CN115022016A - Block chain-based user identity authentication method and device - Google Patents

Block chain-based user identity authentication method and device Download PDF

Info

Publication number
CN115022016A
CN115022016A CN202210605868.9A CN202210605868A CN115022016A CN 115022016 A CN115022016 A CN 115022016A CN 202210605868 A CN202210605868 A CN 202210605868A CN 115022016 A CN115022016 A CN 115022016A
Authority
CN
China
Prior art keywords
target user
user
identity authentication
information
social relation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210605868.9A
Other languages
Chinese (zh)
Inventor
孙泳
毛莹
杨帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210605868.9A priority Critical patent/CN115022016A/en
Publication of CN115022016A publication Critical patent/CN115022016A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a user identity authentication method and a device based on a block chain, relating to the technical field of the block chain, wherein the method comprises the following steps: according to the received identity authentication request of the target user, carrying out face recognition verification on the target user; sending request information for requesting whether to invite the social relation personnel to perform auxiliary identity authentication to a target user; acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user; sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user; receiving feedback information of the preset social relation personnel of each target user to the request information; and when the feedback information exceeding the preset number indicates that the target user is the user owner, confirming that the identity authentication request of the target user passes. The invention can improve the accuracy and the service handling efficiency of the identity authentication of the middle-aged and the elderly people and improve the use experience of users.

Description

Block chain-based user identity authentication method and device
Technical Field
The invention relates to the technical field of block chains, in particular to a user identity authentication method and device based on a block chain.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
The modern society science and technology is rapidly developed, and the online handling of various services is convenient for the masses and workers, but is not very friendly to the middle-aged and the elderly.
Especially for the old, many people can not follow the system to make various instructions in the set time, and because the old acts slowly, can not know the information technology, the difficulty of identifying the identity through common means such as the face identification technology is very big, therefore to the condition that the old and old people are easy to fail in the face identification authentication, the business handling efficiency of the old and old people is influenced, and bad use experience is also easy to cause for the client.
Disclosure of Invention
The embodiment of the invention provides a user identity authentication method based on a block chain, which is used for improving the accuracy of identity authentication of middle-aged and old people, improving the business handling efficiency of the middle-aged and old people and improving the use experience of users, and comprises the following steps:
according to the received identity authentication request of the target user, carrying out face recognition verification on the target user;
when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through the face recognition verification is lower than a preset value, sending request information for requesting whether to invite social relation personnel to carry out auxiliary identity authentication to a target user;
after receiving an approval instruction of the target user for the request information, acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user;
sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user;
receiving feedback information of the preset social relation personnel of each target user to the request information;
and when the feedback information exceeding the preset number indicates that the target user is the user owner, confirming that the identity authentication request of the target user passes.
The embodiment of the invention also provides a user identity authentication device based on the block chain, which is used for improving the accuracy of identity authentication of middle-aged and elderly people, improving the business handling efficiency of the middle-aged and elderly people and improving the use experience of users, and comprises the following steps:
the face recognition verification module is used for carrying out face recognition verification on the target user according to the received identity authentication request of the target user;
the system comprises an invitation information sending module, a social relation person identification module and a face recognition and verification module, wherein the invitation information sending module is used for sending an invitation message for asking whether to invite the social relation person to perform auxiliary identity authentication to a target user when the face recognition and verification failure times exceed a preset number and/or a face matching value obtained through face recognition and verification is lower than a preset value;
the preset social relation person determining module is used for acquiring preset social relation persons of the target user from the block chain based on the identity information of the target user after receiving an approval instruction of the target user for the request information;
the request information sending module is used for sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user;
the feedback information receiving module is used for receiving feedback information of the preset social relation personnel of each target user to the request information;
and the identity authentication module is used for confirming that the identity authentication request of the target user passes when the feedback information exceeding the preset number indicates that the target user is the user owner.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the user identity authentication method based on the block chain when executing the computer program.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for authenticating a user identity based on a block chain is implemented.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when executed by a processor, the computer program implements the above method for user identity authentication based on a block chain.
In the embodiment of the invention, according to the received identity authentication request of the target user, the face recognition verification is carried out on the target user; when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through the face recognition verification is lower than a preset value, sending request information for requesting whether to invite social relation personnel to carry out auxiliary identity authentication to a target user; after receiving an approval instruction of the target user for the request information, acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user; sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user; receiving feedback information of the preset social relation personnel of each target user to the request information; when the feedback information exceeding the preset number indicates that the target user is the user, the identity authentication request of the target user is confirmed to pass, when the face identification authentication can not be carried out on the target user, the social relation personnel of the target user are passed, the identity authentication is assisted on the target user, the problem that the authentication fails easily due to the face identification authentication on middle-aged and old people in the prior art can be solved, the accuracy rate of the identity authentication of the middle-aged and old people can be improved, the business handling efficiency of the middle-aged and old people is indirectly improved, the use experience of the user is improved, and the more convenient identity identification of the user is facilitated.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a schematic flowchart of a method for authenticating a user identity based on a blockchain according to an embodiment of the present invention;
fig. 2 is a diagram illustrating a specific example of a method for user identity authentication based on a block chain according to an embodiment of the present invention;
fig. 3 is a diagram illustrating a specific example of a method for user identity authentication based on a blockchain according to an embodiment of the present invention;
fig. 4 is a diagram illustrating a specific example of a method for user identity authentication based on a block chain according to an embodiment of the present invention;
fig. 5 is a diagram illustrating a specific example of a method for user identity authentication based on a block chain according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a block chain-based user identity authentication apparatus according to an embodiment of the present invention;
fig. 7 is a diagram illustrating an embodiment of a block chain-based user identity authentication apparatus according to the present invention;
fig. 8 is a diagram illustrating an embodiment of a block chain-based user identity authentication apparatus according to the present invention;
fig. 9 is a diagram illustrating an embodiment of a block chain-based user identity authentication apparatus according to the present invention;
fig. 10 is a schematic diagram of a computer device for user identity authentication based on a blockchain according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
The term "and/or" herein merely describes an associative relationship, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
In the description of the present specification, the terms "comprising," "including," "having," "containing," and the like are used in an open-ended fashion, i.e., to mean including but not limited to. Reference to the description of the terms "one embodiment," "a particular embodiment," "some embodiments," "for example," etc., means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. The sequence of steps involved in the embodiments is for illustrative purposes to illustrate the implementation of the present application, and the sequence of steps is not limited and can be adjusted as needed.
According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
The modern society science and technology is rapidly developed, and the online handling of various services brings convenience to the masses and workers, but is not very friendly to middle-aged people and old people. Especially for the old, many people can not follow the system to make various instructions within the specified time, and the authentication is easy to fail, which affects the life.
Furthermore, the existing identity recognition technology only considers around recognition and focuses on improving the accuracy of a recognition result. However, different requirements of different people are neglected in the prior art, a more suitable identification mode which is specially aimed at the people with difficult face identification such as the old people does not exist in the field of face identification, and the old people are not very suitable for an identification system of the common public due to objective and subjective reasons.
In order to solve the above problem, an embodiment of the present invention provides a user identity authentication method based on a block chain, so as to improve accuracy of identity authentication for middle-aged and elderly people, improve business handling efficiency of middle-aged and elderly people, and improve user experience, and referring to fig. 1, the method may include:
step 101: according to the received identity authentication request of the target user, carrying out face recognition verification on the target user;
step 102: when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through face recognition verification is lower than a preset value, sending request information for requesting whether to invite social relation personnel to carry out auxiliary identity authentication to a target user;
step 103: after receiving an approval instruction of the target user for the request information, acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user;
step 104: sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user;
step 105: receiving feedback information of the preset social relation personnel of each target user to the request information;
step 106: and when the feedback information exceeding the preset number indicates that the target user is the user owner, confirming that the identity authentication request of the target user passes.
In the embodiment of the invention, according to the received identity authentication request of the target user, the face recognition verification is carried out on the target user; when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through the face recognition verification is lower than a preset value, sending request information for requesting whether to invite social relation personnel to carry out auxiliary identity authentication to a target user; after receiving an approval instruction of the target user for the request information, acquiring a preset social relation person of the target user from the block chain based on the identity information of the target user; sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user; receiving feedback information of the preset social relation personnel of each target user to the request information; when feedback information exceeding the preset number indicates that the target user is the user owner, the identity authentication request of the target user is confirmed to pass, when the face identification authentication cannot be carried out on the target user, the social relation personnel of the target user are passed, the identity authentication is assisted on the target user, the problem that the authentication fails easily due to the fact that the face identification authentication is carried out on middle-aged and old people in the prior art can be solved, the accuracy rate of carrying out the identity authentication on the middle-aged and old people can be improved, the business handling efficiency of the middle-aged and old people is indirectly improved, the use experience of the user is improved, and more convenient identity identification of the user is facilitated.
In specific implementation, firstly, according to the received identity authentication request of the target user, the face recognition verification is carried out on the target user.
In the embodiment, the target user can be determined whether to need auxiliary identity authentication by performing face recognition verification on the target user, so that people of related groups, such as users with incomplete facial organs and/or ages exceeding a preset value, can be better assisted for identity authentication.
In one embodiment, the target user includes: a user whose facial organs are incomplete, and/or whose age exceeds a preset value.
In one embodiment, performing face recognition verification on the target user according to the received identity authentication request of the target user, as shown in fig. 2, includes:
step 201: acquiring target user face data of a target user according to a received identity authentication request of the target user;
step 202: acquiring identity information of a target user from an identity authentication request of the target user;
step 203: acquiring reserved face data of a target user from a corresponding user node corresponding to the identity information of the target user in a block chain according to the identity information of the target user;
step 204: and matching the face data of the target user with the reserved face data of the target user to obtain a face matching value.
In one embodiment, a deep learning model can be established based on a 3D face recognition algorithm of a neural network, so that face recognition verification is carried out; further, a deep learning model may be built based on training the dataset and the algorithm that expands the dataset, and using the big data to grab and clean the relevant data.
In the process of carrying out face recognition verification by using the deep learning model, the operation conditions of the server can be monitored, and the operation conditions comprise network conditions, sCPU and memory information, and node performance indexes such as overall information, cpu load, HTTP service state, SSH service state, zombie process number, disk IO rate and the like of disk occupation statistics, so that the performance of the machine in the process of model training and use can be adjusted according to the basic performance indexes, and the recognition efficiency of the algorithm can be adjusted. Wherein, the larger the data amount is, the higher the performance requirement of the device is.
In the above embodiment, according to the identity information of the target user, the reserved face data of the target user may be obtained from the corresponding user node corresponding to the identity information of the target user in the block chain, and the face data of the target user may be matched with the reserved face data of the target user in the subsequent steps to obtain a face matching value, so that it may be determined whether the target user needs to perform auxiliary identity authentication, and thus, the relevant group may be better assisted to perform identity authentication.
In specific implementation, after the face recognition verification is performed on the target user according to the received identity authentication request of the target user, when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through the face recognition verification is lower than the preset value, the target user is sent with request information for requesting whether to invite the social relation personnel to perform auxiliary identity authentication.
In the embodiment, the target user can be asked whether to invite the social relation personnel to perform the auxiliary identity authentication by sending the solicitation information for asking whether to invite the social relation personnel to perform the auxiliary identity authentication to the target user, which is helpful for protecting the privacy of the client.
In specific implementation, after the request information for requesting whether to invite the social relation personnel to perform the auxiliary identity authentication is sent to the target user, and after the approval instruction of the target user for the request information is received, the preset social relation personnel of the target user is obtained from the block chain based on the identity information of the target user.
In one embodiment, as shown in fig. 3, the method further includes:
step 301: based on big data technology, creating a user database corresponding to a target user; the user database comprises life trace information and social relationship information of corresponding users;
step 302: determining preset social relation personnel of the target user according to a user database corresponding to the target user;
step 303: storing preset social relation personnel of the target user to a user node corresponding to the target user in the block chain; the user node includes identity information of the user.
In the above embodiment, the contact information of the preset social relationship person of the target user may also be stored into the user node corresponding to the target user in the blockchain.
In one embodiment, the method further comprises:
and establishing an association relationship between the received feedback information of the preset social relation personnel of each target user to the request information and the result of confirming that the identity authentication request of the target user passes, and correspondingly uploading the association relationship to a user node corresponding to the target user in the block chain.
In the above embodiment, the following may be saved in the user node corresponding to the target user in the blockchain: and the preset social relation personnel of each target user establishes an association relationship with the feedback information of the request information and the result of confirming the passing of the identity authentication request of the target user.
In one embodiment, the auxiliary identity authentication is as follows: and authenticating the identity of the user by means of the results of questionnaire survey, short message verification, identity information check and/or photo visual identification performed by social relation personnel of the user.
In the above embodiment, the social relation person may be issued an assisted authentication notification by using a questionnaire, short message verification, information verification, photo identification, or the like.
In one embodiment, issuing a request message for requesting whether to invite the social relationship person to perform the auxiliary identity authentication to the target user includes:
sending request information for requesting whether to invite the social relation personnel to carry out auxiliary identity authentication to a target user in a voice broadcasting mode;
after receiving an approval instruction of the target user for the request information, acquiring a preset social relationship person of the target user from the blockchain based on the identity information of the target user, as shown in fig. 4, including:
step 401: after the solicitation information is broadcasted in a voice mode, voice recognition is carried out on feedback voice of a user;
step 402: when the voice recognition result shows that the target user agrees to carry out auxiliary identity authentication, confirming to obtain an approval instruction of the target user for the request information; and acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user.
In the embodiment, the target user can be asked whether to invite the social relation personnel to perform auxiliary identity authentication by sending the solicitation information for soliciting whether to invite the social relation personnel to perform auxiliary identity authentication in a voice broadcast mode, so that the inquiry of the target user is realized, and the identity authentication of the middle-aged and elderly people is facilitated.
In the embodiment of the invention, the big data technology is introduced to help the auxiliary authentication, and the block chain technology is introduced to help the storage of the identification result, prevent the impersonation and the imitation, and is safer in application. Specifically, a user database can be created by using big data technology, and life traces and social relationship information corresponding to the user can be searched out and recorded on the internet.
The life track information and the social relationship information are auxiliary authentication means and are used for identifying the identity of the user. Such as: when the user has a track coincident with a social relation at a certain moment or a certain thing is completed together with the social relation, the social relation can be subjected to auxiliary authentication (question answering or user authentication).
The big data technology can analyze the collected user data to find the available social relationship of the user, so that the big data is also used for searching user traces and can be used as a mode of auxiliary authentication.
In one embodiment, the method further comprises:
and establishing an association relationship between the received feedback information of the preset social relation personnel of each target user to the request information and the result of confirming that the identity authentication request of the target user passes, and correspondingly uploading the association relationship to a user node corresponding to the target user in the block chain.
In specific implementation, after receiving an approval instruction of the target user for the request information, based on the identity information of the target user, after acquiring the preset social relationship personnel of the target user from the block chain, the request information carrying the auxiliary identity authentication request is sent to the preset social relationship personnel of each target user.
In the embodiment, request information carrying an auxiliary identity authentication request is sent to the preset social relation personnel of each target user, and the target user is subjected to auxiliary identity authentication through the social relation personnel of the target user, so that the problem that the face recognition authentication aiming at the middle-aged and the old people is easy to fail in the prior art can be solved, and the accuracy of the identity authentication of the middle-aged and the old people can be improved.
In specific implementation, after request information carrying an auxiliary identity authentication request is sent to the preset social relation personnel of each target user, feedback information of the preset social relation personnel of each target user to the request information is received.
In one embodiment, the sending request information carrying a request for assisting identity authentication to a preset social relationship person of each target user includes:
the auxiliary identity authentication comprises the following steps: sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user according to the photo identification result of the social relation personnel of the user and the identity authentication of the user; the auxiliary identity authentication request carries target user face data for carrying out face identification verification on a target user;
receiving feedback information of the preset social relation personnel of each target user to the request information, wherein the feedback information comprises the following steps:
and receiving preset social relation personnel of each target user and determining whether the face data of the target user is feedback information of the user.
In one embodiment, as shown in fig. 5, the method further includes:
step 501: when the identity authentication request of the target user is confirmed to pass, feedback information is acquired to indicate that the target user is not a target preset social relation person of the user;
step 502: and sending alarm information that the target preset social relation personnel cannot accurately perform auxiliary identity authentication.
In the above embodiment, the blockchain is used to query the authentication result, and if an authentication error is found, the error data on the blockchain is downloaded to constrain the social relatives performing the auxiliary authentication or correct the social information. And after the authentication fails, feedback information is acquired to indicate that the target user does not preset social relation personnel for the target of the user.
In specific implementation, after feedback information of the preset social relation personnel of each target user to the request information is received, when the feedback information exceeding the preset number indicates that the target user is the user owner, the identity authentication request of the target user is confirmed to pass.
In one example, if the face recognition result and the auxiliary authentication result are opposite, a social relation person can be added to perform auxiliary authentication, and if the opposite result is still obtained, the identity authentication of the user is regarded as failure, and a worker needs to verify the identity offline.
And if the final authentication result is inconsistent with the auxiliary authentication result given by the social relation person, the terminal is regarded as authentication failure.
In practical application, the auxiliary authentication error information of the social relation people can be recorded on a block chain, the social relation people are restrained to be regarded as the distrusted people after more than 3 times of auxiliary authentication failures, and the information is written into a personal information base;
if the authentication is wrong due to the change of the social relationship, the authentication needs to be removed from the social relationship personnel associated with the user.
A specific embodiment is given below to illustrate a specific application of the method of the present invention, and in this embodiment, the following steps may be included:
1. the face recognition algorithm is used for identity authentication, and for the old who is easy to authenticate and high in adaptability, if authentication can be successfully performed, the authentication is finished;
2. if the face recognition technology fails more than 5 times or the error of the recognition result is too large and the reliability is not high, searching the social relationship and the social track corresponding to the user by using big data, asking the user to carry out auxiliary authentication on the user by using social relationship people, and storing the authentication result of the user on a chain; the method comprises the following steps of storing identification results of all users each time and related relation information by using a block chain technology; meanwhile, the big data can be used for searching the auxiliary authenticator and the auxiliary authentication information of the user;
the case that the error is too large and the reliability is not high may include: the recognition result is the person himself, but the face recognition is not recognized or the face recognition becomes another person;
3. combining the face recognition result and the auxiliary authentication result to give a conclusion of success or failure of user authentication, and storing the whole recognition process on a chain;
4. inquiring an authentication result by using the block chain, and if an authentication error is found, downloading error data on the block chain so as to restrict social relation persons who perform auxiliary authentication or correct social information; if the authentication result is objected, the authentication process can be searched from the block chain, so that the staff is assisted to trace the identity verification process.
In the above embodiment, if the user who is successfully identified directly in the face recognition scene does not need to perform the auxiliary authentication, the functions may be changed or deleted according to the actual situation, and the result is directly stored in the block chain.
Of course, it is understood that other variations of the above detailed flow can be made, and all such variations are intended to fall within the scope of the present invention.
In the embodiment of the invention, according to the received identity authentication request of the target user, the face recognition verification is carried out on the target user; when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through the face recognition verification is lower than a preset value, sending request information for requesting whether to invite social relation personnel to carry out auxiliary identity authentication to a target user; after receiving an approval instruction of the target user for the request information, acquiring a preset social relation person of the target user from the block chain based on the identity information of the target user; sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user; receiving feedback information of the preset social relation personnel of each target user to the request information; when the feedback information exceeding the preset number indicates that the target user is the user, the identity authentication request of the target user is confirmed to pass, when the face identification authentication can not be carried out on the target user, the social relation personnel of the target user are passed, the identity authentication is assisted on the target user, the problem that the authentication fails easily due to the face identification authentication on middle-aged and old people in the prior art can be solved, the accuracy rate of the identity authentication of the middle-aged and old people can be improved, the business handling efficiency of the middle-aged and old people is indirectly improved, the use experience of the user is improved, and the more convenient identity identification of the user is facilitated.
As described above, the conventional identity recognition technology only considers around recognition itself, and focuses on improving the accuracy of the recognition result. However, different requirements of different people are ignored in the current technology, a more suitable identification mode for identifying people with difficult faces such as the old is not available in the field of face identification, and the old is not very suitable for an identification system of the common public due to objective and subjective reasons. The embodiment of the invention helps to assist in authentication by introducing the big data technology, and simultaneously, the block chain technology is introduced to help to store the identification result, so that impersonation and imitation can be prevented, and the application is safer. Therefore, the embodiment of the invention can collect the available social relationship of the old people by using big data when the face identification cannot identify the identity or the identity is difficult to identify, and simultaneously transmit the auxiliary authentication result and the information of the main line person to the block chain through the auxiliary authentication of the social relationship person and the social information, thereby ensuring the irrediformability and the traceability of the authentication result, simultaneously saving the identification information of all users using the system, including the information of the social relationship person, greatly improving the accuracy of the identity identification of the old people and helping to identify the identity more conveniently.
The embodiment of the invention also provides a user identity authentication device based on the block chain, which is as described in the following embodiments. Because the principle of the device for solving the problems is similar to the block chain-based user identity authentication method, the implementation of the device can refer to the implementation of the block chain-based user identity authentication method, and repeated parts are not described again.
An embodiment of the present invention further provides a block chain-based user identity authentication device, which is used to improve the accuracy of identity authentication for middle-aged and elderly people, improve the business handling efficiency of middle-aged and elderly people, and improve the user experience, as shown in fig. 6, the device includes:
the face recognition verification module 601 is configured to perform face recognition verification on a target user according to a received identity authentication request of the target user;
an invitation information sending module 602, configured to send an invitation information for asking whether to invite a social contact person to perform auxiliary identity authentication to a target user when the face recognition verification failure times exceed a preset number and/or a face matching value obtained through the face recognition verification is lower than a preset value;
the preset social relation person determining module 603 is configured to, after receiving an approval instruction of the target user for the request information, obtain a preset social relation person of the target user from the blockchain based on the identity information of the target user;
a request information sending module 604, configured to send request information carrying an auxiliary identity authentication request to a preset social relationship person of each target user;
a feedback information receiving module 605, configured to receive feedback information of the preset social relationship personnel of each target user to the request information;
and the identity authentication module 606 is configured to, when the feedback information exceeding the preset number indicates that the target user is the user owner, confirm that the identity authentication request of the target user passes.
In one embodiment, the auxiliary identity authentication is as follows: and authenticating the identity of the user by means of the results of questionnaire survey, short message verification, identity information check and/or photo visual identification performed by social relation personnel of the user.
In one embodiment, the solicitation information sending module is specifically configured to:
sending request information for requesting whether to invite the social relation personnel to carry out auxiliary identity authentication to a target user in a voice broadcasting mode;
the preset social relationship person determination module is specifically configured to:
after the solicitation information is broadcasted in a voice mode, voice recognition is carried out on feedback voice of a user;
when the voice recognition result shows that the target user agrees to carry out auxiliary identity authentication, confirming to obtain an approval instruction of the target user for the request information; and acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user.
In one embodiment, as shown in fig. 7, further includes:
a preset social relationship personnel saving module 701, configured to:
based on big data technology, creating a user database corresponding to a target user; the user database comprises life trace information and social relationship information of corresponding users;
determining preset social relation personnel of the target user according to a user database corresponding to the target user;
storing preset social relation personnel of the target user to a user node corresponding to the target user in the block chain; the user node includes identity information of the user.
In one embodiment, as shown in fig. 8, further includes:
a data storage module 801 for:
and establishing an association relationship between the received feedback information of the preset social relation personnel of each target user to the request information and the result of confirming that the identity authentication request of the target user passes, and correspondingly uploading the association relationship to a user node corresponding to the target user in the block chain.
In one embodiment, the request information sending module is specifically configured to:
the auxiliary identity authentication comprises the following steps: sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user according to the photo identification result of the social relation personnel of the user and the user identity authentication; the auxiliary identity authentication request carries target user face data for carrying out face identification verification on a target user;
the feedback information receiving module is specifically configured to:
and receiving preset social relation personnel of each target user and determining whether the face data of the target user is feedback information of the user.
In one embodiment, as shown in fig. 9, further includes:
an alarm module 901, configured to:
when the identity authentication request of the target user is confirmed to pass, feedback information is acquired to indicate that the target user is not a target preset social relation person of the user;
and sending alarm information that the target preset social relation personnel cannot accurately perform auxiliary identity authentication.
In one embodiment, the target user includes: a user whose facial organs are incomplete, and/or whose age exceeds a preset value.
In one embodiment, the face recognition verification module is specifically configured to:
acquiring target user face data of a target user according to a received identity authentication request of the target user;
acquiring identity information of a target user from an identity authentication request of the target user;
acquiring reserved face data of a target user from a corresponding user node corresponding to the identity information of the target user in a block chain according to the identity information of the target user;
and matching the face data of the target user with the reserved face data of the target user to obtain a face matching value.
An embodiment of the present invention provides a computer device for implementing all or part of contents in the user identity authentication method based on a blockchain, where the computer device specifically includes the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission between related devices; the computer device may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the computer device may be implemented with reference to the embodiment for implementing the method for user identity authentication based on a blockchain and the embodiment for implementing the apparatus for user identity authentication based on a blockchain in the embodiments, and the contents thereof are incorporated herein, and repeated details are not repeated.
Fig. 10 is a schematic block diagram of a system configuration of a computer apparatus 1000 according to an embodiment of the present application. As shown in fig. 10, the computer apparatus 1000 may include a central processing unit 1001 and a memory 1002; the memory 1002 is coupled to the cpu 1001. Notably, this fig. 10 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the user identity authentication function based on the blockchain may be integrated into the central processor 1001. The cpu 1001 may be configured to perform the following control:
according to the received identity authentication request of the target user, carrying out face recognition verification on the target user;
when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through the face recognition verification is lower than a preset value, sending request information for requesting whether to invite social relation personnel to carry out auxiliary identity authentication to a target user;
after receiving an approval instruction of the target user for the request information, acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user;
sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user;
receiving feedback information of the preset social relation personnel of each target user to the request information;
and when the feedback information exceeding the preset number indicates that the target user is the user owner, confirming that the identity authentication request of the target user passes. In another embodiment, the user identity authentication device based on the blockchain may be configured separately from the central processor 1001, for example, the user identity authentication device based on the blockchain may be configured as a chip connected to the central processor 1001, and the user identity authentication function based on the blockchain is implemented by the control of the central processor.
As shown in fig. 10, the computer apparatus 1000 may further include: a communication module 1003, an input unit 1004, an audio processor 1005, a display 1006, a power supply 1007. It is noted that the computer device 1000 does not necessarily include all of the components shown in FIG. 10; furthermore, the computer device 1000 may also comprise components not shown in fig. 10, which can be referred to in the prior art.
As shown in fig. 10, the central processing unit 1001, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, and the central processing unit 1001 receives input and controls the operation of the various components of the computer apparatus 1000.
The memory 1002 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the cpu 1001 can execute the program stored in the memory 1002 to realize information storage or processing, or the like.
The input unit 1004 provides input to the cpu 1001. The input unit 1004 is, for example, a key or a touch input device. The power supply 1007 is used to supply power to the computer apparatus 1000. The display 1006 is used for displaying display objects such as images and characters. The display may be, for example, but is not limited to, an LCD display.
The memory 1002 may be a solid state memory such as Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 1002 may also be some other type of device. Memory 1002 includes buffer memory 1021 (sometimes referred to as a buffer). The memory 1002 may include an application/function storage part 1022, the application/function storage part 1022 being used for storing application programs and function programs or a flow for executing the operation of the computer device 1000 by the central processing unit 1001.
The memory 1002 may also include a data store 1023, the data store 1023 being used to store data such as contacts, digital data, pictures, sounds and/or any other data used by the computer device. Driver storage 1024 of memory 1002 may include various drivers for the computer device for communication functions and/or for performing other functions of the computer device (e.g., messaging applications, directory applications, etc.).
The communication module 1003 is a transmitter/receiver 1003 that transmits and receives signals via an antenna 1008. A communication module (transmitter/receiver) 1003 is coupled to the central processor 1001 to provide an input signal and receive an output signal, which may be the same as the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 1003, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same computer device. The communication module (transmitter/receiver) 1003 is also coupled to a speaker 1009 and a microphone 1010 via an audio processor 1005 to provide audio output via the speaker 1009 and receive audio input from the microphone 1010 to implement general telecommunications functions. The audio processor 1005 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 1005 is also coupled to the central processor 1001, so that sound can be recorded locally through the microphone 1010, and so that locally stored sound can be played through the speaker 1009.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for authenticating a user identity based on a block chain is implemented.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when executed by a processor, the computer program implements the user identity authentication method based on the block chain.
In the embodiment of the invention, according to the received identity authentication request of the target user, the face recognition verification is carried out on the target user; when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through the face recognition verification is lower than a preset value, sending request information for requesting whether to invite social relation personnel to carry out auxiliary identity authentication to a target user; after receiving an approval instruction of the target user for the request information, acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user; sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user; receiving feedback information of the preset social relation personnel of each target user to the request information; when feedback information exceeding the preset number indicates that the target user is the user owner, the identity authentication request of the target user is confirmed to pass, when the face identification authentication cannot be carried out on the target user, the social relation personnel of the target user are passed, the identity authentication is assisted on the target user, the problem that the authentication fails easily due to the fact that the face identification authentication is carried out on middle-aged and old people in the prior art can be solved, the accuracy rate of carrying out the identity authentication on the middle-aged and old people can be improved, the business handling efficiency of the middle-aged and old people is indirectly improved, the use experience of the user is improved, and more convenient identity identification of the user is facilitated.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, it should be understood that the above embodiments are only examples of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (21)

1. A user identity authentication method based on a block chain is characterized by comprising the following steps:
according to the received identity authentication request of the target user, carrying out face recognition verification on the target user;
when the face recognition verification failure times exceed the preset times and/or the face matching value obtained through the face recognition verification is lower than a preset value, sending request information for requesting whether to invite social relation personnel to carry out auxiliary identity authentication to a target user;
after receiving an approval instruction of the target user for the request information, acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user;
sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user;
receiving feedback information of the preset social relation personnel of each target user to the request information;
and when the feedback information exceeding the preset number indicates that the target user is the user owner, confirming that the identity authentication request of the target user passes.
2. The method of claim 1, wherein the secondary identity authentication is: and authenticating the identity of the user by means of the results of questionnaire survey, short message verification, identity information check and/or photo visual identification performed by social relation personnel of the user.
3. The method of claim 1, wherein issuing solicitation information to the target user for soliciting whether to invite social relationship people for assisted identity authentication comprises:
sending request information for requesting whether to invite the social relation personnel to carry out auxiliary identity authentication to a target user in a voice broadcasting mode;
after receiving an approval instruction of the target user for the request information, acquiring preset social relationship personnel of the target user from the blockchain based on the identity information of the target user, wherein the method comprises the following steps:
after the solicitation information is broadcasted in a voice mode, voice recognition is carried out on feedback voice of a user;
when the voice recognition result shows that the target user agrees to perform auxiliary identity authentication, confirming to obtain an approval instruction of the target user for the request information; and acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user.
4. The method of claim 1, further comprising:
based on big data technology, creating a user database corresponding to a target user; the user database comprises life trace information and social relationship information of corresponding users;
determining preset social relation personnel of the target user according to a user database corresponding to the target user;
storing preset social relation personnel of the target user to a user node corresponding to the target user in the block chain; the user node includes identity information of the user.
5. The method of claim 1, further comprising:
and establishing an association relationship between the received feedback information of the preset social relation personnel of each target user to the request information and the result of confirming that the identity authentication request of the target user passes, and correspondingly uploading the association relationship to a user node corresponding to the target user in the block chain.
6. The method of claim 1, wherein sending a request message carrying a supplementary identity authentication request to a predetermined social relationship person of each target user comprises:
the auxiliary identity authentication comprises the following steps: sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user according to the photo identification result of the social relation personnel of the user and the user identity authentication; the auxiliary identity authentication request carries target user face data for carrying out face identification verification on a target user;
receiving feedback information of the preset social relation personnel of each target user to the request information, wherein the feedback information comprises the following steps:
and receiving preset social relation personnel of each target user and determining whether the face data of the target user is feedback information of the user.
7. The method of claim 1, further comprising:
when the identity authentication request of the target user is confirmed to pass, feedback information is obtained to indicate that the target user is not a target preset social relation person of the user;
and sending alarm information that the target preset social relation personnel cannot accurately perform auxiliary identity authentication.
8. The method of claim 1, wherein the target user comprises: a user whose facial organs are incomplete, and/or whose age exceeds a preset value.
9. The method of claim 1, wherein performing face recognition verification on the target user according to the received identity authentication request of the target user comprises:
acquiring target user face data of a target user according to a received identity authentication request of the target user;
acquiring identity information of a target user from an identity authentication request of the target user;
acquiring reserved face data of a target user from a corresponding user node corresponding to the identity information of the target user in a block chain according to the identity information of the target user;
and matching the face data of the target user with the reserved face data of the target user to obtain a face matching value.
10. A user identity authentication device based on a block chain is characterized by comprising:
the face recognition and verification module is used for carrying out face recognition and verification on the target user according to the received identity authentication request of the target user;
the system comprises an invitation information sending module, a social relation person identification module and a face recognition and verification module, wherein the invitation information sending module is used for sending an invitation message for asking whether to invite the social relation person to perform auxiliary identity authentication to a target user when the face recognition and verification failure times exceed a preset number and/or a face matching value obtained through face recognition and verification is lower than a preset value;
the preset social relation person determining module is used for acquiring preset social relation persons of the target user from the block chain based on the identity information of the target user after receiving an approval instruction of the target user for the request information;
the request information sending module is used for sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user;
the feedback information receiving module is used for receiving feedback information of the preset social relation personnel of each target user to the request information;
and the identity authentication module is used for confirming that the identity authentication request of the target user passes when the feedback information exceeding the preset number indicates that the target user is the user.
11. The apparatus of claim 10, wherein the secondary identity authentication is: and performing user identity authentication by means of results of questionnaire survey, short message verification, identity information check and/or photo visual identification performed by social relation personnel of the user.
12. The apparatus of claim 10, wherein the solicitation information sending module is specifically configured to:
sending request information for requesting whether to invite the social relation personnel to carry out auxiliary identity authentication to a target user in a voice broadcasting mode;
the preset social relationship person determination module is specifically configured to:
after the solicitation information is broadcasted in a voice mode, voice recognition is carried out on feedback voice of a user;
when the voice recognition result indicates that the target user agrees to perform the auxiliary identity authentication, confirming to obtain an approval instruction of the target user for the request information; and acquiring preset social relation personnel of the target user from the block chain based on the identity information of the target user.
13. The apparatus of claim 10, further comprising:
the preset social relationship personnel storage module is used for:
based on big data technology, creating a user database corresponding to a target user; the user database comprises life trace information and social relationship information of corresponding users;
determining preset social relation personnel of the target user according to a user database corresponding to the target user;
storing preset social relation personnel of the target user to a user node corresponding to the target user in the block chain; the user node includes identity information of the user.
14. The apparatus of claim 10, further comprising:
a data storage module to:
and establishing an association relationship between the received feedback information of the preset social relation personnel of each target user to the request information and the result of confirming that the identity authentication request of the target user passes, and correspondingly uploading the association relationship to a user node corresponding to the target user in the block chain.
15. The apparatus of claim 10, wherein the request message sending module is specifically configured to:
the auxiliary identity authentication comprises the following steps: sending request information carrying auxiliary identity authentication requests to preset social relation personnel of each target user according to the photo identification result of the social relation personnel of the user and the identity authentication of the user; the auxiliary identity authentication request carries target user face data for carrying out face identification verification on a target user;
the feedback information receiving module is specifically configured to:
and receiving preset social relation personnel of each target user and determining whether the face data of the target user is feedback information of the user.
16. The apparatus of claim 10, further comprising:
an alarm module for:
when the identity authentication request of the target user is confirmed to pass, feedback information is acquired to indicate that the target user is not a target preset social relation person of the user;
and sending alarm information that the target preset social relation personnel cannot accurately perform auxiliary identity authentication.
17. The apparatus of claim 10, wherein the target user comprises: a user whose facial organs are incomplete, and/or whose age exceeds a preset value.
18. The apparatus of claim 10, wherein the face recognition verification module is specifically configured to:
acquiring target user face data of a target user according to a received identity authentication request of the target user;
acquiring identity information of a target user from an identity authentication request of the target user;
acquiring reserved face data of a target user from a corresponding user node corresponding to the identity information of the target user in a block chain according to the identity information of the target user;
and matching the face data of the target user with the reserved face data of the target user to obtain a face matching value.
19. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1 to 9 when executing the computer program.
20. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any one of claims 1 to 9.
21. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 9.
CN202210605868.9A 2022-05-31 2022-05-31 Block chain-based user identity authentication method and device Pending CN115022016A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210605868.9A CN115022016A (en) 2022-05-31 2022-05-31 Block chain-based user identity authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210605868.9A CN115022016A (en) 2022-05-31 2022-05-31 Block chain-based user identity authentication method and device

Publications (1)

Publication Number Publication Date
CN115022016A true CN115022016A (en) 2022-09-06

Family

ID=83071289

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210605868.9A Pending CN115022016A (en) 2022-05-31 2022-05-31 Block chain-based user identity authentication method and device

Country Status (1)

Country Link
CN (1) CN115022016A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468948A (en) * 2015-12-09 2016-04-06 广州广电运通金融电子股份有限公司 Method for identifying identity through social relation
CN106559387A (en) * 2015-09-28 2017-04-05 腾讯科技(深圳)有限公司 A kind of auth method and device
WO2017190668A1 (en) * 2016-05-05 2017-11-09 腾讯科技(深圳)有限公司 Identity verification method and device
CN108683646A (en) * 2018-04-28 2018-10-19 厦门美图之家科技有限公司 A kind of authentication method and computing device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559387A (en) * 2015-09-28 2017-04-05 腾讯科技(深圳)有限公司 A kind of auth method and device
CN105468948A (en) * 2015-12-09 2016-04-06 广州广电运通金融电子股份有限公司 Method for identifying identity through social relation
WO2017190668A1 (en) * 2016-05-05 2017-11-09 腾讯科技(深圳)有限公司 Identity verification method and device
CN108683646A (en) * 2018-04-28 2018-10-19 厦门美图之家科技有限公司 A kind of authentication method and computing device

Similar Documents

Publication Publication Date Title
US11706165B2 (en) Personalized chatbots for inmates
CN109902575B (en) Anti-walking method and device based on unmanned vehicle and related equipment
US10235509B2 (en) Methods and systems for a voice ID verification database and service in social networking and commercial business transactions
CN107393541B (en) Information verification method and device
CN112132292A (en) Block chain-based longitudinal federated learning data processing method, device and system
CN106850794A (en) Method and apparatus, server and terminal for operating group
US10541951B2 (en) Enhancing network messaging with a real-time, interactive representation of current messaging activity of a user's contacts and associated contacts
CN104065564A (en) Method and device used for questioning and answering
CN107182042B (en) Short message channel quality evaluation method, device, medium and system
CN110912978A (en) Sign-in information generation method and system
CN114227702A (en) Intelligent conference guiding method and device based on robot and robot
CN114244793A (en) Information processing method, device, equipment and storage medium
CN115022016A (en) Block chain-based user identity authentication method and device
CN114157763A (en) Information processing method and device in interactive process, terminal and storage medium
CN115546952A (en) Method and device for managing parent access through cloud, electronic equipment and storage medium
CN114936924A (en) Bank card password retrieving method and device based on block chain
CN111193939B (en) Online video mutual-help method and device, electronic equipment and storage medium
CN115022030B (en) Bank business handling request processing method and device based on blockchain
CN108183723A (en) A kind of driving school's supervisory systems and method based on Application on Voiceprint Recognition
CN109660988A (en) Communicate authentication processing method, device and electronic equipment
JP2008262271A (en) Attendance confirmation method and attendance confirmation system
CN115065944B (en) Conference information notification method, 5G message center and computer readable storage medium
CN108055193A (en) Using activity as the communication means of medium
CN113781028A (en) Block chain-based accumulation fund extraction method and device
CN113159786A (en) Mobile banking transaction data processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination