CN114679294A - User identity verification method and device, electronic equipment and storage medium - Google Patents

User identity verification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114679294A
CN114679294A CN202111631216.4A CN202111631216A CN114679294A CN 114679294 A CN114679294 A CN 114679294A CN 202111631216 A CN202111631216 A CN 202111631216A CN 114679294 A CN114679294 A CN 114679294A
Authority
CN
China
Prior art keywords
user
information
user information
identity
user identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111631216.4A
Other languages
Chinese (zh)
Inventor
李尊杰
王健
徐锐
刘通
吴保青
郑义
槐正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111631216.4A priority Critical patent/CN114679294A/en
Publication of CN114679294A publication Critical patent/CN114679294A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1059Inter-group management mechanisms, e.g. splitting, merging or interconnection of groups

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a method and a device for verifying user identity, electronic equipment and a storage medium, wherein the method comprises the following steps: receiving a communication request sent by a first user to a second user; the communication request comprises a first number of a first user; acquiring a corresponding first user identity certificate according to the first number; and sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user. The embodiment of the invention is based on the non-homogeneous token, can generate the unique user identity voucher which contains the user number and the user information and can not be tampered, and can display the user identity voucher information in the user equipment when the user carries out the communication, so that the user can obtain the real identity information of the abnormal user before the implementation of the malicious behavior, thereby preventing the implementation of the malicious behavior such as the identity falsely used by the abnormal user, and realizing the reliability and the prepositive property of information safety protection.

Description

User identity verification method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for verifying a user identity, an electronic device, and a storage medium.
Background
Since twenty-first century, China is in the stage of high-speed development of information technology, but with the explosion of the information age, information security faces another challenge.
The existing information security protection technology mostly adopts various sensor identification, content identification and marking in the later period of big data analysis to mark and prompt user information, and the modes have high false alarm rate and can not ensure the reliability and the non-tamper property of judgment. The big data is analyzed and counted through the big data, and then the marking mode can reduce some false alarm rates, but the user identity judgment has hysteresis quality, and the user identity judgment can be carried out only by having a certain data base, at the moment, the fact that the abnormal user has malicious behaviors for many times possibly occurs, so that the damage to the property of people is generated, and meanwhile, the uniqueness and the tamper-proof property of the judgment information cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention provides a method and a device for verifying user identity, electronic equipment and a computer readable storage medium, which are used for solving the problems of high false alarm rate and lagging identity verification of the existing information security technology.
The embodiment of the invention discloses a method for verifying user identity, which is applied to a service platform, wherein a user identity certificate corresponding to a user is stored in the service platform, the user has a corresponding number and user information, the user identity certificate is generated in a non-homogeneous token block chain according to the number of the user and the user information, and the method comprises the following steps:
receiving a communication request sent by a first user to a second user; the communication request comprises a first number of a first user;
acquiring a corresponding first user identity certificate according to the first number;
and sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user.
Optionally, before the generating of the user identity credential, the method further includes:
acquiring user information of the user;
obtaining authentication user information corresponding to the user from a user information authentication system;
if the user information is matched with the authenticated user information, determining that the user information is legal user information;
and if the user information is not matched with the authenticated user information, prompting error information to the user.
Optionally, the user identity credential is generated in a heterogeneous token blockchain according to the number of the user and the user information, and includes:
binding the number with the legal user information to obtain binding information;
uploading the binding information to the non-homogeneous token block chain, so that the non-homogeneous token block chain generates a user identity credential according to the binding information.
Optionally, the method further comprises:
receiving report information sent by the second user aiming at the first user;
judging whether the first user is an abnormal user or not according to the reporting information; the reporting information comprises a first number of the first user;
and marking the user identity certificate corresponding to the abnormal user as an abnormal user identity certificate.
Optionally, the determining, according to the report information, whether the first user is an abnormal user includes:
acquiring a first number of the first user from the report information;
obtaining a first user identity voucher corresponding to the first number from the non-homogeneous token block chain;
acquiring first authentication user information corresponding to the first number from the user information authentication system;
And if the user information in the first user identity certificate is not matched with the first authentication user information, determining that the first user is an abnormal user.
