and verification work order is passed, carrying out certification and marking on the driver identification.
2. The identity authentication processing method of claim 1, wherein after the step of obtaining the driver identifier carried in the access request submitted by the driver to be authenticated through the access channel is executed, and before the step of querying whether the authentication driver identifier matched with the driver identifier exists in the authentication driver table synchronized with the third-party platform is executed, the method further comprises the following steps:
judging whether the driver identifier is certified and marked;
if so, sending an authentication and verification state prompt with authenticated identity to the driver to be authenticated and displaying an access page of the identity authentication application;
if not, judging whether the driver to be authenticated submits an identity information authorization instruction or not; and if yes, executing the step of inquiring whether an authentication driver mark matched with the driver mark exists in an authentication driver table synchronized with the third-party platform.
3. The identity authentication processing method according to claim 2, wherein if the execution result after the step of judging whether the driver to be authenticated submits the identity information authorization instruction is negative, the following operations are executed:
sending an identity information authorization protocol to a user terminal of the driver to be authenticated and displaying an authorization reminding page carrying the identity information authorization protocol through the user terminal;
acquiring an identity information authorization instruction submitted by the driver to be authenticated through the authorization reminding page;
and signing the identity information authorization protocol based on the identity information authorization command, and executing the step of inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform.
4. The identity authentication processing method as claimed in claim 1, wherein the obtaining of the driver identifier carried in the access request submitted by the driver to be authenticated through the access channel comprises:
acquiring the driver identifier carried in an access request submitted by the driver to be authenticated through a trigger access link;
alternatively, the first and second electrodes may be,
acquiring the driver identifier carried in an access request submitted by the driver to be authenticated through an application identifier triggering identity authentication application;
alternatively, the first and second electrodes may be,
and acquiring the driver identification carried in an access request submitted by the driver to be authenticated through scanning the access material.
5. The identity authentication processing method of claim 1, wherein the step of inquiring whether the authentication driver identifier matched with the driver identifier exists in the authentication driver table synchronized with the third-party platform is implemented by adopting the following method:
performing priority ordering on at least one authentication driver table synchronized by a third-party platform;
and sequentially inquiring whether the driver identification is consistent with any authentication marking driver identification in any authentication driver table or not according to the priority order.
6. The identity authentication processing method according to claim 1, wherein if the execution result after the step of querying whether the driver identifier matched with the driver identifier exists in the authentication driver table synchronized by the third-party platform is executed is as follows:
updating the authentication and verification state of the driver to be authenticated into the authenticated state in a driver information table;
judging whether the driver to be authenticated submits an opening instruction for a cash register service;
if not, carrying out authentication marking on the driver identifier under the condition that the authenticated driver submits the opening instruction.
7. The identity authentication processing method of claim 1, further comprising:
if the detected authentication and verification state is in identity authentication, sending an authentication and verification state prompt in the identity authentication to the driver to be authenticated;
and if the detected authentication and audit state is that the identity is authenticated, sending an authentication and audit state prompt with the authenticated identity to the driver to be authenticated and displaying an access page of the identity authentication application.
8. The identity authentication processing method according to claim 1, wherein the driver to be authenticated is confirmed as an authenticated driver after the driver identification is authenticated and marked;
correspondingly, after the driver identification is authenticated and marked after the approval of the approval work order is passed, the method further comprises the following steps:
determining the authentication reward of the authenticated driver according to the equity algorithm corresponding to the access channel;
issuing the certification award to the certified driver.
9. The identity authentication processing method as claimed in claim 1, wherein the obtaining of the identity-related information submitted by the driver to be authenticated and the creation of the authentication audit work order comprises:
judging whether the driver to be authenticated is a real-name authenticated driver;
if not, sending a real-name authentication prompt to the driver to be authenticated;
after the real-name authentication of the driver to be authenticated is passed, reading the driver information of the driver to be authenticated, and desensitizing the driver information;
desensitizing acquired desensitizing driver information is sent to a user terminal of the driver to be authenticated and displayed through an application page;
acquiring the associated information submitted by the driver to be authenticated through the application page;
creating the authentication and audit work order based on the driver information and the associated information;
wherein the identity-related information is composed of the driver information and the associated information.
10. The identity authentication processing method of claim 1, wherein the driver identification is subject to authentication marking, and the method comprises the following steps:
sending an audit result prompt for passing the audit to the driver to be authenticated;
and marking the driver identification based on the identity authentication label, and confirming the driver to be authenticated as an authenticated driver after marking.
11. The identity authentication processing method according to claim 1, wherein the acquiring of the identity-related information submitted by the driver to be authenticated and the creating of the authentication audit work order comprises:
acquiring the identity related information submitted by the driver to be authenticated;
inputting the identity-related information into a credit recognition system;
if the credit identification is passed, establishing the authentication and audit work order based on the identity related information;
and if the credit identification is not passed, sending an information exception prompt to the driver to be authenticated, and returning to execute the substep of acquiring the identity-related information submitted by the driver to be authenticated.
12. An identity authentication processing method based on a federation chain is applied to a federation chain node corresponding to an authentication server in the federation chain, and comprises the following steps:
receiving an identity authentication request which is sent by the authentication server and carries a driver identifier of a driver to be authenticated;
calling an intelligent contract deployed by the alliance chain node to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain or not;
if the driver is not authenticated, detecting the authentication and audit state of the driver to be authenticated, and if the detected authentication and audit state is that the identity is not authenticated, sending the detected authentication and audit state to the authentication server;
after the authentication server creates an authentication and verification work order and confirms that the authentication and verification pass, calling the intelligent contract to carry out authentication and marking on the driver identifier; the authentication and audit work order is a manual authentication and audit work order.
13. The identity authentication processing method based on the federation chain as claimed in claim 12, wherein the authentication server table is uploaded by a federation chain node of a third party platform and/or a federation chain link point corresponding to the authentication server;
and if the driver identification matched with the driver identification exists in an authentication driver table stored in the alliance chain, the driver identification is authenticated and marked, and the upper chain storage is carried out.
14. A federation chain-based identity authentication processing method as claimed in claim 12, said querying in an authentication driver table stored in the federation chain whether there is an authentication stamper driver identity matching the driver identity comprises:
performing priority sequencing on the authentication driver tables synchronized with the alliance link nodes corresponding to at least one third-party platform;
and sequentially inquiring whether the driver identification is consistent with any authentication marking driver identification in any authentication driver table according to the priority sequence.
15. The identity authentication processing method based on the alliance chain as claimed in claim 12, wherein the identity authentication request further carries an access channel identifier of the driver to be authenticated, and the intelligent contract is used for performing uplink storage on the access channel identifier of the driver to be authenticated;
correspondingly, the method further comprises the following steps:
after the driver to be authenticated is confirmed to be an authenticated driver, inquiring an access channel identifier of the authenticated driver in the alliance chain, and determining an access channel corresponding to the access channel identifier;
and determining the authentication reward of the authenticated driver according to the equity algorithm corresponding to the access channel and issuing the authentication reward to the authentication server so that the authentication server issues the authentication reward to the authenticated driver.
16. An identity authentication processing method based on a federation chain is applied to an authentication server and comprises the following steps:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node;
if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, obtaining identity related information submitted by the driver to be authenticated and creating an authentication and verification work order; the authentication and audit work order is a manual authentication and audit work order;
and sending an audit result to the coalition link points after the certification audit work order is approved.
17. An identity authentication processing apparatus comprising:
the acquisition module is configured to acquire a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel;
the query module is configured to query whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform;
if the driver to be authenticated does not exist, operating a detection module, wherein the detection module is configured to detect the authentication and audit state of the driver to be authenticated;
if the detected authentication and verification state is that the identity is not authenticated, operating a creation module, wherein the creation module is configured to acquire identity related information submitted by the driver to be authenticated and create an authentication and verification work order; the authentication and audit work order is a manual authentication and audit work order;
and the marking module is configured to carry out authentication marking on the driver identifier after the authentication and verification work order passes verification.
18. An identity authentication processing device based on a federation chain, which operates in a federation chain node corresponding to an authentication server in the federation chain, includes:
the request receiving module is configured to receive an identity authentication request which is sent by the authentication server and carries a driver identifier of a driver to be authenticated;
the identity query module is configured to call intelligent contract of the alliance link point deployment to query whether an authentication marking driver identity matched with the driver identity exists in an authentication driver table stored in the alliance chain;
if the driver authentication verification state is not authenticated, a state detection module is operated, and is configured to detect the authentication verification state of the driver to be authenticated, and if the detected authentication verification state is not authenticated, the detected authentication verification state is sent to the authentication server;
the authentication marking module is configured to call the intelligent contract to perform authentication marking on the driver identifier after the authentication server creates an authentication and verification work order and confirms that the authentication and verification are passed; the authentication and audit work order is a manual authentication and audit work order.
19. An identity authentication processing device based on a federation chain, running in an authentication server, comprises:
the request sending module is configured to obtain a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and send an identity authentication request carrying the driver identifier to a corresponding alliance link node;
if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, operating a work order creating module, wherein the work order creating module is configured to acquire identity related information submitted by the driver to be authenticated and create an authentication and verification work order; the authentication and audit work order is a manual authentication and audit work order;
and the result sending module is configured to send a checking result to the alliance chain node after the certification and checking work order passes the checking.
20. An identity authentication processing apparatus comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel;
inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform;
if the driver to be authenticated does not exist, detecting the authentication and verification state of the driver to be authenticated;
if the detected authentication and verification state is that the identity is not authenticated, acquiring identity related information submitted by the driver to be authenticated and creating an authentication and verification work order; the authentication and audit work order is a manual authentication and audit work order;
and after the verification of the certification and verification work order is passed, carrying out certification and marking on the driver identification.
21. A federation chain-based identity authentication processing apparatus, comprising:
a processor; and (c) a second step of,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
receiving an identity authentication request which is sent by an authentication server and carries a driver identifier of a driver to be authenticated;
calling an intelligent contract deployed by the alliance chain node to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain or not;
if the driver is not authenticated, detecting the authentication and audit state of the driver to be authenticated, and if the detected authentication and audit state is that the identity is not authenticated, sending the detected authentication and audit state to the authentication server;
after the authentication server creates an authentication and verification work order and confirms that the authentication and verification pass, calling the intelligent contract to carry out authentication and marking on the driver identifier; the authentication and audit work order is a manual authentication and audit work order.
22. A federation chain-based identity authentication processing apparatus comprising:
a processor; and the number of the first and second groups,
a memory configured to store computer-executable instructions that, when executed, cause the processor to:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node;
if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, obtaining identity related information submitted by the driver to be authenticated and creating an authentication and verification work order; the authentication and audit work order is a manual authentication and audit work order;
and sending an audit result to the coalition link points after the certification audit work order is approved.
23. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel;
inquiring whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table synchronized with a third-party platform;
if the driver to be authenticated does not exist, detecting the authentication and verification state of the driver to be authenticated;
if the detected authentication and verification state is that the identity is not authenticated, acquiring identity related information submitted by the driver to be authenticated and creating an authentication and verification work order; the authentication and audit work order is a manual authentication and audit work order;
and after the verification of the verification work order is passed, the driver identification is subjected to verification marking.
24. A storage medium storing computer-executable instructions that when executed implement the following:
receiving an identity authentication request which is sent by an authentication server and carries a driver identifier of a driver to be authenticated;
calling intelligent contract deployed by alliance chain nodes to inquire whether an authentication marking driver identifier matched with the driver identifier exists in an authentication driver table stored in the alliance chain;
if the driver is not authenticated, detecting the authentication and verification state of the driver to be authenticated, and if the detected authentication and verification state is that the identity is not authenticated, sending the detected authentication and verification state to the authentication server;
after the authentication server creates an authentication and verification work order and confirms that the authentication and verification pass, calling the intelligent contract to carry out authentication and marking on the driver identifier; the authentication and audit work order is a manual authentication and audit work order.
25. A storage medium storing computer-executable instructions that when executed implement the following:
acquiring a driver identifier carried in an access request submitted by a driver to be authenticated through an access channel, and sending an identity authentication request carrying the driver identifier to a corresponding alliance link node;
if the authentication and verification state sent by the alliance link node is that the identity is not authenticated, obtaining identity related information submitted by the driver to be authenticated and creating an authentication and verification work order; the authentication and audit work order is a manual authentication and audit work order;
and sending an audit result to the coalition link points after the certification audit work order is approved.
CN202110374317.1A 2021-04-07 2021-04-07 Identity authentication processing method and device Active CN113159800B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202211581388.XA CN115860763A (en) 2021-04-07 2021-04-07 Identity authentication processing method and device
CN202110374317.1A CN113159800B (en) 2021-04-07 2021-04-07 Identity authentication processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110374317.1A CN113159800B (en) 2021-04-07 2021-04-07 Identity authentication processing method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202211581388.XA Division CN115860763A (en) 2021-04-07 2021-04-07 Identity authentication processing method and device

Publications (2)

Publication Number Publication Date
CN113159800A CN113159800A (en) 2021-07-23
CN113159800B true CN113159800B (en) 2023-01-17

Family

ID=76889089

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110374317.1A Active CN113159800B (en) 2021-04-07 2021-04-07 Identity authentication processing method and device
CN202211581388.XA Pending CN115860763A (en) 2021-04-07 2021-04-07 Identity authentication processing method and device

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202211581388.XA Pending CN115860763A (en) 2021-04-07 2021-04-07 Identity authentication processing method and device

Country Status (1)

Country Link
CN (2) CN113159800B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529979A (en) * 2016-12-05 2017-03-22 深圳微众税银信息服务有限公司 Enterprise identity authentication method and system
CN107872444A (en) * 2016-09-28 2018-04-03 阿里巴巴集团控股有限公司 The identity verification authentication method and system of the network user
CN112383519A (en) * 2019-06-18 2021-02-19 创新先进技术有限公司 Enterprise authentication and authentication tracing method, device and equipment based on block chain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110033270A (en) * 2019-03-21 2019-07-19 阿里巴巴集团控股有限公司 Authentication information processing method, device and electronic equipment based on alliance's chain
US10812477B2 (en) * 2019-06-18 2020-10-20 Alibaba Group Holding Limited Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
CN112036904A (en) * 2020-07-20 2020-12-04 山东爱城市网信息技术有限公司 Regional brand authentication method, device and medium based on block chain
CN111787530B (en) * 2020-08-06 2024-01-09 联通雄安产业互联网有限公司 Block chain digital identity management method based on SIM card

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107872444A (en) * 2016-09-28 2018-04-03 阿里巴巴集团控股有限公司 The identity verification authentication method and system of the network user
CN106529979A (en) * 2016-12-05 2017-03-22 深圳微众税银信息服务有限公司 Enterprise identity authentication method and system
CN112383519A (en) * 2019-06-18 2021-02-19 创新先进技术有限公司 Enterprise authentication and authentication tracing method, device and equipment based on block chain

Also Published As

Publication number Publication date
CN113159800A (en) 2021-07-23
CN115860763A (en) 2023-03-28

Similar Documents

Publication Publication Date Title
CN110336797B (en) Enterprise authentication and authentication tracing method, device and equipment based on block chain
CN109889503B (en) Identity management method based on block chain, electronic device and storage medium
CN111311251B (en) Binding processing method, device and equipment
CN110175828B (en) User verification method and device based on bank card quick payment signing
CN111353176B (en) Method and system for inquiring block chain data
CN112200585B (en) Service processing method, device, equipment and system
CN112073289B (en) Instant messaging control method and device
CN112434348B (en) Data verification processing method, device and equipment
US20180302405A1 (en) Organizational sign-in across sovereign environments
CN103559430B (en) application account management method and device based on Android system
CN111400690B (en) Biological verification method and device
CN107230080B (en) Service processing method and device and intelligent terminal
CN113159800B (en) Identity authentication processing method and device
CN112990940B (en) Enterprise authentication method and device
CN112131545B (en) Method, device and equipment for processing voice authorization and voice related service
CN112100610B (en) Processing method, device and equipment for login and user login related services
CN113065120B (en) Interface calling authentication method and device, electronic equipment and readable storage medium
CN113689016A (en) Vehicle reservation processing method and device
CN113572827A (en) Registration processing method and device
CN113158151B (en) Identity authentication processing method and device
CN111882321A (en) Identity verification processing method, device and system
CN112148737A (en) Attendance processing method and device
CN110324361A (en) The method, apparatus of authentification of message calculates equipment and medium
CN116938557B (en) Fake website identification method based on blockchain, electronic equipment and storage medium
CN113190780B (en) Block chain-based website construction and information query method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant