TW202008199A - Identity authentication method and apparatus, and computing device and storage medium - Google Patents

Identity authentication method and apparatus, and computing device and storage medium Download PDF

Info

Publication number
TW202008199A
TW202008199A TW108117329A TW108117329A TW202008199A TW 202008199 A TW202008199 A TW 202008199A TW 108117329 A TW108117329 A TW 108117329A TW 108117329 A TW108117329 A TW 108117329A TW 202008199 A TW202008199 A TW 202008199A
Authority
TW
Taiwan
Prior art keywords
identification information
verification
identified
information
verification information
Prior art date
Application number
TW108117329A
Other languages
Chinese (zh)
Inventor
李發貴
劉曉瑩
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202008199A publication Critical patent/TW202008199A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Collating Specific Patterns (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Provided are an identity authentication method and apparatus, and a computing device and a storage medium. The method comprises: receiving an image to be recognized; then recognizing first identification information and second identification information in the image to be recognized, wherein a combination of the first identification information and the second identification information is used for confirming an object to be recognized; and if the first identification information and the second identification information match pre-stored first authentication information and second authentication information of the object to be recognized, confirming that the object to be recognized passes authentication.

Description

身份驗證方法及裝置、電腦設備及儲存媒體Identity verification method and device, computer equipment and storage medium

本發明涉及電腦安全技術領域,特別涉及一種身份驗證方法及裝置、一種電腦設備及儲存媒體。The invention relates to the technical field of computer security, in particular to an identity verification method and device, a computer device and a storage medium.

目前市場上使用條碼或二維條碼等方式作為商戶身份識別的手段,用於實現商家收錢等場景下,由於肉眼無法很好識別出來自己的條碼或二維條碼與其他人的條碼或二維條碼的差異,所以容易出現條碼或二維條碼被替換而導致商戶被釣魚、商家無法收到錢等問題。At present, bar codes or two-dimensional bar codes are used as a means of merchant identity recognition in the market. It is used to realize merchants collecting money. Because the naked eye cannot recognize their own bar codes or two-dimensional bar codes and other people's bar codes or two-dimensional bars. Bar code differences, so it is easy to appear bar code or two-dimensional bar code is replaced, resulting in merchants phishing, merchants can not receive money and other issues.

有鑑於此,本發明實施例提供了一種身份驗證方法及裝置、一種電腦設備及儲存媒體,以解決現有技術中存在的技術缺陷。 本發明實施例公開了一種身份驗證方法,所述方法包括: 接收待識別影像; 識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認; 若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。 另一方面,本發明實施例還提供了一種身份驗證裝置,包括: 接收模組,被配置為接收待識別影像; 識別模組,被配置為識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認; 第一判斷模組,被配置為若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。 另一方面,本發明還提供了一種電腦設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上運行的電腦指令,所述處理器執行時實現所述身份驗證方法的步驟。 另一方面,本發明還提供了一種電腦可讀儲存媒體,其儲存有電腦指令,該程式被處理器執行時實現所述身份驗證方法的步驟。 本發明提供的一種身份驗證方法及裝置、一種電腦設備及儲存媒體,其中,所述方法包括接收待識別影像;然後識別出所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認;若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。In view of this, embodiments of the present invention provide an identity verification method and device, a computer device, and a storage medium to solve the technical defects in the prior art. An embodiment of the present invention discloses an identity verification method. The method includes: Receive the image to be recognized; Identifying the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified; If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, it is confirmed that the object to be identified passes verification. On the other hand, an embodiment of the present invention also provides an identity verification device, including: The receiving module is configured to receive the image to be recognized; An identification module configured to identify the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified; A first judgment module configured to confirm that the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified Object passed verification. On the other hand, the present invention also provides a computer device, including a memory, a processor, and computer instructions stored on the memory and executable on the processor, and the processor implements the steps of the identity verification method when executed . On the other hand, the present invention also provides a computer-readable storage medium, which stores computer instructions, and when the program is executed by the processor, implements the steps of the identity verification method. The present invention provides an identity verification method and device, a computer device and a storage medium, wherein the method includes receiving an image to be identified; and then identifying the first identification information and the second identification information in the image to be identified, wherein , The combination of the first identification information and the second identification information is used to confirm the object to be identified; if the first identification information and the second identification information and the pre-stored first verification of the object to be identified If the information and the second verification information match, it is confirmed that the object to be recognized passes verification.

在下面的描述中闡述了很多具體細節以便於充分理解本發明。但是本發明能夠以很多不同於在此描述的其它方式來實施,本領域技術人員可以在不違背本發明內涵的情況下做類似推廣,因此本發明不受下面公開的具體實施的限制。 在本說明書一個或多個實施例中使用的用語是僅僅出於描述特定實施例的目的,而非旨在限制本說明書一個或多個實施例。在本說明書一個或多個實施例和所附申請專利範圍中所使用的單數形式的“一種”、“所述”和“該”也旨在包括多數形式,除非上下文清楚地表示其他含義。還應當理解,本說明書一個或多個實施例中使用的用語“及/或”是指並包含一個或多個相關聯的列出項目的任何或所有可能組合。 應當理解,儘管在本說明書一個或多個實施例中可能採用用語第一、第二、第三等來描述各種資訊,但這些資訊不應限於這些用語。這些用語僅用來將同一類型的資訊彼此區分開。例如,在不脫離本說明書一個或多個實施例範圍的情況下,第一也可以被稱為第二,類似地,第二也可以被稱為第一。取決於語境,如在此所使用的詞語“如果”可以被解釋成為“在……時”或“當……時”或“回應於確定”。 在本說明書一個或多個實施例中,提供了一種身份驗證方法及裝置、電腦設備和電腦儲存媒體,在下面的實施例中逐一進行詳細說明。 參見圖1,本說明書一個實施例提供了一種身份驗證的系統架構圖,包括網路102、註冊終端104、掃描終端106以及電腦設備108,其中,所述電腦設備108包括但不限於記憶體110、處理器112、通信介面114以及匯流排116。 所述網路102分別與所述註冊終端104、所述掃描終端106之間相互通信,所述網路102與所述電腦設備108通過所述通信介面114完成相互通信,所述掃描終端106與所述電腦設備108通過所述通信介面114完成相互通信。 所述處理器112、所述通信介面114和所述記憶體110通過所述匯流排116完成相互間的通信。 所述註冊終端104,被配置為向所述網路102傳送註冊資訊。 所述網路102,被配置為接受所述註冊終端104傳送的第一註冊資訊,並將所述第一註冊資訊通過所述通信介面114傳送至所述記憶體110中,還可以通過與展示設備通信後將所述第一註冊資訊經由展示設備處理後進行圖片展示。 所述掃描終端106,被配置為掃描經由展示設備處理後進行展示的圖片,然後將所述圖片通過所述通信介面114傳送至所述記憶體110中。 所述通信介面114,被配置為接收所述網路102的第一註冊資訊和所述掃描終端106的圖片,然後將所述第一註冊資訊和所述圖片傳送至所述記憶體110中。 所述通信介面114使得電腦設備108能夠經由一個或多個網路通信。這些網路的示例包括區域網路(LAN)、廣域網路(WAN)、個人區域網(PAN)或諸如網際網路的通信網路的組合。網路介面可以包括有線或無線的任何類型的網路介面(例如,網路介面卡(NIC))中的一個或多個,諸如IEEE802.11區域網路無線區域網路(WLAN)無線介面、全球微波互聯接入(Wi-MAX)介面、以太網介面、通用序列匯流排(USB)介面、蜂巢式網路介面、藍牙介面、近場通信(NFC)介面,等等。 所述記憶體110,被配置為儲存通信介面114通過匯流排116發送的第一註冊資訊和圖片以及儲存在記憶體110上並可在處理器112上運行的電腦指令。 所述處理器112,被配置為獲取儲存在記憶體110的第一註冊資訊和圖片後,執行儲存在記憶體110上的電腦指令,實現對所述待識別對象的驗證。 所述電腦設備108可以是任何類型的靜止或行動電腦設備,包括行動電腦或行動電腦設備(例如,平板電腦、個人數位助理、膝上型電腦、筆記型電腦、小筆電等)、行動電話(例如,智能手機)、可佩戴的電腦設備(例如,智能手錶、智能眼鏡等)或其他類型的行動設備,或者諸如桌上型電腦或PC的靜止電腦設備。 其中,處理器112可以執行圖2所示方法中的步驟。圖2是示出了說明書一個實施例提供的身份驗證方法的示意性流程圖,包括步驟202至步驟206。 步驟202:接收待識別影像。 本說明書一個或多個實施例中,所述待識別影像包括但不限於攜帶有文字、圖形或者特殊符號的影像。所述文字可以包括但不限於漢字、拼音、阿拉伯數位或其他各國語言符號等,所述影像可以包括但不限於平面影像、立體圖形或者幾何圖形等,可以是手繪圖形或製圖工具繪製的圖形等,所述特殊符號包括但不限於使用頻率較少且難以直接輸入的數學符號、單位符號、制表符號或者貨幣符號等。 本說明書一個或多個實施例中,接收待識別影像之前,還包括: 接收並儲存待識別對象的第一驗證資訊和第二驗證資訊,其中,所述第一驗證資訊和所述第二驗證資訊相對應。 本說明書一個或多個實施例中,所述第一驗證資訊和所述第二驗證資訊包括但不限於身份驗證資訊,所述身份驗證是指在電腦及電腦網路系統中確認操作者身份的過程,從而確定該使用者是否具有對某種資源的存取和使用權限,進而使電腦和網路系統的存取策略能夠可靠、有效地執行,防止攻擊者假冒合法使用者獲得資源的存取權限,保證系統和資料的安全,以及授權存取者的合法利益,所述身份驗證資訊包括有關一個人身份的任何資料,這些資料能夠幫助識別某個人的身份,如姓名、指紋或其他生物特徵資料、電子郵件位址、住址、電話號碼或社會安全號碼等。 實際應用中,所述第一驗證資訊和所述第二驗證資訊相對應,例如若所述第一驗證資訊為某個人的身份證號碼,所述第二驗證資訊則可以為所述身份證號碼對應的真實姓名,或者若所述第一驗證資訊為某個人的手機號碼,所述第二驗證資訊則可以為所述手機號碼對應的實名認證姓名。 以所述第一驗證資訊為某個人的手機號碼“13456789999”,所述第二驗證資訊為所述手機號碼對應的實名認證姓名“小a”為例進行說明,接收並儲存待識別對象的第一驗證資訊和第二驗證資訊包括接收並儲存待識別對象的第一驗證資訊“13456789999”和第二驗證資訊“小a”。 步驟204:識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。 本說明書一個或多個實施例中,所述第一標識資訊包括但不限於所述待識別對象的手機號碼或郵件位址,所述第二標識資訊包括但不限於所述待識別對象的真實姓名或註冊帳號;或者所述第一標識資訊包括但不限於所述待識別對象的真實姓名或註冊帳號,所述第二標識資訊包括但不限於所述待識別對象的手機號碼或郵件位址。 所述第一標識資訊和所述第二標識資訊其中的一個為唯一識別所述待識別對象身份的資訊,所述唯一識別所述待識別對象身份的資訊包括但不限於所述待識別對象的手機號碼或郵件位址。 本說明書一個或多個實施例中,可以根據實際應用選擇第一標識資訊或者所述第二標識資訊為唯一識別所述待識別對象身份的資訊,本發明對此不作任何限定。 本說明書一個或多個實施例中,所述第一標識資訊和所述第二標識資訊不相同,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。例如若所述第一標識資訊包括所述待識別對象的手機號碼“13456789999”,所述第二標識資訊包括所述待識別對象的姓名“小a”,則手機號碼“13456789999”和姓名“小a”的組合就可以用於對待識別對象進行確認。 步驟206:若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。 本說明書一個或多個實施例中,首先識別出所述待識別影像中的第一標識資訊和第二標識資訊,若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。 以預存的所述第一驗證資訊為手機號碼,所述第二驗證資訊為所述手機號碼對應的實名認證姓名為例進行說明,參見表1。 表1

Figure 108117329-A0304-0001
以表1可知,第一驗證資訊“13456789999”對應第二驗證資訊“小a”,第一驗證資訊“13433332222”對應第二驗證資訊“小b”,第一驗證資訊“13511112222”對應第二驗證資訊“小c”。 若識別出的所述待識別影像中的第一標識資訊為“13456789999”和第二標識資訊為“小a”,則可以確定所述第一標識資訊“13456789999”和所述第二標識資訊“小a”與預存的所述待識別對象的第一驗證資訊“13456789999”和第二驗證資訊“小a”相匹配,則確定所述待識別對象通過驗證。 若識別出的所述待識別影像中的第一標識資訊為“13456789999”和第二標識資訊為“小d”,則可以確定所述第一標識資訊“13456789999”和所述第二標識資訊“小d”與預存的所述待識別對象的第一驗證資訊和第二驗證資訊不匹配,則確定所述待識別對象未通過驗證。 本說明書一個或多個實施例中,所述身份驗證方法包括接收待識別影像;然後識別出所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認,並且所述第一標識資訊和所述第二標識資訊為能夠通過肉眼快速識別出的手機號碼或姓名等資訊;若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證,可以通過第一標識資訊和第二標識資訊相對應,採用資料之間的關聯對待識別對象進行身份確認可以保證身份驗證的準確性。 參見圖3,本說明書一個實施例提供了一種身份驗證方法,包括步驟302至步驟308。 步驟302:接收並儲存待識別對象的第一驗證資訊和第二驗證資訊,其中,所述第一驗證資訊和所述第二驗證資訊相對應。 步驟304:根據預設的脫敏規則對所述第一驗證資訊或所述第二驗證資訊進行脫敏處理。 本說明書一個或多個實施例中,資訊脫敏是指對某些敏感資訊通過脫敏規則進行資訊變形,實現敏感隱私資訊的可靠保護。在涉及客戶安全資訊或者一些商業性敏感資訊的情況下,在不違反系統規則條件下,對真實資訊進行改造並提供測試使用,如客戶真實姓名或註冊帳號等個人資訊進行資訊脫敏。 以所述第一驗證資訊為姓名“木小a”為例,所述預設的脫敏規則可以包括對所述姓名的第一個字進行脫敏、對第二個字進行脫敏或對前兩個字進行脫敏,使得脫敏後的所述姓名為*小a、木*a或**a。 對所述第一驗證資訊或所述第二驗證資訊進行脫敏的過程中,可以根據實際需求設置脫敏規則和選擇需要脫敏的驗證資訊,本發明對此不作任何限定。 步驟306:識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。 步驟308:若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。 本說明書一個或多個實施例中,識別所述待識別影像中的第一標識資訊和第二標識資訊包括: 識別所述待識別影像中的第二標識資訊和脫敏後的第一標識資訊; 所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配包括: 所述第二標識資訊和脫敏後的第一標識資訊與預存的所述待識別對象的第二驗證資訊和根據預設的脫敏規則進行脫敏處理的第一驗證資訊相匹配。 以所述第一標識資訊為姓名“木小a”、所述預設的脫敏規則包括將第一標識資訊的第一個字變形為#為例,脫敏後的第一標識資訊為“#小a”。 以預存的所述第二驗證資訊為手機號碼,所述第一驗證資訊為脫敏後的所述手機號碼對應的實名認證姓名為例進行說明,參見表2。 表2
Figure 108117329-A0304-0002
以表1可知,第一驗證資訊“#小a”對應第二驗證資訊“13456789999”,第一驗證資訊“#小b”對應第二驗證資訊“13433332222”,第一驗證資訊“#小c”對應第二驗證資訊“13511112222”。 若識別出的所述待識別影像中的脫敏後的第一標識資訊為“#小a”和第二標識資訊為“13456789999”,則可以確定所述第一標識資訊“#小a”和所述第二標識資訊“13456789999”與預存的所述待識別對象脫敏後的第一驗證資訊“#小a”和第二驗證資訊“13456789999”相匹配,則確定所述待識別對象通過驗證。 若識別出的所述待識別影像中的脫敏後的第一標識資訊為“#小d”和第二標識資訊為“13456789999”,則可以確定所述第一標識資訊“#小d”和所述第二標識資訊“13456789999”與預存的所述待識別對象脫敏後的第一驗證資訊和第二驗證資訊不匹配,則確定所述待識別對象未通過驗證。 本說明書一個或多個實施例中,在所述第一標識資訊為脫敏後的標識資訊的情況下,則所述第二標識資訊為可以唯一識別所述待識別對象身份的資訊。 本說明書一個或多個實施例中,識別所述待識別影像中的第一標識資訊和第二標識資訊包括: 識別所述待識別影像中的第一標識資訊和脫敏後的第二標識資訊; 所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配包括: 所述第一標識資訊和脫敏後的第二標識資訊與預存的所述待識別對象的第一驗證資訊和根據預設的脫敏規則進行脫敏處理的第二驗證資訊相匹配。 以所述第二標識資訊為姓名“木小b”、所述預設的脫敏規則包括將第二標識資訊的第一個字變形為*為例,脫敏後的第二標識資訊為“*小b”。 以預存的所述第一驗證資訊為身份證號,所述第二驗證資訊為脫敏後的所述身份證號對應的實名認證姓名為例進行說明,參見表3。 表3
Figure 108117329-A0304-0003
以表1可知,第一驗證資訊“12345647899412”對應第二驗證資訊“#小a”,第一驗證資訊“11565648948634”對應第二驗證資訊“#小b”,第一驗證資訊“11565648948635”對應第二驗證資訊“#小c”。 若識別出的所述待識別影像中的脫敏後的第一標識資訊為“11565648948634”和第二標識資訊為“#小b”,則可以確定所述第一標識資訊“11565648948634”和所述第二標識資訊“#小b”與預存的所述待識別對象脫敏後的第一驗證資訊“11565648948634”和第二驗證資訊“#小b”相匹配,則確定所述待識別對象通過驗證。 若識別出的所述待識別影像中的脫敏後的第一標識資訊為“11565648948634”和第二標識資訊為“#小d”,則可以確定所述第一標識資訊“11565648948634”和所述第二標識資訊“#小d”與預存的所述待識別對象脫敏後的第一驗證資訊和第二驗證資訊不匹配,則確定所述待識別對象未通過驗證。 本說明書一個或多個實施例中,在所述第二標識資訊為脫敏後標識資訊的情況下,所述第一標識資訊為可以唯一識別所述待識別對象身份的資訊。 實際應用中,為了保證待識別對象身份驗證的準確性,不對可以唯一識別所述待識別對象身份的資訊進行脫敏。 本說明書一個或多個實施例中,所述身份驗證方法可以將預存的第一驗證資訊或第二驗證資訊進行脫敏,然後在對待識別對象進行身份驗證時,對識別出的第一標識資訊或第二標識資訊進行脫敏後與預存的第一驗證資訊或第二驗證資訊進行匹配,實現對待識別對象身份的驗證,採用對唯一識別所述待識別對象身份的資訊進行脫敏既可以保證資訊的安全性,又可以保證身份驗證的準確性。 參見圖4,本說明書一個實施例提供了一種身份驗證方法,包括步驟402至步驟408。 步驟402:接收待識別影像。 步驟404:識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。 步驟406:若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。 本說明書一個或多個實施例中,若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊不匹配,則所述待識別對象驗證失敗,發出驗證失敗提示。 所述驗證失敗提示包括但不限於短訊息提示、郵件提示或彈窗提示。 步驟408:執行對應的業務操作。 本說明書一個或多個實施例中,所述業務操作包括付款操作、退款操作或者修改密碼操作。 例如若所述業務操作為退款操作,確認所述待識別對象通過驗證後,則執行退款操作,可以實現將款項退至所述待識別對象帳戶。 本說明書一個或多個實施例中,所述身份驗證方法可以在完成身份驗證之後執行對應的操作,可以實現安全驗證以及執行操作雙重功能,極大的擴展了該方法的使用價值,並且待識別對象的身份驗證不通過的情況下可以給出提示資訊,提高使用者體驗效果。 參見圖5,將所述身份驗證方法應用在商戶使用支付寶進行收款中,所述驗證方法包括步驟502至步驟512。 步驟502:支付寶伺服端接收並儲存待識別對象小a的第一驗證資訊和第二驗證資訊。 本說明書一個或多個實施例中,所述第一驗證資訊可以包括所述待識別對象的郵件位址“713289@qq.com”,對應的所述第二驗證資訊可以包括所述待識別對象的註冊帳號“小牛vv”。 步驟504:付款使用者使用支付寶APP掃描列印出來的含有第一標識資訊和第二標識資訊的影像。 步驟506:採用影像識別演算法識別所述待識別影像中的第一標識資訊和第二標識資訊,並將所述第一標識資訊和所述第二標識資訊上傳至支付寶伺服端。 本說明書一個或多個實施例中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認。 本說明書一個或多個實施例中,所述第一標識資訊可以包括所述待識別對象的郵件位址“713289@qq.com”,對應的所述第二標識資訊可以包括所述待識別對象的註冊帳號“小牛vv”。 步驟508:判斷所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象小a的第一驗證資訊和第二驗證資訊是否匹配,若是,則執行步驟510,若否,則執行步驟512。 本說明書一個或多個實施例中,以所述第一驗證資訊可以包括所述待識別對象的郵件位址“713289@qq.com”,對應的所述第二驗證資訊可以包括所述待識別對象的註冊帳號“小牛vv”;所述第一標識資訊可以包括所述待識別對象的郵件位址“713289@qq.com”,對應的所述第二標識資訊可以包括所述待識別對象的註冊帳號“小牛vv”為例進行說明,所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象小a為預先在支付寶伺服端註冊的待識別對象小a。 步驟510:付款使用者可以進行支付寶付款操作。 本說明書一個或多個實施例中,若確認所述待識別對象小a為預先在支付寶伺服端註冊的待識別對象小a,則付款使用者就可以向待識別對象小a進行支付寶付款。 步驟512:支付寶APP返回驗證失敗提示。 本說明書一個或多個實施例中,所述身份驗證方法可以在完成身份驗證之後執行對商戶的支付寶付款,通過採用商戶較為熟悉的email以及註冊帳戶等個人資訊進行註冊和驗證,避免商戶的收款資訊被替換或者篡改,保證了商戶收款以及付款使用者付款的安全性以及準確性,並且在身份驗證失敗的時候還會給出失敗提示,使用者體驗效果好。 參見圖6,本說明書一實施例提供了一種身份驗證裝置,包括: 接收模組602,被配置為接收待識別影像; 識別模組604,被配置為識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認; 第一判斷模組606,被配置為若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。 可選地,所述裝置還包括: 儲存模組,被配置為接收並儲存待識別對象的第一驗證資訊和第二驗證資訊,其中,所述第一驗證資訊和所述第二驗證資訊相對應。 可選地,所述裝置還包括: 第一脫敏模組,被配置為根據預設的脫敏規則對所述第一驗證資訊進行脫敏處理。 可選地,所述識別模組604被配置為: 識別所述待識別影像中第二標識資訊和脫敏後的第一標識資訊; 所述第一判斷模組606被配置為: 所述第二標識資訊和脫敏後的第一標識資訊與預存的所述待識別對象的第二驗證資訊和脫敏後的第一驗證資訊相匹配。 可選地,所述裝置還包括: 第二脫敏模組,被配置為根據預設的脫敏規則對所述第二驗證資訊進行脫敏處理。 可選地,所述識別模組604被配置為: 識別所述待識別影像中的第一標識資訊和脫敏後的第二標識資訊; 所述第一判斷模組606被配置為: 所述第一標識資訊和脫敏後的第二標識資訊與預存的所述待識別對象的第一驗證資訊和脫敏後的第二驗證資訊相匹配。 可選地,所述第一標識資訊包括所述待識別對象的手機號碼或郵件位址。 可選地,所述第二標識資訊包括所述待識別對象的真實姓名或註冊帳號。 可選地,所述裝置還包括: 第二判斷模組,被配置為若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊不匹配,則所述待識別對象驗證失敗,發出驗證失敗提示。 可選地,所述驗證失敗提示包括短訊息提示、郵件提示或彈窗提示。 可選地,所述裝置還包括: 執行模組,被配置為執行對應的業務操作。 可選地,所述業務操作包括付款操作、退款操作或者修改密碼操作。 本說明書一個或多個實施例中,所述身份驗證裝置能夠通過掃描得到的兩個資料,採用所述兩個資料之間的關聯性對待識別對象進行身份確認可以保證身份驗證的準確性。 本說明書一個或多個實施例中的各個實施例均採用循序的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於裝置實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。 本發明一實施例還提供一種電腦可讀儲存媒體,其儲存有電腦指令,該指令被處理器執行時實現所述身份驗證方法的步驟。 上述為本實施例的一種電腦可讀儲存媒體的示意性方案。需要說明的是,該儲存媒體的技術方案與上述的身份驗證方法的技術方案屬同一構思,儲存媒體的技術方案未詳細描述的細節內容,均可以參見上述身份驗證方法的技術方案的描述。 上述對本說明書特定實施例進行了描述。其它實施例在所附申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在附圖中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多任務處理和平行處理也是可以的或者可能是有利的。 本發明實施例中所述支付涉及的技術載體,例如可以包括近場通信(Near Field Communication,NFC)、WIFI、3G/4G/5G、POS機刷卡技術、二維條碼讀碼技術、條碼讀碼技術、藍牙、紅外線、短訊息服務(Short Message Service,SMS)、多媒體訊息服務(Multimedia Message Service,MMS)等。 所述電腦指令包括電腦指令程式碼,所述電腦指令程式碼可以為程式碼原始碼形式、物件程式碼形式、可執行檔案或某些中間形式等。所述電腦可讀媒體可以包括:能夠攜帶所述電腦指令程式碼的任何實體或裝置、記錄媒體、隨身碟、行動硬碟、磁碟、光碟、電腦記憶體、唯讀記憶體(ROM,Read-Only Memory)、隨機存取記憶體(RAM,Random Access Memory)、電載波訊號、電信訊號以及軟體分發媒體等。需要說明的是,所述電腦可讀媒體包含的內容可以根據司法管轄區內立法和專利實踐的要求進行適當的增減,例如在某些司法管轄區,根據立法和專利實踐,電腦可讀媒體不包括電載波訊號和電信訊號。 需要說明的是,對於前述的各方法實施例,為了簡便描述,故將其都表述為一系列的動作組合,但是本領域技術人員應該知悉,本發明並不受所描述的動作順序的限制,因為依據本發明,某些步驟可以採用其它順序或者同時進行。其次,本領域技術人員也應該知悉,說明書中所描述的實施例均屬較佳實施例,所涉及的動作和模組並不一定都是本發明所必須的。 在上述實施例中,對各個實施例的描述都各有側重,某個實施例中沒有詳述的部分,可以參見其它實施例的相關描述。 以上公開的本發明較佳實施例只是用於幫助闡述本發明。可選實施例並沒有詳盡敘述所有的細節,也不限制該發明僅為所述的具體實施方式。顯然,根據本說明書的內容,可作很多的修改和變化。本說明書選取並具體描述這些實施例,是為了更好地解釋本發明的原理和實際應用,從而使所屬技術領域技術人員能很好地理解和利用本發明。本發明僅受申請專利範圍及其全部範圍和等效物的限制。In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can be implemented in many other ways than those described here, and those skilled in the art can make similar promotion without violating the connotation of the present invention, so the present invention is not limited by the specific implementation disclosed below. The terminology used in one or more embodiments of this specification is for the purpose of describing particular embodiments only, and is not intended to limit one or more embodiments of this specification. The singular forms "a", "said" and "the" used in the scope of one or more embodiments of the present specification and the appended patent applications are also intended to include most forms unless the context clearly indicates other meanings. It should also be understood that the term "and/or" used in one or more embodiments of this specification refers to and includes any or all possible combinations of one or more of the associated listed items. It should be understood that although the terms first, second, third, etc. may be used to describe various information in one or more embodiments of this specification, the information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, without departing from the scope of one or more embodiments of this specification, the first may also be referred to as the second, and similarly, the second may also be referred to as the first. Depending on the context, the word "if" as used herein can be interpreted as "when" or "when..." or "responsive to certainty". In one or more embodiments of this specification, an identity verification method and device, computer equipment, and computer storage media are provided, which will be described in detail in the following embodiments. Referring to FIG. 1, an embodiment of the present specification provides an identity verification system architecture diagram, including a network 102, a registration terminal 104, a scanning terminal 106, and a computer device 108, where the computer device 108 includes but is not limited to the memory 110 , Processor 112, communication interface 114 and bus 116. The network 102 communicates with the registration terminal 104 and the scanning terminal 106 respectively. The network 102 and the computer device 108 communicate with each other through the communication interface 114. The scanning terminal 106 communicates with The computer device 108 communicates with each other through the communication interface 114. The processor 112, the communication interface 114 and the memory 110 communicate with each other through the bus 116. The registration terminal 104 is configured to send registration information to the network 102. The network 102 is configured to accept the first registration information transmitted by the registration terminal 104, and transmit the first registration information to the memory 110 through the communication interface 114, and may also display After the device communicates, the first registration information is processed by the display device to display pictures. The scanning terminal 106 is configured to scan a picture processed by a display device for display, and then transmit the picture to the memory 110 through the communication interface 114. The communication interface 114 is configured to receive the first registration information of the network 102 and the picture of the scanning terminal 106, and then transmit the first registration information and the picture to the memory 110. The communication interface 114 enables the computer device 108 to communicate via one or more networks. Examples of these networks include a combination of a local area network (LAN), a wide area network (WAN), a personal area network (PAN), or a communication network such as the Internet. The network interface may include one or more of any type of network interface (eg, a network interface card (NIC)), wired or wireless, such as an IEEE 802.11 local area network wireless local area network (WLAN) wireless interface, Global microwave interconnection access (Wi-MAX) interface, Ethernet interface, universal serial bus (USB) interface, cellular network interface, Bluetooth interface, near field communication (NFC) interface, etc. The memory 110 is configured to store the first registration information and pictures sent by the communication interface 114 through the bus 116 and computer instructions stored on the memory 110 and executable on the processor 112. The processor 112 is configured to obtain the first registration information and pictures stored in the memory 110, and execute computer instructions stored in the memory 110 to implement verification of the object to be identified. The computer device 108 may be any type of stationary or mobile computer device, including a mobile computer or mobile computer device (eg, tablet computer, personal digital assistant, laptop computer, notebook computer, small laptop, etc.), mobile phone (Eg, smartphone), wearable computer equipment (eg, smart watches, smart glasses, etc.) or other types of mobile devices, or stationary computer equipment such as desktop computers or PCs. The processor 112 may execute the steps in the method shown in FIG. 2. FIG. 2 is a schematic flowchart illustrating an identity verification method provided by an embodiment of the specification, including steps 202 to 206. Step 202: Receive the image to be recognized. In one or more embodiments of this specification, the images to be recognized include, but are not limited to, images carrying text, graphics, or special symbols. The text may include, but is not limited to, Chinese characters, Pinyin, Arabic numerals, or other national language symbols, etc., the image may include but is not limited to flat images, three-dimensional graphics or geometric graphics, etc., may be hand-drawn graphics or graphics drawn by drawing tools, etc. The special symbols include, but are not limited to, mathematical symbols, unit symbols, tabulation symbols, or currency symbols that are used less frequently and are difficult to input directly. In one or more embodiments of this specification, before receiving the image to be recognized, the method further includes: receiving and storing first verification information and second verification information of the object to be identified, wherein the first verification information and the second verification Information corresponds. In one or more embodiments of this specification, the first verification information and the second verification information include but are not limited to identity verification information. The identity verification refers to confirming the identity of the operator in the computer and computer network system Process to determine whether the user has access and use rights to a certain resource, so that the access strategy of the computer and network system can be reliably and effectively implemented, preventing an attacker from impersonating a legitimate user to gain access to the resource Authority, guarantee the security of the system and data, and the legitimate interests of authorized accessors. The identity verification information includes any information about a person’s identity, which can help identify a person’s identity, such as name, fingerprint, or other biometric data , Email address, residential address, telephone number or social security number, etc. In practical applications, the first verification information corresponds to the second verification information, for example, if the first verification information is a person's ID number, the second verification information may be the ID number The corresponding real name, or if the first verification information is a person's mobile phone number, the second verification information may be the real name verification name corresponding to the mobile phone number. Taking the first verification information as a person's mobile phone number "13456789999", and the second verification information as the real-name authentication name "小a" corresponding to the mobile phone number as an example for description, receiving and storing the first The first verification information and the second verification information include receiving and storing the first verification information "13456789999" and the second verification information "small a" of the object to be identified. Step 204: Identify the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified. In one or more embodiments of this specification, the first identification information includes but is not limited to the mobile phone number or email address of the object to be identified, and the second identification information includes but is not limited to the true of the object to be identified Name or registered account number; or the first identification information includes but not limited to the real name or registered account number of the object to be identified, and the second identification information includes but not limited to the mobile phone number or mail address of the object to be identified . One of the first identification information and the second identification information is information that uniquely identifies the identity of the object to be identified, and the information that uniquely identifies the identity of the object to be identified includes, but is not limited to, information of the object to be identified Mobile phone number or email address. In one or more embodiments of this specification, the first identification information or the second identification information may be selected according to actual applications as information that uniquely identifies the identity of the object to be identified, and the present invention does not make any limitation on this. In one or more embodiments of this specification, the first identification information and the second identification information are different, and the combination of the first identification information and the second identification information is used to confirm the object to be identified. For example, if the first identification information includes the mobile phone number "13456789999" of the object to be identified, and the second identification information includes the name "small a" of the object to be identified, the mobile phone number "13456789999" and the name "small The combination of "a" can be used to confirm the object to be identified. Step 206: If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, confirm that the object to be identified passes verification. In one or more embodiments of this specification, the first identification information and the second identification information in the image to be recognized are first identified, if the first identification information and the second identification information are If the first verification information and the second verification information of the identified object match, it is confirmed that the object to be identified passes verification. Taking the pre-stored first verification information as a mobile phone number and the second verification information as a real-name authentication name corresponding to the mobile phone number as an example for description, see Table 1. Table 1
Figure 108117329-A0304-0001
According to Table 1, the first verification information "13456789999" corresponds to the second verification information "small a", the first verification information "13433332222" corresponds to the second verification information "small b", and the first verification information "13511112222" corresponds to the second verification Information "small c". If the identified first identification information in the image to be identified is "13456789999" and the second identification information is "small a", then the first identification information "13456789999" and the second identification information ""Smalla" matches the pre-stored first verification information "13456789999" and the second verification information "small a" of the object to be identified, and it is determined that the object to be identified passes verification. If the identified first identification information in the image to be identified is "13456789999" and the second identification information is "small d", the first identification information "13456789999" and the second identification information ""D" does not match the pre-stored first verification information and second verification information of the object to be identified, it is determined that the object to be identified has not passed verification. In one or more embodiments of this specification, the identity verification method includes receiving an image to be identified; and then identifying the first identification information and the second identification information in the image to be identified, wherein the first identification information and The combination of the second identification information is used to confirm the object to be identified, and the first identification information and the second identification information are information such as a mobile phone number or name that can be quickly identified by the naked eye; if the first If the identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, it is confirmed that the object to be identified passes the verification, and the first identification information and the second identification can be passed Corresponding to the information, using the association between the data to confirm the identity of the identified object can ensure the accuracy of identity verification. Referring to FIG. 3, an embodiment of the present specification provides an identity verification method, including steps 302 to 308. Step 302: Receive and store first verification information and second verification information of the object to be identified, wherein the first verification information corresponds to the second verification information. Step 304: Desensitize the first verification information or the second verification information according to a preset desensitization rule. In one or more embodiments of this specification, information desensitization refers to deforming certain sensitive information through desensitization rules to achieve reliable protection of sensitive private information. In the case of customer safety information or some commercially sensitive information, without violating system rules, the real information is transformed and provided for test use, such as desensitization of personal information such as the customer's real name or registered account. Taking the first verification information as the name "木小a" as an example, the preset desensitization rule may include desensitizing the first word of the name, desensitizing the second word, or desensitizing The first two words are desensitized, so that the name after desensitization is *小a, 木*a or **a. In the process of desensitizing the first verification information or the second verification information, a desensitization rule can be set according to actual needs and the verification information that needs to be desensitized can be selected, which is not limited in the present invention. Step 306: Identify the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified. Step 308: If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, confirm that the object to be identified passes verification. In one or more embodiments of this specification, identifying the first identification information and the second identification information in the image to be identified includes: identifying the second identification information and the desensitized first identification information in the image to be identified Matching the first identification information and the second identification information with the pre-stored first verification information and second verification information of the object to be identified includes: the second identification information and the desensitized first identification The information matches the pre-stored second verification information of the object to be identified and the first verification information that is desensitized according to a preset desensitization rule. Taking the first identification information as the name "木小a", the preset desensitization rule includes changing the first word of the first identification information to # as an example, and the first identification information after desensitization is "#小a". The pre-stored second verification information is a mobile phone number, and the first verification information is a real-name authentication name corresponding to the desensitized mobile phone number as an example for description, see Table 2. Table 2
Figure 108117329-A0304-0002
According to Table 1, the first verification information "#小a" corresponds to the second verification information "13456789999", the first verification information "#小b" corresponds to the second verification information "13433332222", and the first verification information "#小c" Corresponding to the second verification information "13511112222". If the identified first identification information in the image to be identified after desensitization is "#小a" and the second identification information is "13456789999", then the first identification information "#小a" and If the second identification information "13456789999" matches the pre-stored first verification information "#小a" and the second verification information "13456789999" after the object to be identified is desensitized, it is determined that the object to be identified passes verification . If the identified first identification information in the image to be identified after desensitization is "#小d" and the second identification information is "13456789999", then the first identification information "#小d" and If the second identification information "13456789999" does not match the pre-stored first verification information and second verification information after the object to be identified is desensitized, it is determined that the object to be identified has not passed verification. In one or more embodiments of this specification, in the case where the first identification information is desensitized identification information, the second identification information is information that can uniquely identify the identity of the object to be identified. In one or more embodiments of this specification, identifying the first identification information and the second identification information in the image to be identified includes: identifying the first identification information and the desensitized second identification information in the image to be identified Matching the first identification information and the second identification information with the pre-stored first verification information and second verification information of the object to be identified includes: the first identification information and the desensitized second identification The information matches the pre-stored first verification information of the object to be recognized and the second verification information that is desensitized according to a preset desensitization rule. Taking the second identification information as the name "木小b", the preset desensitization rule includes changing the first word of the second identification information into *, and the second identification information after desensitization is " *Little b". Taking the pre-stored first verification information as an ID number and the second verification information as the real-name authentication name corresponding to the desensitized ID number as an example for description, see Table 3. table 3
Figure 108117329-A0304-0003
According to Table 1, the first verification information "12345647899412" corresponds to the second verification information "#小a", the first verification information "11565648948634" corresponds to the second verification information "#小b", and the first verification information "11565648948635" corresponds to the first 2. Verification information "#小c". If the identified first identification information in the image to be identified after desensitization is "11565648948634" and the second identification information is "#小b", then the first identification information "11565648948634" and the If the second identification information "#小b" matches the pre-stored first verification information "11565648948634" and the second verification information "#小b" after the object to be identified is desensitized, it is determined that the object to be identified passes verification . If the identified first identification information in the image to be identified after desensitization is "11565648948634" and the second identification information is "#小d", then the first identification information "11565648948634" and the If the second identification information "#小d" does not match the pre-stored first verification information and second verification information after the object to be identified is desensitized, it is determined that the object to be identified has not passed verification. In one or more embodiments of this specification, in the case where the second identification information is desensitized identification information, the first identification information is information that can uniquely identify the identity of the object to be identified. In practical applications, in order to ensure the accuracy of the identity verification of the object to be identified, the information that can uniquely identify the identity of the object to be identified is not desensitized. In one or more embodiments of the present specification, the identity verification method may desensitize the pre-stored first verification information or second verification information, and then, when performing identity verification on the object to be identified, the identified first identification information After the second identification information is desensitized, it is matched with the pre-stored first verification information or second verification information to realize the verification of the identity of the object to be identified. Desensitization of the information that uniquely identifies the identity of the object The security of information can also guarantee the accuracy of identity verification. Referring to FIG. 4, an embodiment of the present specification provides an identity verification method, including steps 402 to 408. Step 402: Receive the image to be recognized. Step 404: Identify the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified. Step 406: If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, confirm that the object to be identified passes verification. In one or more embodiments of this specification, if the first identification information and the second identification information do not match the pre-stored first verification information and second verification information of the object to be identified, the to-be-identified Object verification fails, a verification failure prompt is issued. The verification failure prompt includes but is not limited to a short message prompt, an email prompt, or a pop-up prompt. Step 408: Perform the corresponding business operation. In one or more embodiments of this specification, the business operations include payment operations, refund operations, or password modification operations. For example, if the business operation is a refund operation, after confirming that the object to be identified is verified, a refund operation is performed, and the money can be refunded to the account of the object to be identified. In one or more embodiments of this specification, the identity verification method can perform the corresponding operation after completing the identity verification, and can achieve the dual functions of security verification and execution operation, greatly expanding the use value of the method, and the object to be identified If the identity verification fails, you can give prompt information to improve the user experience. Referring to FIG. 5, the identity verification method is applied to merchants using Alipay for payment collection. The verification method includes steps 502 to 512. Step 502: The Alipay server receives and stores the first verification information and the second verification information of the object a to be identified. In one or more embodiments of this specification, the first verification information may include the mail address "713289@qq.com" of the object to be identified, and the corresponding second verification information may include the object to be identified Registered account "小牛vv". Step 504: The payment user uses the Alipay APP to scan the printed image containing the first identification information and the second identification information. Step 506: Identify the first identification information and the second identification information in the image to be identified by using an image recognition algorithm, and upload the first identification information and the second identification information to the Alipay server. In one or more embodiments of this specification, the combination of the first identification information and the second identification information is used to confirm the object to be identified. In one or more embodiments of this specification, the first identification information may include the mail address "713289@qq.com" of the object to be identified, and the corresponding second identification information may include the object to be identified Registered account "小牛vv". Step 508: Determine whether the first identification information and the second identification information match the pre-stored first verification information and the second verification information of the object to be identified a, if yes, perform step 510, if not, Then step 512 is performed. In one or more embodiments of this specification, the first verification information may include the mail address "713289@qq.com" of the object to be identified, and the corresponding second verification information may include the to-be-identified The registered account of the object is "Maverick vv"; the first identification information may include the mail address of the object to be identified "713289@qq.com", and the corresponding second identification information may include the object to be identified The registered account "小牛vv" is used as an example for description. If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, then confirm that The object a to be identified is a object a to be registered in the Alipay server in advance. Step 510: The payment user can perform the Alipay payment operation. In one or more embodiments of this specification, if it is confirmed that the object a to be identified is the object a to be identified registered in the Alipay server in advance, then the payment user can pay Alipay to the object a to be identified. Step 512: Alipay APP returns a verification failure prompt. In one or more embodiments of this specification, the identity verification method can perform Alipay payment to merchants after completing identity verification. Registration and verification can be avoided by using personal information such as emails and registered accounts that are more familiar to merchants, to avoid merchants’ receipts. The payment information is replaced or tampered, which ensures the security and accuracy of the merchant's collection and payment by the payment user, and will also give a failure prompt when the identity verification fails, and the user experience is good. Referring to FIG. 6, an embodiment of the present specification provides an identity verification device, including: a receiving module 602 configured to receive an image to be recognized; an identifying module 604 configured to recognize a first identifier in the to-be-identified image Information and second identification information, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified; the first judgment module 606 is configured to: if the first identification information and If the second identification information matches the pre-stored first verification information and second verification information of the object to be identified, it is confirmed that the object to be identified passes verification. Optionally, the device further includes: a storage module configured to receive and store the first verification information and the second verification information of the object to be identified, wherein the first verification information and the second verification information are related correspond. Optionally, the device further includes: a first desensitization module configured to desensitize the first verification information according to a preset desensitization rule. Optionally, the identification module 604 is configured to: identify the second identification information in the image to be identified and the first identification information after desensitization; the first judgment module 606 is configured to: the first The second identification information and the desensitized first identification information match the pre-stored second verification information of the object to be identified and the desensitized first verification information. Optionally, the device further includes: a second desensitization module configured to desensitize the second verification information according to a preset desensitization rule. Optionally, the identification module 604 is configured to: identify the first identification information in the image to be identified and the second identification information after desensitization; the first judgment module 606 is configured to: The first identification information and the desensitized second identification information match the pre-stored first verification information of the object to be recognized and the desensitized second verification information. Optionally, the first identification information includes a mobile phone number or mail address of the object to be identified. Optionally, the second identification information includes the real name or registered account of the object to be identified. Optionally, the device further includes: a second judgment module configured to: if the first identification information and the second identification information and the pre-stored first verification information and second verification of the object to be identified If the information does not match, the verification of the object to be identified fails, and a verification failure prompt is issued. Optionally, the verification failure prompt includes a short message prompt, an email prompt, or a pop-up prompt. Optionally, the device further includes: an execution module configured to perform the corresponding business operation. Optionally, the business operation includes a payment operation, a refund operation, or a password modification operation. In one or more embodiments of the present specification, the identity verification device can ensure the accuracy of identity verification by using the correlation between the two data to confirm the identity of the identified object by scanning the two data. Each of the one or more embodiments in this specification is described in a sequential manner. The same or similar parts between the various embodiments can be referred to each other. Each embodiment focuses on the differences from other embodiments. Office. In particular, for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant part can be referred to the description of the method embodiment. An embodiment of the present invention also provides a computer-readable storage medium that stores computer instructions that implement the steps of the identity verification method when executed by a processor. The above is a schematic solution of a computer-readable storage medium of this embodiment. It should be noted that the technical solution of the storage medium is the same as the technical solution of the above-mentioned identity verification method. For details of the technical solution of the storage medium that are not described in detail, refer to the description of the technical solution of the above-mentioned identity verification method. The foregoing describes specific embodiments of the present specification. Other embodiments are within the scope of the attached patent application. In some cases, the actions or steps described in the scope of the patent application may be performed in a different order than in the embodiment and still achieve the desired result. In addition, the processes depicted in the drawings do not necessarily require the particular order shown or sequential order to achieve the desired results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous. The technical carriers involved in the payment in the embodiments of the present invention may include, for example, Near Field Communication (Near Field Communication, NFC), WIFI, 3G/4G/5G, POS card swipe technology, two-dimensional barcode reading technology, barcode reading code Technology, Bluetooth, infrared, Short Message Service (SMS), Multimedia Message Service (MMS), etc. The computer instructions include computer instruction code. The computer instruction code may be in the form of source code of the code, in the form of object code, executable file, or some intermediate form. The computer-readable medium may include: any entity or device capable of carrying the computer instruction code, a recording medium, a flash drive, a mobile hard disk, a magnetic disk, an optical disc, a computer memory, and a ROM (Read, Read Only Memory) -Only Memory), Random Access Memory (RAM, Random Access Memory), electrical carrier signals, telecommunication signals, software distribution media, etc. It should be noted that the content contained in the computer-readable medium can be appropriately increased or decreased according to the requirements of legislation and patent practice in jurisdictions. For example, in some jurisdictions, according to legislation and patent practice, computer-readable media Does not include electrical carrier signals and telecommunications signals. It should be noted that, for the convenience of description, the foregoing method embodiments are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the sequence of actions described. Because according to the invention, certain steps can be performed in other orders or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention. In the above embodiments, the description of each embodiment has its own emphasis. For a part that is not detailed in an embodiment, you can refer to the related descriptions of other embodiments. The above disclosed preferred embodiments of the present invention are only used to help illustrate the present invention. The alternative embodiments do not exhaustively describe all the details, nor limit the invention to the specific embodiments described. Obviously, according to the content of this specification, many modifications and changes can be made. This specification selects and specifically describes these embodiments in order to better explain the principle and practical application of the present invention, so that those skilled in the art can well understand and use the present invention. The present invention is only limited by the scope of the patent application and its full scope and equivalents.

102‧‧‧網路 104‧‧‧註冊終端 106‧‧‧掃描終端 108‧‧‧電腦設備 110‧‧‧記憶體 112‧‧‧處理器 114‧‧‧通信介面 116‧‧‧匯流排 202‧‧‧步驟 204‧‧‧步驟 206‧‧‧步驟 302‧‧‧步驟 304‧‧‧步驟 306‧‧‧步驟 308‧‧‧步驟 402‧‧‧步驟 404‧‧‧步驟 406‧‧‧步驟 408‧‧‧步驟 502‧‧‧步驟 504‧‧‧步驟 506‧‧‧步驟 508‧‧‧步驟 510‧‧‧步驟 512‧‧‧步驟 602‧‧‧接收模組 604‧‧‧識別模組 606‧‧‧第一判斷模組102‧‧‧ Internet 104‧‧‧ registered terminal 106‧‧‧Scan terminal 108‧‧‧Computer equipment 110‧‧‧Memory 112‧‧‧ processor 114‧‧‧Communication interface 116‧‧‧Bus 202‧‧‧Step 204‧‧‧Step 206‧‧‧Step 302‧‧‧Step 304‧‧‧Step 306‧‧‧Step 308‧‧‧Step 402‧‧‧Step 404‧‧‧Step 406‧‧‧Step 408‧‧‧Step 502‧‧‧Step 504‧‧‧Step 506‧‧‧Step 508‧‧‧Step 510‧‧‧Step 512‧‧‧Step 602‧‧‧Receiving module 604‧‧‧Identification module 606‧‧‧ First judgment module

圖1為本說明書一實施例提供的一種身份驗證方法所應用的系統架構的示意圖; 圖2為本說明書一實施例提供的一種身份驗證方法的流程圖; 圖3為本說明書一實施例提供的一種身份驗證方法的流程圖; 圖4為本說明書一實施例提供的一種身份驗證方法的流程圖; 圖5為本說明書一實施例提供的一種身份驗證方法的流程圖; 圖6為本說明書一實施例提供的一種身份驗證裝置的結構示意圖。1 is a schematic diagram of a system architecture to which an identity verification method provided by an embodiment of the present specification is applied; 2 is a flowchart of an identity verification method provided by an embodiment of this specification; 3 is a flowchart of an identity verification method provided by an embodiment of the present specification; 4 is a flowchart of an identity verification method provided by an embodiment of this specification; 5 is a flowchart of an identity verification method provided by an embodiment of the present specification; 6 is a schematic structural diagram of an identity verification device according to an embodiment of the present specification.

Claims (26)

一種身份驗證方法,其特徵在於,包括: 接收待識別影像; 識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認; 若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。An identity verification method, characterized in that it includes: Receive the image to be recognized; Identifying the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified; If the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified, it is confirmed that the object to be identified passes verification. 根據請求項1所述的方法,其中,接收待識別影像之前,還包括: 接收並儲存待識別對象的第一驗證資訊和第二驗證資訊,其中,所述第一驗證資訊和所述第二驗證資訊相對應。The method according to claim 1, wherein before receiving the image to be recognized, the method further includes: Receiving and storing first verification information and second verification information of the object to be identified, wherein the first verification information corresponds to the second verification information. 根據請求項2所述的方法,其中,接收並儲存待識別對象的第一驗證資訊和第二驗證資訊之後,還包括: 根據預設的脫敏規則對所述第一驗證資訊進行脫敏處理。The method according to claim 2, wherein after receiving and storing the first verification information and the second verification information of the object to be identified, the method further includes: Desensitize the first verification information according to a preset desensitization rule. 根據請求項3所述的方法,其中,識別所述待識別影像中的第一標識資訊和第二標識資訊包括: 識別所述待識別影像中第二標識資訊和脫敏後的第一標識資訊; 所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配包括: 所述第二標識資訊和脫敏後的第一標識資訊與預存的所述待識別對象的第二驗證資訊和脫敏後的第一驗證資訊相匹配。The method according to claim 3, wherein identifying the first identification information and the second identification information in the image to be identified includes: Identify the second identification information in the image to be identified and the first identification information after desensitization; The matching of the first identification information and the second identification information with the pre-stored first verification information and second verification information of the object to be identified includes: The second identification information and the desensitized first identification information match the pre-stored second verification information of the object to be recognized and the desensitized first verification information. 根據請求項2所述的方法,其中,接收並儲存待識別對象的第一驗證資訊和第二驗證資訊之後,還包括: 根據預設的脫敏規則對所述第二驗證資訊進行脫敏處理。The method according to claim 2, wherein after receiving and storing the first verification information and the second verification information of the object to be identified, the method further includes: Desensitize the second verification information according to a preset desensitization rule. 根據請求項5所述的方法,其中,識別所述待識別影像中的第一標識資訊和第二標識資訊包括: 識別所述待識別影像中的第一標識資訊和脫敏後的第二標識資訊; 所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配包括: 所述第一標識資訊和脫敏後的第二標識資訊與預存的所述待識別對象的第一驗證資訊和脫敏後的第二驗證資訊相匹配。The method according to claim 5, wherein identifying the first identification information and the second identification information in the image to be identified includes: Identify the first identification information in the image to be identified and the second identification information after desensitization; The matching of the first identification information and the second identification information with the pre-stored first verification information and second verification information of the object to be identified includes: The first identification information and the desensitized second identification information match the pre-stored first verification information of the object to be identified and the desensitized second verification information. 根據請求項1所述的方法,其中,所述第一標識資訊包括所述待識別對象的手機號碼或郵件位址。The method according to claim 1, wherein the first identification information includes a mobile phone number or an email address of the object to be identified. 根據請求項1所述的方法,其中,所述第二標識資訊包括所述待識別對象的真實姓名或註冊帳號。The method according to claim 1, wherein the second identification information includes a real name or registered account number of the object to be identified. 根據請求項1所述的方法,其中,還包括: 若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊不匹配,則所述待識別對象驗證失敗,發出驗證失敗提示。The method according to claim 1, further comprising: If the first identification information and the second identification information do not match the pre-stored first verification information and second verification information of the object to be identified, the verification of the object to be identified fails, and a verification failure prompt is issued. 根據請求項9所述的方法,其中,所述驗證失敗提示包括短訊息提示、郵件提示或彈窗提示。The method according to claim 9, wherein the verification failure prompt includes a short message prompt, an email prompt, or a pop-up prompt. 根據請求項1所述的方法,其中,確認所述待識別對象通過驗證之後,還包括: 執行對應的業務操作。The method according to claim 1, wherein after confirming that the object to be identified passes verification, further comprising: Perform corresponding business operations. 根據請求項11所述的方法,其中,所述業務操作包括付款操作、退款操作或者修改密碼操作。The method according to claim 11, wherein the business operation includes a payment operation, a refund operation, or a password modification operation. 一種身份驗證裝置,其特徵在於,包括: 接收模組,被配置為接收待識別影像; 識別模組,被配置為識別所述待識別影像中的第一標識資訊和第二標識資訊,其中,所述第一標識資訊和所述第二標識資訊的組合用於對待識別對象進行確認; 第一判斷模組,被配置為若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊相匹配,則確認所述待識別對象通過驗證。An identity verification device, characterized in that it includes: The receiving module is configured to receive the image to be recognized; An identification module configured to identify the first identification information and the second identification information in the image to be identified, wherein the combination of the first identification information and the second identification information is used to confirm the object to be identified; A first judgment module configured to confirm that the first identification information and the second identification information match the pre-stored first verification information and second verification information of the object to be identified Object passed verification. 根據請求項13所述的裝置,其中,所述裝置還包括: 儲存模組,被配置為接收並儲存待識別對象的第一驗證資訊和第二驗證資訊,其中,所述第一驗證資訊和所述第二驗證資訊相對應。The device according to claim 13, wherein the device further comprises: The storage module is configured to receive and store first verification information and second verification information of the object to be identified, wherein the first verification information corresponds to the second verification information. 根據請求項14所述的裝置,其中,所述裝置還包括: 第一脫敏模組,被配置為根據預設的脫敏規則對所述第一驗證資訊進行脫敏處理。The apparatus according to claim 14, wherein the apparatus further comprises: The first desensitization module is configured to desensitize the first verification information according to a preset desensitization rule. 根據請求項15所述的裝置,其中, 所述識別模組被配置為: 識別所述待識別影像中第二標識資訊和脫敏後的第一標識資訊; 所述第一判斷模組被配置為: 所述第二標識資訊和脫敏後的第一標識資訊與預存的所述待識別對象的第二驗證資訊和脫敏後的第一驗證資訊相匹配。The apparatus according to claim 15, wherein, The identification module is configured to: Identify the second identification information in the image to be identified and the first identification information after desensitization; The first judgment module is configured to: The second identification information and the desensitized first identification information match the pre-stored second verification information of the object to be recognized and the desensitized first verification information. 根據請求項14所述的裝置,其中,所述裝置還包括: 第二脫敏模組,被配置為根據預設的脫敏規則對所述第二驗證資訊進行脫敏處理。The apparatus according to claim 14, wherein the apparatus further comprises: The second desensitization module is configured to desensitize the second verification information according to a preset desensitization rule. 根據請求項14所述的裝置,其中,所述識別模組被配置為: 識別所述待識別影像中的第一標識資訊和脫敏後的第二標識資訊; 所述第一判斷模組被配置為: 所述第一標識資訊和脫敏後的第二標識資訊與預存的所述待識別對象的第一驗證資訊和脫敏後的第二驗證資訊相匹配。The device according to claim 14, wherein the identification module is configured to: Identify the first identification information in the image to be identified and the second identification information after desensitization; The first judgment module is configured to: The first identification information and the desensitized second identification information match the pre-stored first verification information of the object to be identified and the desensitized second verification information. 根據請求項13所述的裝置,其中,所述第一標識資訊包括所述待識別對象的手機號碼或郵件位址。The device according to claim 13, wherein the first identification information includes a mobile phone number or an email address of the object to be identified. 根據請求項13所述的裝置,其中,所述第二標識資訊包括所述待識別對象的真實姓名或註冊帳號。The device according to claim 13, wherein the second identification information includes the real name or registered account of the object to be identified. 根據請求項13所述的裝置,其中,所述裝置還包括: 第二判斷模組,被配置為若所述第一標識資訊和所述第二標識資訊與預存的所述待識別對象的第一驗證資訊和第二驗證資訊不匹配,則所述待識別對象驗證失敗,發出驗證失敗提示。The device according to claim 13, wherein the device further comprises: A second judgment module configured to: if the first identification information and the second identification information do not match the pre-stored first verification information and second verification information of the object to be identified, the object to be identified If the verification fails, a verification failure prompt is issued. 根據請求項21所述的裝置,其中,所述驗證失敗提示包括短訊息提示、郵件提示或彈窗提示。The device according to claim 21, wherein the verification failure prompt includes a short message prompt, an email prompt, or a pop-up prompt. 根據請求項13所述的裝置,其中,所述裝置還包括: 執行模組,被配置為執行對應的業務操作。The device according to claim 13, wherein the device further comprises: The execution module is configured to perform the corresponding business operation. 根據請求項23所述的裝置,其中,所述業務操作包括付款操作、退款操作或者修改密碼操作。The device according to claim 23, wherein the business operation includes a payment operation, a refund operation, or a password modification operation. 一種電腦設備,包括記憶體、處理器及儲存在記憶體上並可在處理器上運行的電腦指令,其特徵在於,所述處理器執行所述指令時實現請求項1至12任意一項所述方法的步驟。A computer device, including a memory, a processor, and computer instructions stored on the memory and capable of running on the processor, characterized in that when the processor executes the instruction, any one of the request items 1 to 12 is realized Describe the steps of the method. 一種電腦可讀儲存媒體,其儲存有電腦指令,其特徵在於,該程式被處理器執行時實現請求項1至12任意一項所述方法的步驟。A computer-readable storage medium storing computer instructions, characterized in that, when the program is executed by a processor, the method steps of any one of request items 1 to 12 are realized.
TW108117329A 2018-07-27 2019-05-20 Identity authentication method and apparatus, and computing device and storage medium TW202008199A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810841114.7 2018-07-27
CN201810841114.7A CN109146464A (en) 2018-07-27 2018-07-27 A kind of auth method and device, a kind of calculating equipment and storage medium

Publications (1)

Publication Number Publication Date
TW202008199A true TW202008199A (en) 2020-02-16

Family

ID=64798264

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108117329A TW202008199A (en) 2018-07-27 2019-05-20 Identity authentication method and apparatus, and computing device and storage medium

Country Status (3)

Country Link
CN (1) CN109146464A (en)
TW (1) TW202008199A (en)
WO (1) WO2020019977A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146464A (en) * 2018-07-27 2019-01-04 阿里巴巴集团控股有限公司 A kind of auth method and device, a kind of calculating equipment and storage medium
CN109919142B (en) * 2019-04-19 2021-05-25 东方网力科技股份有限公司 Personnel monitoring method, device, server and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102982459A (en) * 2012-11-06 2013-03-20 童浩铭 Dual-code anti-counterfeiting system and dual-code anti-counterfeiting method for intelligent communication terminals
GB2508173A (en) * 2012-11-22 2014-05-28 Barclays Bank Plc Identity verification systems and methods
CN103679452A (en) * 2013-06-20 2014-03-26 腾讯科技(深圳)有限公司 Payment authentication method, device thereof and system thereof
CN106940860B (en) * 2014-10-24 2020-03-17 安徽农业大学 Anti-counterfeiting verification method for two-dimensional code
CN104766113B (en) * 2015-05-07 2019-04-02 上海中商网络股份有限公司 A kind of light and shade code anti-fake label and its method for anti-counterfeit
CN105721165A (en) * 2016-02-22 2016-06-29 阿里巴巴集团控股有限公司 Method for verifying identity, server and client
CN111371836B (en) * 2016-09-20 2023-10-24 徐蔚 Verification method and device for secure payment and mobile terminal
CN107172025A (en) * 2017-04-28 2017-09-15 武汉矽感科技有限公司 Method for authenticating user identity and device based on multiframe identification code
CN109146464A (en) * 2018-07-27 2019-01-04 阿里巴巴集团控股有限公司 A kind of auth method and device, a kind of calculating equipment and storage medium

Also Published As

Publication number Publication date
CN109146464A (en) 2019-01-04
WO2020019977A1 (en) 2020-01-30

Similar Documents

Publication Publication Date Title
US10861091B2 (en) Method, terminal, server and system for information registration
US11004081B2 (en) Dynamic authentication through user information and intent
US10552828B2 (en) Multiple tokenization for authentication
US10803433B2 (en) Data batch processing method and system
AU2019253872A1 (en) Seamless transaction minimizing user input
US10037082B2 (en) Physical interaction dependent transactions
US20180349918A1 (en) Method and apparatus for conducting electronic commerce by use of information code
US20190073675A1 (en) Digital user identity verification
TW201928880A (en) Picture processing method and device
US10740750B2 (en) On-demand payment generation transaction systems
US20140229377A1 (en) NFC Card Verification
US9508069B2 (en) Rendering payments with mobile phone assistance
US20150317642A1 (en) Process to query electronic sales receipts with a portable computerized device
TW202008199A (en) Identity authentication method and apparatus, and computing device and storage medium
US10332203B2 (en) Systems and methods for facilitating credit card application transactions
US20180174117A1 (en) Methods and systems for processing payment transactions
US11715105B2 (en) Payment authentication using OS-based and issuer-based authenticator applications
US20210112057A1 (en) Multi-party document validation
KR102566403B1 (en) System and method for seccondhand product dealing and computer program for the same
US11941603B2 (en) Multipurpose smartphone device
US20130317805A1 (en) Systems and methods for detecting real names in different languages
WO2023069577A1 (en) Systems and methods for use in biometric-enabled network interactions
CN116596590A (en) Unified issuing method and system for multiclass rights and interests