Optionally, the user information includes at least one of a name, an age, and an occupation.
The embodiment of the invention also discloses a user identity verification device, which is applied to a service platform, wherein a user identity certificate corresponding to a user is stored in the service platform, the user has a corresponding number and user information, the user identity certificate is generated in a heterogeneous token block chain according to the number of the user and the user information, and the device comprises:
the communication request receiving module is used for receiving a communication request sent by a first user to a second user; the communication request comprises a first number of a first user;
the user identity certificate acquisition module is used for acquiring a corresponding first user identity certificate according to the first number;
and the user information sending module is used for sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user.
Optionally, the apparatus comprises:
Acquiring user information of the user;
acquiring authentication user information corresponding to the user from a user information authentication system;
if the user information is matched with the authenticated user information, determining that the user information is legal user information;
and if the user information is not matched with the authenticated user information, prompting error information to the user.
Optionally, the apparatus comprises:
binding the number with the legal user information to obtain binding information;
uploading the binding information to the non-homogeneous token block chain, so that the non-homogeneous token block chain generates a user identity credential according to the binding information.
Optionally, the apparatus comprises:
receiving report information sent by the second user aiming at the first user;
judging whether the first user is an abnormal user or not according to the reporting information; the reporting information comprises a first number of the first user;
and marking the user identity certificate corresponding to the abnormal user as an abnormal user identity certificate.
Optionally, the apparatus comprises:
acquiring a first number of the first user from the report information;
obtaining a first user identity voucher corresponding to the first number from the non-homogeneous token block chain;
Acquiring first authentication user information corresponding to the first number from the user information authentication system;
and if the user information in the first user identity certificate is not matched with the first authentication user information, determining that the first user is an abnormal user.
Optionally, the apparatus comprises:
the user information includes at least one of a name, an age, and an occupation.
An embodiment of the present invention discloses an electronic device, which includes a processor, a memory, and a computer program stored in the memory and capable of running on the processor, and when the computer program is executed by the processor, the steps of the data processing method described above are implemented.
The embodiment of the invention discloses a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the steps of the data processing method are realized.
The embodiment of the invention has the following advantages:
according to the embodiment of the invention, a user identity certificate is generated in a heterogeneous token block chain according to the number and the user information of a user, and a communication request sent to a second user by a first user is received; the communication request comprises a first number of the first user; acquiring a corresponding first user identity certificate according to the first number; and sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user. The embodiment of the invention is based on the non-homogeneous token, can generate the unique user identity voucher which contains the user number and the user information and can not be tampered, and can display the user identity voucher information in the user equipment when the user carries out the communication, so that the user can obtain the real identity information of the abnormal user before the implementation of the malicious behavior, thereby preventing the implementation of the malicious behavior such as the false identity and the like, and realizing the reliability and the prepositive property of information safety protection.
Drawings
Fig. 1 is a flowchart illustrating steps of a method for verifying a user identity according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an embodiment of a method for verifying a user identity according to the present invention;
fig. 3 is a block diagram of a device for verifying user identity according to an embodiment of the present invention;
fig. 4 is a block diagram of an apparatus for verifying a user identity according to an embodiment of the present invention;
FIG. 5 is a block diagram of an electronic device of the present invention;
FIG. 6 is a schematic diagram of a computer readable medium of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
In recent years, with the rapid development of information technology in China, information security faces another challenge. According to the relevant data statistics, the number of cases of malicious behaviors in the telecommunication network is on the trend of increasing year by year in 2013 and 2020. During the year of 2016 of 2013, the growth trend is slow, the growth trend of 2020 of 2017 is obvious, particularly in the year 2016 of 2017, the growth amplitude is the largest, 2029 pieces are increased, the increase is 450 percent, the peak is reached in 2020, the number of cases is 7935 pieces, and is nearly 377 times of the number of cases in 2013.
The types of malicious activities of a telecommunications network generally include: malicious phone calls, malicious short messages, malicious websites, risk wifi, fake identities, mobile phone viruses, and the like.
In the above case types of malicious activities in the telecommunication network, the number of malicious activities implemented by telephone is the highest, reaching 38.65%. The high-rate content of malicious behaviors finished by malicious phones, malicious short messages and other channels is loans, credit cards are used, and the like, namely the malicious behaviors with loans as head, and non-compliant folk loans, campus loans, cash loans and the like are included, because network loans or credit card application personnel are generally in need of money or are not healthy enough in daily consumption habits, and the people who use money urgently or neglect carelessly to neglect the legal qualification of an auditing platform fall into the trap of abnormal users when looking for a loan platform.
The basis of the malicious behaviors of the telecommunication network is that abnormal users often create individual related malicious behavior scenes by utilizing various leaked private user information aiming at people with low precaution consciousness, such as students, middle-aged and old people, so that people trust the malicious behaviors and remit the malicious behaviors. The malicious behaviors are pertinently implemented by utilizing the weaknesses of human nature according to social engineering, and are actually out of the way of prevention.
At present, various sensor identification, content identification and marking in the later stage of big data analysis are mostly adopted in the information security protection technology for marking and prompting user information, and the modes have high false alarm rate and cannot ensure the reliability and the non-tampering property of judgment. The big data is analyzed and counted through the big data, and then the marking mode can reduce some false alarm rates, but the hysteresis quality of the abnormal user identity judgment exists, a certain data base is needed to be provided for analyzing and judging, at the moment, the abnormal user possibly implements a plurality of malicious behaviors, damage behaviors are generated to the property of people, and meanwhile, the uniqueness and the non-tamper property of the judgment information cannot be guaranteed.
In view of the above problems, an embodiment of the present invention provides a method for verifying a user identity, which can generate a user identity credential in a non-homogeneous token block chain according to a user number and user information, and display user identity credential information in user equipment when a user makes a call, so that the user can obtain real identity information of an abnormal user before malicious behavior is implemented, thereby preventing the abnormal user from impersonating the implementation of malicious behaviors such as identity and the like, and achieving reliability and prepositive of information security protection.
Non-homogeneous tokens (NFTs) are Non-divisible, Non-substitutable, unique, and so on. On the blockchain, digital cryptocurrency is divided into two broad categories, native currency and tokens. The former, such as BTC, ETH, etc., has its own backbone, maintains ledger data using transactions on the chain; tokens are attached to an existing blockchain, and account books are recorded using intelligent contracts, such as tokens issued by attaching to an ethernet house. Tokens can be classified into homogeneous tokens and heterogeneous tokens. Homogeneous tokens, namely ft (funnible token), can replace each other, approaching an infinitely split token. For example, you have a BTC in hand that is not different from my BTC in hand in nature, which is the homogenization, i.e., the homogeneous currency. The non-homogeneous token NFT is a unique blockchain item with blockchain management. Compared to FT, a key innovation of NFT is that it provides a way to mark native digital asset ownership (i.e., assets that exist in, or originate from, the digital world), and that ownership may exist outside of a centralized service or centralized repository. The ownership of the NFT does not prevent others from viewing it or reading it, and the NFT does not capture information and then hide it, but just captures it and then discovers its relationship and value to all other information in the chain.
Referring to fig. 1, a flow chart of steps of a method for verifying a user identity provided in the embodiment of the present invention is shown, and is applied to a service platform, where a user identity credential corresponding to a user is stored in the service platform, the user has a corresponding number and user information, and the user identity credential is generated in a non-homogeneous token block chain according to the number of the user and the user information, and specifically includes the following steps:
step 101, receiving a communication request sent by a first user to a second user; the communication request comprises a first number of a first user;
the embodiment of the invention can be applied to a service platform, a user identity certificate corresponding to a user can be stored in the service platform, wherein the user has a corresponding number and user information. Because the NFT has the characteristics of inseparability, irreplaceability, uniqueness and the like, the generated user identity certificate also has the characteristics of non-tampering, traceability and uniqueness. After the user identity credential is generated, the user identity credential of the user can be queried in the NFT blockchain, and the user information in the user identity credential can be viewed.
Specifically, the service platform may further receive a communication request sent by the first user to the second user, specifically, the first user may call the second user through a terminal device, where the terminal device may include a mobile phone, a tablet computer, and the like, the communication request may include a first number of the first user, and after receiving the communication request, the service platform may obtain the first number in the communication request.
102, acquiring a corresponding first user identity certificate according to the first number;
in a specific implementation, a plurality of user identity credentials may be stored in the service platform, each user identity credential has a corresponding number, and the corresponding first user identity credential may be obtained according to the first number in the communication request. Specifically, numbers corresponding to a plurality of user identity credentials stored by the service platform may be compared with the first number, so as to find the first user identity credential corresponding to the first number.
And 103, sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user.
The service platform can send the user information in the first user identity certificate to the second user when the first user sends a communication request to the second user, so that the user information of the first user can be displayed on the terminal equipment of the second user.
In one example, the business platform stores a user identity credential for user a, assuming that user a has a name of "zhang san", a 28 year old, and a professional of taxi driver. When the user A calls the user B, the service platform can acquire the telephone number of the user A from the call request, acquire the user identity certificate corresponding to the user A according to the telephone number, and then send the user information in the user identity certificate of the user A to the user B, so that the terminal equipment of the user B displays the information of the user A. Specifically, the information of the name, age, occupation and the like of the user a can be sent to the user B, and the information of the caller, such as the number of the other party, can be displayed on the terminal equipment of the user B, wherein the name is 'zhang san', the age of 28 years old, and the occupation is a taxi driver.
In the embodiment of the invention, a user identity certificate is generated in a heterogeneous token block chain according to the number and the user information of a user, and a communication request sent to a second user by a first user is received; the communication request comprises a first number of the first user; acquiring a corresponding first user identity certificate according to the first number; and sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user. The embodiment of the invention is based on the non-homogeneous token, can generate the unique user identity voucher which contains the user number and the user information and can not be tampered, and can display the user identity voucher information in the user equipment when the user carries out the communication, so that the user can obtain the real identity information of the abnormal user before the implementation of the malicious behavior, thereby preventing the implementation of the malicious behavior such as the identity falsely used by the abnormal user, and realizing the reliability and the prepositive property of information safety protection.
In an exemplary embodiment, before the generating of the user identity credential, the method further includes:
acquiring user information of the user;
acquiring authentication user information corresponding to the user from a user information authentication system;
if the user information is matched with the authenticated user information, determining that the user information is legal user information;
and if the user information is not matched with the authenticated user information, prompting error information to the user.
The user information authentication system is a unified authentication system which records or stores user authentication information, and the user authentication information is real and effective user information which is authenticated.
In a specific implementation, before the user identity credential is generated, the user information of the user needs to be obtained first, and the obtaining of the user information may include that the user fills in a user information filling page of the service platform on the terminal device. After the user information is acquired, uploading the user information to a unified authentication system for verification, specifically, the user information can be acquired from the unified authentication system according to the information such as the name, the identity card number and the like of the user, then the user information is matched with the authenticated user information, if the user information is matched with the authenticated user information, the user information is true and valid user information filled by the user, and further the user information can be determined to be legal; if the user information does not match the authenticated user information, it indicates that the user information is not true and valid, the user information fails to be verified, and an error message is prompted to the user, where the error message may include a specific error location or error reason.
In an exemplary embodiment, the user identity credential is generated in a heterogeneous token blockchain based on the user's number and the user information, including:
binding the number with the legal user information to obtain binding information;
uploading the binding information to the non-homogeneous token block chain, so that the non-homogeneous token block chain generates a user identity credential according to the binding information.
In specific implementation, the number is unique, the number and the legal user information can be bound to obtain binding information, and after the binding, the number and the legal user information are in a one-to-one correspondence relationship. And then uploading the binding information to a block of the NFT block chain to generate a unique and non-falsifiable user identity certificate.
In the above exemplary embodiment, the verified valid user information can be obtained by verifying the user information in the user information authentication system, and then the number and the valid user information are bound to obtain the binding information, and the binding information is uploaded to the NFT block chain to generate the unique and non-falsifiable user identity certificate, so that the authenticity of the user information can be ensured at the source, the unique and non-falsifiable user identity certificate is generated according to the real user information, and the user information can be ensured to be always real, effective and not falsified in the process of verifying the user identity.
In an exemplary embodiment, the method further comprises:
receiving report information sent by the second user aiming at the first user;
judging whether the first user is an abnormal user or not according to the reporting information; the reporting information comprises a first number of the first user;
and marking the user identity certificate corresponding to the abnormal user as an abnormal user identity certificate.
In a specific implementation, the first user calls the second user, and the call page of the terminal device of the second user can display the user information of the first user, for example, the terminal of the second user displays that the first user has a name of "zhangsan" and is a taxi driver for occupation. If the second user connects the call dialed by the first user, and the information spoken by the first user in self-reporting identity is inconsistent with the user information displayed on the terminal equipment of the second user, if the first user is called 'Liquan' and the occupation is a bank employee, the first user is possibly an abnormal user.
Specifically, a one-key reporting control can be preset on a call page of the terminal device of the second user, and when the second user feels that the first user has malicious behavior in a call process, the one-key reporting control can be triggered to achieve one-key reporting. After the one-key reporting control is triggered, the second user sends reporting information for the first user to the service platform, the reporting information includes a first number of the first user, the service platform can judge whether the first user is an abnormal user according to the reporting information, if the first user is determined to be an abnormal user through verification, the user identity credential corresponding to the first user can be marked as an abnormal user identity credential, specifically, a block corresponding to the first user is found in an NFT block chain according to the number of the first user, the user identity credential of the first user is stored in the block, and then the user identity credential of the first user is marked as a user identity credential.
Further, if the user identity credential of the first user is marked as the abnormal user identity credential, and the first user initiates a communication request to another user again, the call page of the terminal device of the other user may display that the first user is the abnormal user, and may include a prompt message to remind the user to prevent malicious behavior from being implemented by the first user.
In an exemplary embodiment, the determining whether the first user is an abnormal user according to the report information includes:
acquiring a first number of the first user from the report information;
obtaining a first user identity voucher corresponding to the first number from the non-homogeneous token block chain;
acquiring first authentication user information corresponding to the first number from a user information authentication system;
and if the user information in the first user identity certificate is not matched with the first authentication user information, determining that the first user is an abnormal user.
In a specific implementation, a first number of a first user may be obtained from the reporting information, then a corresponding block is obtained from the NFT block chain according to the first number, a first user identity credential of the first user is stored in the block, then first authenticated user information corresponding to the first number is obtained in a user information authentication system, and then user information in the first user identity credential is compared with the first authenticated user information, and if the two pieces of information are not matched, it may be determined that the first user is an abnormal user.
In order to make those skilled in the art better understand the technical solutions of the embodiments of the present invention, the embodiments of the present invention are described below by way of an example with reference to fig. 2.
Referring to fig. 2, a schematic flow chart of an embodiment of the method for verifying the user identity provided in the embodiment of the present invention is shown, which specifically includes the following steps:
step 201, inputting user information;
inputting necessary identity information of a user into a user information management system;
step 202, authenticating whether the user information is real or not through a user information authentication system;
the consistency between the reliability of the information filled by the user and the identity information of the user information authentication system is verified by comparing the information of the user stored in the user information authentication system. If the verification is passed, step 203 is executed, if the verification is not passed, step 201 is returned, and the identity information is re-filled or contacted with the user information authentication system to update the identity information.
Step 203, binding the number and the user information of the user, and generating a user identity certificate based on NFT;
and binding the number and the user information of the user conforming to the information authentication, uploading the binding information to the NFT block chain to generate NFT information, and obtaining a unique user identity certificate which cannot be tampered.
Step 204, the user A and the user B communicate, and the user B displays the relevant identity information of the user A;
supposing that a user A calls a user B, when a call occurs, a system acquires the number of the user A, acquires information such as the name, age, occupation and the like of the user A through a block chain according to the number, then establishes and sends the acquired user information of the user A along with a communication link channel through the communication link channel to terminal equipment of the user B, and the terminal equipment of the user B can display the user information of the user A through a screen incoming call when the call link is established.
Step 205, judging whether the user information of the user A is real;
in the process of communication, whether the content spoken by the user A is consistent with the user information of the user A is judged, and therefore whether the user A is an abnormal user is judged.
Step 206, reporting by one key;
and if the user A is suspected to have malicious behaviors, the user B can contact a user information authentication system manager to process the user A through a one-key reporting control in a call page of the terminal equipment.
Step 207, mark the user a as an abnormal user.
And if the user A is confirmed to have the malicious behavior, updating the user identity certificate of the user A, and displaying the associated user information as abnormal user information.
According to the embodiment of the invention, a user identity certificate is generated in a heterogeneous token block chain according to the number and the user information of a user, and a communication request sent to a second user by a first user is received; the communication request includes a first number of the first user; acquiring a corresponding first user identity certificate according to the first number; and sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user. The embodiment of the invention is based on the non-homogeneous token, can generate the unique user identity voucher which contains the user number and the user information and can not be tampered, and can display the user identity voucher information in the user equipment when the user carries out communication, so that the user can determine the real identity information of the opposite side in time, thereby preventing the abnormal user from falsely using the identity to implement malicious behaviors, and realizing the reliability and the prepositive property of information safety protection.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 3, a block diagram of a structure of a user identity authentication apparatus provided in the embodiment of the present invention is shown, which specifically includes the following modules:
a communication request receiving module 301, configured to receive a communication request sent by a first user to a second user; the communication request comprises a first number of a first user;
a user identity credential obtaining module 302, configured to obtain a corresponding first user identity credential according to the first number;
a user information sending module 303, configured to send the user information in the first user identity credential to the second user, so that the user information is displayed on a terminal device of the second user.
Optionally, the apparatus comprises:
acquiring user information of the user;
obtaining authentication user information corresponding to the user from a user information authentication system;
if the user information is matched with the authenticated user information, determining that the user information is legal user information;
and if the user information is not matched with the authenticated user information, prompting error information to the user.
Optionally, the apparatus comprises:
binding the number with the legal user information to obtain binding information;
Uploading the binding information to the non-homogeneous token block chain so that the non-homogeneous token block chain generates a user identity credential according to the binding information.
Optionally, the apparatus comprises:
receiving report information sent by the second user aiming at the first user;
judging whether the first user is an abnormal user or not according to the report information; the reporting information comprises a first number of the first user;
and marking the user identity certificate corresponding to the abnormal user as an abnormal user identity certificate.
Optionally, the apparatus comprises:
acquiring a first number of the first user from the report information;
obtaining a first user identity voucher corresponding to the first number from the non-homogeneous token block chain;
acquiring first authentication user information corresponding to the first number from the user information authentication system;
and if the user information in the first user identity certificate is not matched with the first authentication user information, determining that the first user is an abnormal user.
Optionally, the apparatus comprises:
the user information includes at least one of a name, an age, and an occupation.
Referring to fig. 4, a schematic block diagram of a user identity verification apparatus provided in the embodiment of the present invention is shown, which specifically includes the following modules:
an information entry module 401, configured to enter user information of a user;
the information authentication module 402 is configured to compare user information entered by a user with user information of a user information authentication system, so as to ensure consistency between the user information and information in the user information authentication system and pureness of source data.
The NFT processing module 403 is configured to generate a user identity credential and maintain an update of the user identity credential, and is responsible for operations such as linking and updating block links, so as to ensure reliability, uniqueness, and non-tampering property of the user identity credential.
The communication terminal display module 404 is configured to reasonably display the relevant identity information of the user, so that the opposite party can obtain the identity information of the real contact person during a call, and malicious behaviors such as identity impersonation and the like are prevented from occurring at the source.
The report processing module 405 is configured to perform one-key report on a user determined as a suspected abnormal user, and call the NFT processing module 403 to update the user identity credential of the user if the user is a real abnormal user after being processed by the user information authentication system, so that other contacts are not damaged by the related abnormal user.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
In addition, an embodiment of the present invention further provides an electronic device, as shown in fig. 5, which includes a processor 501, a communication interface 502, a memory 503 and a communication bus 504, where the processor 501, the communication interface 502 and the memory 503 complete mutual communication through the communication bus 504,
a memory 503 for storing a computer program;
the processor 501, when executing the program stored in the memory 503, implements the following steps:
receiving a communication request sent by a first user to a second user; the communication request comprises a first number of a first user;
acquiring a corresponding first user identity certificate according to the first number;
and sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user.
Optionally, before the generating of the user identity credential, the method further includes:
acquiring user information of the user;
acquiring authentication user information corresponding to the user from a user information authentication system;
If the user information is matched with the authenticated user information, determining that the user information is legal user information;
and if the user information is not matched with the authenticated user information, prompting error information to the user.
Optionally, the user identity credential is generated in a heterogeneous token blockchain according to the number of the user and the user information, and includes:
binding the number and the legal user information to obtain binding information;
uploading the binding information to the non-homogeneous token block chain, so that the non-homogeneous token block chain generates a user identity credential according to the binding information.
Optionally, the method further comprises:
receiving report information sent by the second user aiming at the first user;
judging whether the first user is an abnormal user or not according to the reporting information; the reporting information comprises a first number of the first user;
and marking the user identity certificate corresponding to the abnormal user as an abnormal user identity certificate.
Optionally, the determining, according to the report information, whether the first user is an abnormal user includes:
acquiring a first number of the first user from the report information;
Obtaining a first user identity voucher corresponding to the first number from the non-homogeneous token block chain;
acquiring first authentication user information corresponding to the first number from the user information authentication system;
and if the user information in the first user identity certificate is not matched with the first authentication user information, determining that the first user is an abnormal user.
Optionally, the user information includes at least one of a name, an age, and an occupation.
The communication bus mentioned in the above terminal may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the terminal and other equipment.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, or discrete hardware components.
In yet another embodiment provided by the present invention, as shown in fig. 6, there is further provided a computer-readable storage medium 601, which stores instructions that, when executed on a computer, cause the computer to execute the method for verifying the identity of a user described in the above embodiments.
In a further embodiment of the present invention, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the method for verifying the identity of a user as described in the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (9)

1. A method for verifying user identity is applied to a service platform, wherein a user identity certificate corresponding to a user is stored in the service platform, the user has a corresponding number and user information, and the user identity certificate is generated in a heterogeneous token block chain according to the number of the user and the user information, and the method comprises the following steps:
receiving a communication request sent by a first user to a second user; the communication request comprises a first number of a first user;
acquiring a corresponding first user identity certificate according to the first number;
and sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user.
2. The method of claim 1, wherein before the generating of the user identity credential, further comprising:
acquiring user information of the user;
Acquiring authentication user information corresponding to the user from a user information authentication system;
if the user information is matched with the authenticated user information, determining that the user information is legal user information;
and if the user information is not matched with the authenticated user information, prompting error information to the user.
3. The method of claim 2, wherein the user identity credential is generated in a heterogeneous token blockchain based on the user's number and the user information, comprising:
binding the number with the legal user information to obtain binding information;
uploading the binding information to the non-homogeneous token block chain, so that the non-homogeneous token block chain generates a user identity credential according to the binding information.
4. The method of claim 1, further comprising:
receiving report information sent by the second user aiming at the first user;
judging whether the first user is an abnormal user or not according to the reporting information; the reporting information comprises a first number of the first user;
and marking the user identity certificate corresponding to the abnormal user as an abnormal user identity certificate.
5. The method according to claim 4, wherein the determining whether the first user is an abnormal user according to the reporting information comprises:
acquiring a first number of the first user from the report information;
obtaining a first user identity voucher corresponding to the first number from the non-homogeneous token block chain;
acquiring first authentication user information corresponding to the first number from a user information authentication system;
and if the user information in the first user identity certificate is not matched with the first authentication user information, determining that the first user is an abnormal user.
6. The method of claim 1, wherein the user information includes at least one of a name, an age, and an occupation.
7. A user identity verification device is applied to a service platform, a user identity certificate corresponding to a user is stored in the service platform, the user has a corresponding number and user information, the user identity certificate is generated in a heterogeneous token block chain according to the number of the user and the user information, and the device comprises:
the communication request receiving module is used for receiving a communication request sent by a first user to a second user; the communication request comprises a first number of a first user;
The user identity certificate acquisition module is used for acquiring a corresponding first user identity certificate according to the first number;
and the user information sending module is used for sending the user information in the first user identity certificate to the second user so as to display the user information on the terminal equipment of the second user.
8. An electronic device, comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory communicate with each other via the communication bus;
the memory is used for storing a computer program;
the processor, when executing a program stored on the memory, implementing the method of any of claims 1-6.
9. One or more computer-readable media having instructions stored thereon that, when executed by one or more processors, cause the processors to perform the method of any of claims 1-6.
CN202111631216.4A 2021-12-28 2021-12-28 User identity verification method and device, electronic equipment and storage medium Pending CN114679294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111631216.4A CN114679294A (en) 2021-12-28 2021-12-28 User identity verification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111631216.4A CN114679294A (en) 2021-12-28 2021-12-28 User identity verification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114679294A true CN114679294A (en) 2022-06-28

Family

ID=82069684

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111631216.4A Pending CN114679294A (en) 2021-12-28 2021-12-28 User identity verification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114679294A (en)

Similar Documents

Publication Publication Date Title
US10778839B1 (en) Detecting and preventing phishing phone calls through verified attribute analysis
US10187369B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph
US10231124B2 (en) Anti-theft method and client for a mobile terminal
WO2017196609A1 (en) User authentication and access control using identity services
US10484426B2 (en) Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity
CA2993171A1 (en) System and method for validating authorship of an electronic signature session
US20110135073A1 (en) Methods to improve fraud detection on conference calling systems by detection of conference moderator password utilization from a non-authorized device
US10958780B1 (en) Decentralized automatic phone fraud risk management
CN105635113A (en) SDK-based remote service processing method and system
CN112907243A (en) Block chain transaction auditing method and device
KR101282824B1 (en) Meeting attestation system and providing method thereof
CN107241362B (en) Method and device for identifying identity of verification code input user
CN107240023A (en) client identity confirmation method, device and system
Ahmad et al. The impact of digitalization on occupational fraud opportunity in telecommunication industry: a strategic review
KR100563544B1 (en) Method for authenticating a user with one-time password
CN114679294A (en) User identity verification method and device, electronic equipment and storage medium
Blue et al. A review of identity, identification and authentication
KR101793958B1 (en) Method for Preventing Voice Phishing by using Qualified Caller Information
US10930139B1 (en) Information card silent coercion alarm
CN112862504A (en) Lawyer identity authentication method, device, equipment and storage medium
CN109005543B (en) System and method for limiting mobile phone use based on IMEI
CN109995733B (en) Capability service opening method, device, system, equipment and medium
Whitley On technology neutral policies for e-identity: a critical reflection based on UK identity policy
JP2019050014A (en) Account opening system, account opening method, and program
KR101586643B1 (en) Authentication method and server for providing e-finance for foreign resident

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination