CN105656850B - Data processing method, related device and system - Google Patents

Data processing method, related device and system Download PDF

Info

Publication number
CN105656850B
CN105656850B CN201410640492.0A CN201410640492A CN105656850B CN 105656850 B CN105656850 B CN 105656850B CN 201410640492 A CN201410640492 A CN 201410640492A CN 105656850 B CN105656850 B CN 105656850B
Authority
CN
China
Prior art keywords
user
client
data
identity
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410640492.0A
Other languages
Chinese (zh)
Other versions
CN105656850A (en
Inventor
秦铭雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410640492.0A priority Critical patent/CN105656850B/en
Publication of CN105656850A publication Critical patent/CN105656850A/en
Application granted granted Critical
Publication of CN105656850B publication Critical patent/CN105656850B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a data processing method, which comprises the following steps: receiving a data transfer request initiated by a first client based on a data interaction platform; the data transfer request is a request input by a first user through a first client and is used for requesting a second client to transfer first data to the first client based on a data interaction platform; based on the data transfer request, performing identity authentication on the first user according to a preset authentication condition; and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request. The invention also discloses a data processing device, equipment and a system, and the invention solves the technical problems that the transfer request cannot be quickly initiated by a receiver and the transfer processing cannot be safely completed in the transfer process in the prior art, and greatly meets the requirements of quickly initiating the transfer request and safely completing the transfer processing in the prior art.

Description

Data processing method, related device and system
Technical Field
The present invention relates to the field of computer internet, and in particular, to a data processing method, a related apparatus, and a system.
Background
With the development of electronic technology and internet technology, electronic devices (especially smart mobile devices) have increasingly powerful functions, and users can complete various transactions as long as the users install various application programs on the electronic devices according to their own needs.
With the rapid development of intelligent mobile devices, mobile payment is becoming an increasingly multi-user option. Currently, the main mode of mobile payment includes a transfer mode, which is specifically as follows, for example, if an application has a transfer function, when a user a (a transfer party) wants to transfer money to a user B (a transfer party), the user a can only log in the application having the transfer function, initiate a transfer request on a corresponding data interaction platform, authenticate through a server, and finally complete transferring funds to the user B.
Therefore, in the prior art, when the user B needs the user A to transfer money to the user B, communication with the user A is often needed due to safety problems, the user A can initiate the transfer after the user A knows the transfer request of the user B exactly, and the user B can only wait for the completion of the transfer passively; the transfer process in the prior art cannot meet the requirements of quickly initiating a transfer request and safely completing transfer processing.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide a data processing method, a data processing apparatus, a data processing device, and a data processing system, which can meet the requirements of initiating a transfer request quickly and completing transfer processing safely in the prior art.
In order to solve the above technical problem, a first aspect of an embodiment of the present invention discloses a data processing method, including:
receiving a data transfer request initiated by a first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform;
based on the data transfer request, performing identity authentication on the first user according to a preset authentication condition;
and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request.
The second aspect of the embodiments of the present invention discloses a data processing method, including:
initiating a data transfer request to a server based on a data interaction platform, wherein the data transfer request is a request input by a first user through a first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform;
receiving the first data transferred from the second client based on the data interaction platform; the transferred first data is the identity authentication of the first user by the server based on the data transfer request according to a preset authentication condition; and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request.
A third aspect of the embodiments of the present invention discloses a data processing apparatus, including:
the request receiving module is used for receiving a data transfer request initiated by a first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform;
the first identity authentication module is used for carrying out identity authentication on the first user according to a preset authentication condition based on the data transfer request;
and the data transfer module is used for transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request after the identity authentication of the first user passes.
A fourth aspect of the present invention discloses a data processing apparatus, including:
the request initiating module is used for initiating a data transfer request to a server based on a data interaction platform, wherein the data transfer request is a request input by a first user through a first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform;
a first data receiving module, configured to receive the first data transferred from the second client based on the data interaction platform; the transferred first data is the identity authentication of the first user by the server based on the data transfer request according to a preset authentication condition; and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request.
The fifth aspect of the embodiments of the present invention discloses a data processing system, which includes a server, a first client, and a second client, wherein the server is configured to execute a first program, and the first program is configured to execute a second program, and the second program is configured to execute a second program
The server receives a data transfer request initiated by the first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting the second client to transfer first data to the first client based on the data interaction platform; the server authenticates the identity of the first user according to a preset authentication condition based on the data transfer request; and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request.
A sixth aspect of the present embodiment discloses a computer storage medium storing a program, and the program includes all the steps of the data processing method according to the first aspect or the second aspect of the present embodiment when executed.
By implementing the embodiment of the invention, the first client can initiatively initiate a request to request the second client to transfer the first data to the first client based on the data interaction platform, and after the identity authentication of the user corresponding to the first client is passed according to the preset authentication condition, the first data is transferred from the second client to the first client, so that the technical problem that a transfer request cannot be rapidly initiated by a payee and the transfer processing cannot be safely completed in the transfer process in the prior art is solved, and the requirements of rapidly initiating the transfer request and safely completing the transfer processing in the prior art are greatly met; in addition, when the user identity is detected to be valid, the password information can be verified, and the detection is carried out through the matching of voice information or equipment identification information, so that the safety in the transfer process is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of a data processing method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a data processing method according to an embodiment of the present invention;
FIG. 3 is a flow chart illustrating a data processing method according to another embodiment of the present invention;
FIG. 4 is a flow chart illustrating the setting of an authorization list according to an embodiment of the present invention;
FIG. 5 is a flow chart illustrating a data processing method according to another embodiment of the present invention;
FIG. 6 is a flow chart illustrating a data processing method according to another embodiment of the present invention;
FIG. 7 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a first authentication module according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of another embodiment of a data processing apparatus according to the present invention;
FIG. 10 is a diagram illustrating a first identity authentication module according to another embodiment of the present invention;
FIG. 11 is a schematic diagram of a data processing apparatus according to another embodiment of the present invention;
FIG. 12 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention;
FIG. 13 is a schematic block diagram of another embodiment of a data processing apparatus according to the present invention;
fig. 14 is a schematic structural diagram of a data processing system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiments of the present invention may be implemented based on the application scenario shown in fig. 1, where a user may log in a data interaction platform of a server through a client to perform a service operation, the server performs a service process on an operation instruction of the user, receives a request of a first client, performs a process, and finally transfers first data from a second client to the first client.
The data interaction platform in each embodiment of the invention comprises but is not limited to a data interaction platform with a mobile terminal payment function or a bank transfer platform, and the data interaction platform can also be a data interaction platform generated for a data interaction application program developed by a third party installed on the mobile equipment or the mobile terminal by a user; it can be understood that, for the data interaction platform on the mobile device, a third-party developer often sets a background service system to assist in processing the data service on the data processing platform through network transmission; the user can log in the data interaction platform to perform interaction such as chatting, sending and receiving data and the like with friends, and also can perform related affairs or services such as payment operation, bank transfer operation and the like, and the data interaction platform executes and processes related data according to the operation of the logged-in user;
the first client or the second client in each embodiment of the present invention may specifically refer to a client after the user logs in the data interaction platform, that is, may refer to an account of the user logged in the data interaction platform, such as a mailbox address, a mobile phone number, or other identifiers; the client may also refer to a user device running the data interaction platform for the user to log in, that is, the user device (i.e., the client) runs the data interaction platform for the user to log in, and as shown in the network architecture shown in fig. 1, the user device may include, but is not limited to, a mobile phone, a mobile computer, a tablet computer, a Personal Digital Assistant (PDA), a media player, an intelligent television, an intelligent watch, an intelligent glasses, an intelligent bracelet, and other user devices.
The mobile device used for authentication determination in the embodiments of the present invention includes, but is not limited to, smart mobile devices such as smart wrist devices, smart watches, smart phones, or smart glasses.
The following describes the data processing method according to the present invention in detail with reference to the embodiments of fig. 2 to 6:
as shown in fig. 2, a flowchart of a data processing method provided in an embodiment of the present invention describes a technical solution of the data processing method from a server side, and includes:
step S200: receiving a data transfer request initiated by a first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform;
specifically, a first user may log in the data interaction platform by using a first mobile device, where a login account of the first user may be a first client, or a first mobile device running the data interaction platform and logged in by the first user is a first client; the first user can carry out instant messaging with other users on the data interaction platform through the first client, and send or receive interaction such as data information; the data interaction platform in the embodiment of the present invention may have a data transfer request function set in advance, and when the first user needs to request the second client to transfer the first data to the first user, the first user may initiate a data transfer request based on the data interaction platform, for example, a virtual button for initiating the data transfer request is preset at a certain preset position in an interaction interface of the data interaction platform, and the first user may initiate the data transfer request by clicking the button; the data interaction platform can send the data transfer request to a server, and the server finally receives the data transfer request.
It can be understood that, after the first user clicks the virtual button, the first user may enter an interface to input the related information of the second client and the related information of the first data that requires transfer, such as the account information of the first client, and when the first data is funds, the amount information of the funds is input; or the first user can preset the relevant information of the default second client of the virtual button and the relevant information of the first data required to be transferred; when the first user clicks the virtual button, a request to transfer the first data to a default second client is initiated.
Step S202: based on the data transfer request, performing identity authentication on the first user according to a preset authentication condition;
specifically, the server may preset an authentication condition for authenticating the user identity, where the authentication condition may be preset by the second user through the data interaction platform; the authentication condition in the embodiment of the present invention includes, but is not limited to, determining whether a user initiating a request obtains authorization to initiate the request in advance, or determining whether a series of verification information input by the user is matched, or directly performing authentication determination on the user initiating the request (i.e., a first user) through a request object (i.e., a second user), and so on; the invention is not limited.
Step S204: and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request.
Specifically, after the server passes the identity authentication of the first user, the server transfers the first data from the second client to the first client through the data interaction platform according to the relevant information of the second client in the data transfer request and the relevant information of the first data required to be transferred; for example, the first user requests the second user to transfer 100 yuan, after the server authenticates the first user, the data interaction platform may notify the background transfer system to complete the transfer of 100 yuan from the account of the second user to the account of the first user.
By implementing the embodiment of the invention, the first client can initiatively initiate a request to request the second client to transfer the first data to the first client based on the data interaction platform, and after the identity authentication of the user corresponding to the first client is passed according to the preset authentication condition, the first data is transferred from the second client to the first client, so that the technical problem that a transfer request cannot be rapidly initiated by a payee and transfer processing cannot be safely completed in a transfer process in the prior art is solved, and the requirements of rapidly initiating a transfer request and safely completing transfer processing in the prior art are greatly met.
Further, with reference to the flow diagram of another embodiment of the data processing method provided by the present invention shown in fig. 3, the technical solution of the present invention is described with reference to three sides of the server, the first client, and the second client, and may include the following steps:
step S300: a first client initiates a data transfer request based on a data interaction platform;
specifically, a first user can log in the data interaction platform by using a first mobile device, and the first user can perform interaction such as instant messaging with other users, sending or receiving data information and the like on the data interaction platform through a first client; the data interaction platform in the embodiment of the present invention may have a data transfer request function set in advance, and when the first user needs to request the second client to transfer the first data to the first user, the first user may initiate a data transfer request based on the data interaction platform, for example, a virtual button for initiating the data transfer request is preset at a certain preset position in an interaction interface of the data interaction platform, and the first user may initiate the data transfer request by clicking the button; the data interaction platform can send the data transfer request to a server; reference may be made specifically to step S200 in the above embodiment of fig. 2.
Step S302: the server receives the data transfer request and judges whether the first user exists in a preset authorization list or not based on the data transfer request;
specifically, the server stores a preset authorization list, wherein the authorization list comprises user information for a second user to perform a data transfer request based on authorization preset by the data interaction platform through the second client; then, after receiving the data transfer request initiated by the first client, the server determines whether the first user corresponding to the first client is in the authorization list, if so, then step S304 is executed, otherwise, step S308 is executed.
It can be understood that the user information set in the embodiment of the present invention to authorize the data transfer request may further include a size of an authorized data transfer value, or a range of the authorized data transfer value, and when determining whether the first user corresponding to the first client is in the authorization list, it also includes determining whether the value of the first data requested to be transferred by the first user is smaller than the authorized data transfer value, or is in the range of the authorized data transfer value, if the determination is yes, step S304 is executed, otherwise step S308 is executed.
Step S304: the server performs identity authentication interaction with the first client according to a preset identity authentication rule so as to detect whether the identity of the first user is valid;
specifically, the server may perform identity authentication interaction with the first client, and detect whether the identity of the first user is valid through at least one of the following manners, that is, the following manners may be combined at will:
a. the server receives first verification password information input by the first client, and detects whether the identity of the first user is valid or not by analyzing whether the first verification password information is matched with preset verification password information or not;
specifically, the server prompts the first client to input first verification password information, where the first verification password information may specifically be verification password information preset by the first user for the data transfer service, and then the first user inputs the first verification password information after knowing that the first verification password information needs to be input; the server analyzes whether the first verification password information is matched with the verification password information preset by the first user, and if the first verification password information is matched with the first user, the server detects that the identity of the first user is valid; otherwise, detecting that the identity of the first user is invalid;
it is understood that the first verification password information in the embodiment of the present invention may be information composed of numbers or letters, or may be certain physical characteristic information of the user, such as a fingerprint, an eyelid, and other physical characteristic information, which is not limited herein.
b. The server receives first voice information input by the first client, and detects whether the identity of the first user is valid or not by analyzing whether the first voice information is matched with preset voice information or not;
specifically, the server prompts the first client to input first voice information, where the first voice information may specifically be voice information preset by the first user for the data transfer service, for example, "i want the user a to transfer 100 yuan to me" or "i agree with a transfer request of the user B," and so on, and then after knowing that the first verification password information needs to be input, the first user may input the first voice information through a voice input module such as a microphone; the server analyzes whether the first voice message matches with the voice message preset by the first user, specifically, the server may analyze the pronunciation characteristics of the two voices to see whether the two voices are uttered by the same user, or analyze the same rate of the two voice contents to see whether the two voices are uttered by the same user, and the like, which is not limited herein; when the first user is matched with the second user, the identity of the first user is detected to be valid; otherwise, detecting that the identity of the first user is invalid;
c. the server acquires the equipment identifier of the first client, and detects whether the identity of the first user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment;
specifically, a first user presets equipment identification information for authentication judgment by logging in a first client in the data interaction platform, so that a server can acquire a unique identification corresponding to equipment for authentication judgment through the data processing platform, and then establishes a binding relationship between the first client and the equipment for authentication judgment according to the unique identification; namely, establishing a corresponding relation between the first client and the obtained unique identifier so as to match when subsequently performing identity authentication judgment; the server stores an equipment identifier for authentication judgment in advance, prompts the first client to send the equipment identifier corresponding to the first client when identity detection needs to be performed on the first user to see whether the equipment identifier is valid, and after the equipment identifier of the first client is obtained, the server analyzes whether the equipment identifier is matched with a preset equipment identifier for authentication judgment, if so, the server indicates that the equipment corresponding to the first client is operated and is equipment which establishes a binding relationship with the first client, the first user identity detection is valid, and if not, the first user identity detection is invalid. It should be noted that the device identifier in the embodiments of the present invention includes, but is not limited to, model information of a device, model information of hardware (e.g., chip), version information of a system, and the like.
If the identity is detected to be valid, step S306 is executed, otherwise step S308 is executed.
Step S306: the server transfers the first data from the second client to the first client through the data interaction platform according to the data transfer request;
specifically, the server can notify a background data transfer system to transfer the first data from the second client to the first client through the data interaction platform; for example, when the first data is funds, the background data transfer system may be specifically a background transfer system, and transfers the funds from the account corresponding to the second client to the account corresponding to the first client.
Step S308: the data transfer failed.
Specifically, the server may send data transfer failure prompt information to the first client, or may send information indicating that the first client requests data transfer failure from the second client to the second client.
Further, referring to the flowchart of setting the authorization list in the embodiment of the present invention shown in fig. 4, how the second client sets the authorization list before performing step S302 is described in detail, which may include the following steps:
step S400: the second client side initiates an authorization request based on the data interaction platform;
specifically, the authorization request is a request input by the second user through the second client, and includes user information authorizing a data transfer request to the second client; specifically, the second user may use a second mobile device to log in the data interaction platform, where the login account of the second user may be a second client, or the second mobile device that operates the second user to log in the data interaction platform is the second client; the second user can carry out instant messaging with other users on the data interaction platform through the second client, and send or receive interaction such as data information; the data interaction platform in the embodiment of the present invention may have a preset authorization request function, and when the second user sets authorization to enable user information of a data transfer request to the second client, the second user may initiate an authorization request based on the data interaction platform, for example, a virtual button for initiating an authorization request is preset at a preset position in an interaction interface of the data interaction platform, and the second user may initiate an authorization request by clicking the button; the data interaction platform can send the authorization request to a server, and the server finally receives the authorization request.
Step S402: the server receives an authorization request initiated by a second client based on the data interaction platform;
step S404: the server performs identity authentication interaction with the second client according to a preset identity authentication rule so as to detect whether the identity of the second user is valid;
specifically, the server may perform identity detection on the second user in the following three ways: receiving second verification password information input by the second client, and detecting whether the identity of the second user is valid by analyzing whether the second verification password information is matched with preset verification password information; or receiving second voice information input by the second client, and detecting whether the identity of the second user is valid by analyzing whether the second voice information is matched with preset voice information; or acquiring the equipment identifier of the second client, and detecting whether the identity of the second user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment; the above identity authentication interaction with the second client, and the process of performing identity detection on the second user may refer to the description of the step S304 in the embodiment of fig. 3 for the identity detection of the first client, and adopt any one or any combination of those three detection manners, which is not described herein again.
If the detection is valid, step S406 is executed, otherwise step S408 is executed.
Step S406: the server sets an authorization list according to the authorization request;
specifically, the authorization list may include user information authorized to perform the data transfer request in the authorization request, and the user information may further include a size of an authorized data value to be transferred, or a range of the authorized data value to be transferred, and the like; the server sets an authorization list according to the authorization request, namely, the authorization list indicates that a binding relationship between the second client and other clients is established, only if the binding relationship is established, other clients which are authorized in advance can directly initiate a data transfer request, the data transfer request is requested to be transferred from the second client to the server, and the data value of the data transfer request cannot be larger than the data value of the authorized transfer or is in the range of the authorized transfer data value.
Step S408: the authorization setup fails.
Still further, as shown in fig. 5, a schematic flow chart of another embodiment of the data processing method provided by the present invention is also described with reference to three sides of the server, the first client, and the second client, and the method may include the following steps:
step S500: a first client initiates a data transfer request based on a data interaction platform;
step S502: the server receives the data transfer request;
specifically, reference may be made to step S300 in the above embodiment of fig. 3, which is not described herein again.
Step S504: the server performs identity authentication interaction with the first client according to a preset identity authentication rule so as to detect whether the identity of the first user is valid;
specifically, the description of the identity detection of the first client in step S304 in the embodiment of fig. 3 may be referred to, and any one or any combination of the three detection manners may be adopted, which is not described herein again. When the detected identity is valid, step S506 is executed, otherwise step S516 is executed.
Step S506: the server generates an identity authentication confirmation request aiming at the first user and sends the identity authentication confirmation request to the second client;
specifically, the identity authentication confirmation request may include basic information of the first user, such as account information, phone information, mail information, address information, and the like, for the second client to authenticate.
Step S508: the second client returns confirmation request response information to the server;
specifically, the confirmation request response message is a response message sent by the second client after the second user confirms the first user according to the identity authentication confirmation request, so as to indicate whether the identity authentication of the first user passes; more specifically, the second user may communicate with the first user in real-time, such as make a call, send an instant message, and so on, based on the identity authentication confirmation request to confirm the authenticity of the first user identity, so as to prevent the data transfer request from being a request initiated by a malicious party impersonating the first user.
Step S510: the server receives the response information of the confirmation request returned by the second client;
specifically, when the confirmation request response information indicates that the authentication of the first user is passed, step S512 may be performed, and when the confirmation request response information indicates that the authentication of the first user is not passed, step S516 may be performed.
Step S512: the server performs identity authentication interaction with the second client according to a preset identity authentication rule so as to detect whether the identity of the second user is valid;
specifically, the description of the identity detection of the second client in step S404 in the embodiment of fig. 4 may be correspondingly referred to, and any one or any combination of the three detection manners may be adopted, which is not described herein again.
Step S514: the server transfers the first data from the second client to the first client through the data interaction platform according to the data transfer request;
specifically, reference may be made to step S306 in the foregoing embodiment of fig. 3, which is not described herein again.
Step S516: the data transfer failed.
Still further, the present invention further provides a data processing method, which is described in detail correspondingly from the first client side, and is described below with reference to a flowchart of another embodiment of the data processing method provided by the present invention shown in fig. 6, including the following steps:
step S600: initiating a data transfer request to a server based on a data interaction platform, wherein the data transfer request is a request input by a first user through a first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform;
step S602: receiving the first data transferred from the second client based on the data interaction platform; the transferred first data is the identity authentication of the first user by the server based on the data transfer request according to a preset authentication condition; and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request.
Specifically, before step S602, the method may further include: performing identity authentication interaction with the server according to a preset identity authentication rule so that the server can detect whether the identity of the first user is valid, wherein the identity authentication interaction specifically comprises at least one of the following:
sending first verification password information to the server based on the data interaction platform so that the server can detect whether the identity of the first user is valid by analyzing whether the first verification password information matches preset verification password information; or
Sending first voice information to the server based on the data interaction platform so that the server can detect whether the identity of the first user is valid by analyzing whether the first voice information matches preset voice information; or
And sending the equipment identifier of the first client to the server based on the data interaction platform, so that the server can detect whether the identity of the first user is valid by analyzing whether the equipment identifier of the first client matches a preset equipment identifier.
It is to be understood that the specific implementation manner in the embodiment of fig. 6 of the present invention may be correspondingly described with reference to the above description of the embodiments of fig. 2 to fig. 5, and details are not repeated here.
By implementing the embodiment of the invention, the first client can initiatively initiate a request to request the second client to transfer the first data to the first client based on the data interaction platform, and after the identity authentication of the user corresponding to the first client is passed according to the preset authentication condition, the first data is transferred from the second client to the first client, so that the technical problem that a transfer request cannot be rapidly initiated by a payee and the transfer processing cannot be safely completed in the transfer process in the prior art is solved, and the requirements of rapidly initiating a transfer request and safely completing the transfer processing in the prior art are greatly met; in addition, when the user identity is detected to be valid, the password information can be verified, and the detection is carried out through the matching of voice information or equipment identification information, so that the safety in the transfer process is further improved.
In order to better implement the above solution of the embodiment of the present invention, the present invention further provides a data processing apparatus, and as shown in fig. 7, the data processing apparatus 70 may include: a request receiving module 700, a first identity authentication module 702, and a data transfer module 704, wherein
The request receiving module 700 is configured to receive a data transfer request initiated by a first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform;
the first identity authentication module 702 is configured to authenticate the identity of the first user according to a preset authentication condition based on the data transfer request;
the data transfer module 704 is configured to transfer the first data from the second client to the first client through the data interaction platform according to the data transfer request after the identity authentication of the first user passes.
Specifically, as shown in fig. 8, which is a schematic structural diagram of the first authentication module according to the embodiment of the present invention, the first authentication module 702 may include: an authorization list determination unit 7020 and a first identity detection unit 7022, wherein
The authorization list determining unit 7020 is configured to determine whether the first user exists in a preset authorization list based on the data transfer request; the authorization list comprises user information of a data transfer request of a second user through the second client based on authorization preset by the data interaction platform;
the first identity detecting unit 7022 is configured to, when the determination result of the authorization list determining unit 7020 is yes, perform identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid, and if so, perform identity authentication on the first user.
Further, as shown in fig. 9, the data processing apparatus 70 includes a request receiving module 700, a first identity authentication module 702, and a data transfer module 704, and may further include: an authorization request receiving module 706, an identity validity detection module 708, and an authorization list setting module 7010, wherein
The authorization request receiving module 706 is configured to receive an authorization request initiated by a second client based on the data interaction platform before the authorization list determining unit 7020 determines whether the first user exists in a preset authorization list; the authorization request is a request input by the second user through the second client, and comprises user information authorizing the data transfer request to the second client;
the identity validity detection module 708 is configured to perform identity authentication interaction with the second client according to a preset identity authentication rule, so as to detect whether the identity of the second user is valid;
the authorization list setting module 7010 is configured to set an authorization list according to the authorization request if the identity validity detection module 708 detects that the identity validity is valid, where the authorization list includes user information authorized to perform a data transfer request in the authorization request.
Still further, as shown in fig. 10, which is a schematic structural diagram of another embodiment of the first authentication module provided in the present invention, the first authentication module 702 may include: a second identity detection unit 7024, a confirmation request generation sending unit 7026, a response information receiving unit 7028 and a third identity detection unit 70210, wherein
The second identity detecting unit 7024 is configured to perform identity authentication interaction with the first client according to a preset identity authentication rule, so as to detect whether the identity of the first user is valid;
a confirmation request generating and sending unit 7026, configured to generate, if the second identity detecting unit 7024 detects that the identity authentication request is valid, an identity authentication confirmation request for the first user, and send the identity authentication confirmation request to the second client;
a response information receiving unit 7028 is configured to receive response information of a confirmation request returned by the second client, where the response information of the confirmation request is response information sent by the second client after the second user confirms the first user according to the identity authentication confirmation request, so as to indicate whether the identity verification of the first user passes;
the third identity detecting unit 70210 is configured to, when the confirmation request response message indicates that the identity authentication of the first user passes, perform identity authentication interaction with the second client according to a preset identity authentication rule to detect whether the identity of the second user is valid;
if the detection of the third identity detection unit 70210 is valid, the identity authentication of the first user is passed.
Specifically, in the embodiment of the present invention, the first identity detecting unit 7022 or the second identity detecting unit 7024 performs identity authentication interaction with the first client according to a preset identity authentication rule, so as to detect whether the identity of the first user is valid, where the identity of the first user includes at least one of the following items:
receiving first verification password information input by the first client, and detecting whether the identity of the first user is valid by analyzing whether the first verification password information is matched with preset verification password information; or
Receiving first voice information input by the first client, and detecting whether the identity of the first user is valid or not by analyzing whether the first voice information is matched with preset voice information or not; or
And acquiring the equipment identifier of the first client, and detecting whether the identity of the first user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment.
More specifically, the identity validity detecting module 708 or the third identity detecting unit 70210 in the embodiment of the present invention performs identity authentication interaction with the second client according to a preset identity authentication rule, so as to detect whether the identity of the second user is valid includes at least one of the following:
receiving second verification password information input by the second client, and detecting whether the identity of the second user is valid by analyzing whether the second verification password information is matched with preset verification password information; or
Receiving second voice information input by the second client, and detecting whether the identity of the second user is valid or not by analyzing whether the second voice information is matched with preset voice information or not; or
And acquiring the equipment identifier of the second client, and detecting whether the identity of the second user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment.
Still further, please refer to fig. 11, wherein fig. 11 is a schematic structural diagram of a data processing apparatus according to another embodiment of the present invention. As shown in fig. 11, the data processing apparatus 110 may include: at least one processor 1101, such as a CPU, at least one network interface 1104, a user interface 1103, a memory 1105, at least one communication bus 1102, and a display 1106. Wherein a communication bus 1102 is used to enable connective communication between these components. The user interface 1103 may include a Display screen (Display)11, and the optional user interface 1103 may also include a standard wired interface or a wireless interface. The network interface 1104 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1105 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 1105 may alternatively be at least one storage device located remotely from the processor 1101. As shown in fig. 11, a memory 1105, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a data processing program.
In the data processing apparatus 110 shown in fig. 11, the network interface 1104 is mainly used for connecting a client and performing data communication with the client; and processor 1101 may be configured to invoke the online live based team activity program stored in memory 1105 and perform the following operations:
receiving a data transfer request initiated by a first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform;
based on the data transfer request, performing identity authentication on the first user according to a preset authentication condition;
and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request.
Specifically, the authenticating the identity of the first user according to the preset authentication condition based on the data transfer request by the processor 1101 may include:
judging whether the first user exists in a preset authorization list or not based on the data transfer request; the authorization list comprises user information of a data transfer request of a second user through the second client based on authorization preset by the data interaction platform;
and when the judgment result is yes, performing identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid, and if so, performing identity authentication on the first user.
Specifically, before determining whether the first user exists in the preset authorization list, the processor 1101 may further perform:
receiving an authorization request initiated by a second client based on the data interaction platform; the authorization request is a request input by the second user through the second client, and comprises user information authorizing the data transfer request to the second client;
performing identity authentication interaction with the second client according to a preset identity authentication rule to detect whether the identity of the second user is valid;
if the authorization request is valid, an authorization list is set according to the authorization request, and the authorization list comprises user information authorized to carry out the data transfer request in the authorization request.
Specifically, the authenticating the identity of the first user according to the preset authentication condition by the processor 1101 based on the data transfer request includes:
performing identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid;
if the first user is valid, generating an identity authentication confirmation request aiming at the first user, and sending the identity authentication confirmation request to the second client;
receiving a confirmation request response message returned by the second client, wherein the confirmation request response message is a response message sent by the second client after the second user confirms the first user according to the identity authentication confirmation request so as to indicate whether the identity verification of the first user passes;
when the confirmation request response information indicates that the identity verification of the first user passes, performing identity authentication interaction with the second client according to a preset identity authentication rule to detect whether the identity of the second user is valid;
and if the first user is valid, the first user passes identity authentication.
Specifically, the processor 1101 performs an identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid includes at least one of the following:
receiving first verification password information input by the first client, and detecting whether the identity of the first user is valid by analyzing whether the first verification password information is matched with preset verification password information; or
Receiving first voice information input by the first client, and detecting whether the identity of the first user is valid or not by analyzing whether the first voice information is matched with preset voice information or not; or
And acquiring the equipment identifier of the first client, and detecting whether the identity of the first user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment.
Specifically, the processor 1101 performs an identity authentication interaction with the second client according to a preset identity authentication rule to detect whether the identity of the second user is valid includes at least one of the following:
receiving second verification password information input by the second client, and detecting whether the identity of the second user is valid by analyzing whether the second verification password information is matched with preset verification password information; or
Receiving second voice information input by the second client, and detecting whether the identity of the second user is valid or not by analyzing whether the second voice information is matched with preset voice information or not; or
And acquiring the equipment identifier of the second client, and detecting whether the identity of the second user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment.
It should be noted that, the data processing apparatus 70 or the data processing apparatus 110 in the embodiment of the present invention may specifically be a device such as a server, or a certain apparatus or module installed in the server; the functions of the functional modules of the data processing apparatus 70 or the data processing apparatus 110 may be specifically implemented according to the method in the foregoing method embodiment, and the specific implementation process may refer to the related description of the foregoing method embodiment, which is not described herein again.
Correspondingly, the present invention further provides a data processing device, as shown in fig. 12, which is a schematic structural diagram of the data processing device provided in the embodiment of the present invention, the data processing device 120 may include: a request initiating module 1200 and a first data receiving module 1202, wherein
The request initiating module 1200 is configured to initiate a data transfer request to a server based on a data interaction platform, where the data transfer request is a request input by a first user through a first client and is used to request a second client to transfer first data to the first client based on the data interaction platform;
the first data receiving module 1202 is configured to receive the first data transferred from the second client based on the data interaction platform; the transferred first data is the identity authentication of the first user by the server based on the data transfer request according to a preset authentication condition; and after the identity authentication of the first user is passed, transferring the first data from the second client to the first client through the data interaction platform according to the data transfer request.
Specifically, as shown in fig. 13, in a schematic structural diagram of another embodiment of the data processing apparatus provided by the present invention, the data processing apparatus 120 includes, in addition to the request initiating module 1200 and the first data receiving module 1202, an identity detection interaction module 1204, configured to perform an identity authentication interaction with the server according to a preset identity authentication rule before the first data receiving module 1202 receives the first data transferred from the second client based on the data interaction platform, so that the server detects whether the identity of the first user is valid;
specifically, the identity detection interaction module 1204 includes at least one of:
a first information sending unit, configured to send first verification password information to the server based on the data interaction platform, so that the server detects whether the identity of the first user is valid by analyzing whether the first verification password information matches preset verification password information; or
A second information sending unit, configured to send, to the server, first voice information based on the data interaction platform, so that the server detects whether the identity of the first user is valid by analyzing whether the first voice information matches preset voice information; or
A third information sending unit, configured to send, to the server, the device identifier of the first client based on the data interaction platform, so that the server detects whether the identity of the first user is valid by analyzing whether the device identifier of the first client matches a preset device identifier.
It should be noted that the data processing device 120 in the embodiment of the present invention includes, but is not limited to, a mobile phone, a mobile computer, a tablet computer, a personal digital assistant, a media player, an intelligent television, an intelligent watch, intelligent glasses, an intelligent bracelet, and other user devices, the data processing device 120 may operate the first client in the above embodiment, functions of each functional module of the data processing device 120 may be specifically implemented according to the method in the above method embodiment, and a specific implementation process thereof may refer to the related description of the above method embodiment, and is not described herein again.
Referring to fig. 14, fig. 14 is a schematic structural diagram of a data processing system according to an embodiment of the present invention. As shown in FIG. 14, the data processing system 140 may include a server 1400, a first client 1402, and a second client 1404, where
The server 1400 receives a data transfer request initiated by the first client 1402 based on the data interaction platform; the data transfer request is a request input by a first user through the first client 1402, and is used for requesting the second client 1404 to transfer first data to the first client 1402 based on the data interaction platform; the server 1400 performs identity authentication on the first user according to a preset authentication condition based on the data transfer request; after the first user passes the identity authentication, the first data is transferred from the second client 1404 to the first client 1402 through the data interaction platform according to the data transfer request.
Specifically, the server 1400 may include the data processing apparatus 70 of fig. 7 to 10, or the data processing apparatus 110 of fig. 11; the first client 1402 may comprise the data processing device 120 in the embodiments of fig. 12-13; for how to implement the online live grouping activity, the data processing system 140 may refer to the description of the above method embodiment, and details are not described here.
In summary, with the embodiment of the present invention, a first client may initiate a request actively, request a second client to transfer first data to the first client based on a data interaction platform, and after passing identity authentication for a user corresponding to the first client according to a preset authentication condition, transfer the first data from the second client to the first client is achieved, so as to solve the technical problem that a payee cannot initiate a transfer request quickly and complete transfer processing safely in a transfer process in the prior art, and greatly meet the requirements of initiating a transfer request quickly and completing transfer processing safely in the prior art; in addition, when the user identity is detected to be valid, the password information can be verified, and the detection is carried out through the matching of voice information or equipment identification information, so that the safety in the transfer process is further improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (17)

1. A data processing method, comprising:
the method comprises the steps that a server receives a data transfer request initiated by a first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform; the data interaction platform is used for the first user to carry out instant messaging with other users through the logged first client, and send or receive data information;
the server authenticates the identity of the first user according to a preset authentication condition based on the data transfer request; the authentication condition comprises: judging whether a user initiating the request obtains authorization of the request in advance;
after the identity authentication of the first user is passed, the server informs a background transfer system to transfer the first data from the second client to the first client through the data interaction platform according to the relevant information of the second client in the data transfer request and the relevant information of the first data required to be transferred;
the authenticating the identity of the first user according to a preset authentication condition based on the data transfer request comprises:
judging whether the first user exists in a preset authorization list or not based on the data transfer request; the authorization list comprises user information of a data transfer request of a second user through the second client based on authorization preset by the data interaction platform; the user information comprises the size of the authorized transfer data value or the range of the authorized transfer data value;
and if so, judging whether the value of the first data requested to be transferred by the first user is smaller than the authorized transfer data value or is in the range of the authorized transfer data value, if so, performing identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid, and if so, performing identity authentication on the first user.
2. The method of claim 1, wherein prior to determining whether the first user is present in a preset authorization list, further comprising:
receiving an authorization request initiated by a second client based on the data interaction platform; the authorization request is a request input by the second user through the second client, and comprises user information authorizing the data transfer request to the second client;
performing identity authentication interaction with the second client according to a preset identity authentication rule to detect whether the identity of the second user is valid;
if the authorization request is valid, an authorization list is set according to the authorization request, and the authorization list comprises user information authorized to carry out the data transfer request in the authorization request.
3. The method as claimed in claim 1, wherein said authenticating the first user according to a preset authentication condition based on the data transfer request further comprises:
performing identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid;
if the first user is valid, generating an identity authentication confirmation request aiming at the first user, and sending the identity authentication confirmation request to the second client;
receiving a confirmation request response message returned by the second client, wherein the confirmation request response message is a response message sent by the second client after the second user confirms the first user according to the identity authentication confirmation request so as to indicate whether the identity verification of the first user passes;
when the confirmation request response information indicates that the identity verification of the first user passes, performing identity authentication interaction with the second client according to a preset identity authentication rule to detect whether the identity of the second user is valid;
and if the first user is valid, the first user passes identity authentication.
4. The method according to claim 1 or 3, wherein the performing the authentication interaction with the first client according to the preset authentication rule to detect whether the identity of the first user is valid comprises at least one of:
receiving first verification password information input by the first client, and detecting whether the identity of the first user is valid by analyzing whether the first verification password information is matched with preset verification password information; or
Receiving first voice information input by the first client, and detecting whether the identity of the first user is valid or not by analyzing whether the first voice information is matched with preset voice information or not; or
And acquiring the equipment identifier of the first client, and detecting whether the identity of the first user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment.
5. The method according to claim 2 or 3, wherein the performing the authentication interaction with the second client according to the preset authentication rule to detect whether the identity of the second user is valid comprises at least one of:
receiving second verification password information input by the second client, and detecting whether the identity of the second user is valid by analyzing whether the second verification password information is matched with preset verification password information; or
Receiving second voice information input by the second client, and detecting whether the identity of the second user is valid or not by analyzing whether the second voice information is matched with preset voice information or not; or
And acquiring the equipment identifier of the second client, and detecting whether the identity of the second user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment.
6. A data processing method, comprising:
initiating a data transfer request to a server based on a data interaction platform, wherein the data transfer request is a request input by a first user through a first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform; the data interaction platform is used for the first user to carry out instant messaging with other users through the logged first client, and send or receive data information;
receiving the first data transferred from the second client based on the data interaction platform; the transferred first data is the identity authentication of the first user by the server based on the data transfer request according to a preset authentication condition; after the identity authentication of the first user is passed, the server informs a background transfer system to transfer the first data from the second client to the first client through the data interaction platform according to the relevant information of the second client in the data transfer request and the relevant information of the first data required to be transferred; the authentication condition comprises: judging whether a user initiating the request obtains authorization of the request in advance;
the authenticating the identity of the first user according to a preset authentication condition based on the data transfer request comprises: judging whether the first user exists in a preset authorization list or not based on the data transfer request; the authorization list comprises user information of a data transfer request of a second user through the second client based on authorization preset by the data interaction platform; the user information comprises the size of the authorized transfer data value or the range of the authorized transfer data value; and if so, judging whether the value of the first data requested to be transferred by the first user is smaller than the authorized transfer data value or is in the range of the authorized transfer data value, if so, performing identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid, and if so, performing identity authentication on the first user.
7. The method of claim 6, wherein before receiving the first data transferred from the second client based on the data interaction platform, further comprises performing an identity authentication interaction with the server according to a preset identity authentication rule, so that the server detects whether the identity of the first user is valid, and specifically includes at least one of:
sending first verification password information to the server based on the data interaction platform so that the server can detect whether the identity of the first user is valid by analyzing whether the first verification password information matches preset verification password information; or
Sending first voice information to the server based on the data interaction platform so that the server can detect whether the identity of the first user is valid by analyzing whether the first voice information matches preset voice information; or
And sending the equipment identifier of the first client to the server based on the data interaction platform, so that the server can detect whether the identity of the first user is valid by analyzing whether the equipment identifier of the first client matches a preset equipment identifier.
8. A data processing apparatus, comprising:
the request receiving module is used for receiving a data transfer request initiated by a first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform; the data interaction platform is used for the first user to carry out instant messaging with other users through the logged first client, and send or receive data information;
the first identity authentication module is used for carrying out identity authentication on the first user according to a preset authentication condition based on the data transfer request; the authentication condition comprises: judging whether a user initiating the request obtains authorization of the request in advance;
the data transfer module is used for informing a background transfer system to transfer the first data from the second client to the first client through the data interaction platform according to the relevant information of the second client and the relevant information of the first data required to be transferred in the data transfer request after the identity authentication of the first user is passed;
the first identity authentication module comprises:
an authorization list judging unit, configured to judge whether the first user exists in a preset authorization list based on the data transfer request; the authorization list comprises user information of a data transfer request of a second user through the second client based on authorization preset by the data interaction platform; the user information also comprises the size of the authorized transfer data value or the range of the authorized transfer data value; after the first user is judged to be in a preset authorization list, judging whether the value of the first data requested to be transferred by the first user is smaller than the authorized transfer data value or in the authorized transfer data value range;
and the first identity detection unit is used for carrying out identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid or not when the judgment result of the authorization list judgment unit is yes, and carrying out identity authentication on the first user if the identity of the first user is valid.
9. The apparatus of claim 8, further comprising:
an authorization request receiving module, configured to receive an authorization request initiated by a second client based on the data interaction platform before the authorization list determining unit determines whether the first user exists in a preset authorization list; the authorization request is a request input by the second user through the second client, and comprises user information authorizing the data transfer request to the second client;
the identity validity detection module is used for carrying out identity authentication interaction with the second client according to a preset identity authentication rule so as to detect whether the identity of the second user is valid;
and the authorization list setting module is used for setting an authorization list according to the authorization request if the identity validity detection module detects that the identity validity detection module is valid, wherein the authorization list comprises user information authorized to carry out the data transfer request in the authorization request.
10. The apparatus of claim 8, wherein the first authentication module further comprises:
the second identity detection unit is used for carrying out identity authentication interaction with the first client according to a preset identity authentication rule so as to detect whether the identity of the first user is valid;
a confirmation request generation and sending unit, configured to generate an identity authentication confirmation request for the first user and send the identity authentication confirmation request to the second client if the second identity detection unit detects that the second identity detection unit is valid;
a response information receiving unit, configured to receive response information of a confirmation request returned by the second client, where the response information of the confirmation request is response information sent by the second client after the second user confirms the first user according to the authentication confirmation request, so as to indicate whether the authentication of the first user passes or not;
a third identity detection unit, configured to perform, when the confirmation request response information indicates that the identity verification of the first user passes, identity authentication interaction with the second client according to a preset identity authentication rule, so as to detect whether the identity of the second user is valid;
and if the detection of the third identity detection unit is valid, the identity authentication of the first user is passed.
11. The apparatus according to claim 8 or 10, wherein the first identity detection unit or the second identity detection unit performs identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid includes at least one of:
receiving first verification password information input by the first client, and detecting whether the identity of the first user is valid by analyzing whether the first verification password information is matched with preset verification password information; or
Receiving first voice information input by the first client, and detecting whether the identity of the first user is valid or not by analyzing whether the first voice information is matched with preset voice information or not; or
And acquiring the equipment identifier of the first client, and detecting whether the identity of the first user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment.
12. The apparatus according to claim 9 or 10, wherein the identity validity detecting module or the third identity detecting unit performs identity authentication interaction with the second client according to a preset identity authentication rule to detect whether the identity of the second user is valid includes at least one of:
receiving second verification password information input by the second client, and detecting whether the identity of the second user is valid by analyzing whether the second verification password information is matched with preset verification password information; or
Receiving second voice information input by the second client, and detecting whether the identity of the second user is valid or not by analyzing whether the second voice information is matched with preset voice information or not; or
And acquiring the equipment identifier of the second client, and detecting whether the identity of the second user is valid by analyzing whether the equipment identifier is matched with a preset equipment identifier for authentication judgment.
13. A data processing apparatus, characterized by comprising:
the request initiating module is used for initiating a data transfer request to a server based on a data interaction platform, wherein the data transfer request is a request input by a first user through a first client and is used for requesting a second client to transfer first data to the first client based on the data interaction platform; the data interaction platform is used for the first user to carry out instant messaging with other users through the logged first client, and send or receive data information;
a first data receiving module, configured to receive the first data transferred from the second client based on the data interaction platform; the transferred first data is the identity authentication of the first user by the server based on the data transfer request according to a preset authentication condition; after the identity authentication of the first user is passed, the server informs a background transfer system to transfer the first data from the second client to the first client through the data interaction platform according to the relevant information of the second client in the data transfer request and the relevant information of the first data required to be transferred; the authentication condition comprises: judging whether a user initiating the request obtains authorization of the request in advance;
the server, based on the data transfer request, performs identity authentication on the first user according to a preset authentication condition, including: judging whether the first user exists in a preset authorization list or not based on the data transfer request; the authorization list comprises user information of a data transfer request of a second user through the second client based on authorization preset by the data interaction platform; the user information comprises the size of the authorized transfer data value or the range of the authorized transfer data value; and if so, judging whether the value of the first data requested to be transferred by the first user is smaller than the authorized transfer data value or is in the range of the authorized transfer data value, if so, performing identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid, and if so, performing identity authentication on the first user.
14. The apparatus of claim 13, further comprising: the identity detection interaction module is used for performing identity authentication interaction with the server according to a preset identity authentication rule before the first data receiving module receives the first data transferred from the second client based on the data interaction platform, so that the server can detect whether the identity of the first user is valid;
the identity detection interaction module comprises at least one of:
a first information sending unit, configured to send first verification password information to the server based on the data interaction platform, so that the server detects whether the identity of the first user is valid by analyzing whether the first verification password information matches preset verification password information; or
A second information sending unit, configured to send, to the server, first voice information based on the data interaction platform, so that the server detects whether the identity of the first user is valid by analyzing whether the first voice information matches preset voice information; or
A third information sending unit, configured to send, to the server, the device identifier of the first client based on the data interaction platform, so that the server detects whether the identity of the first user is valid by analyzing whether the device identifier of the first client matches a preset device identifier.
15. A data processing system is characterized by comprising a server, a first client and a second client, wherein
The server receives a data transfer request initiated by the first client based on a data interaction platform; the data transfer request is a request input by a first user through the first client and is used for requesting the second client to transfer first data to the first client based on the data interaction platform; the data interaction platform is used for the first user to carry out instant messaging with other users through the logged first client, and send or receive data information; the server authenticates the identity of the first user according to a preset authentication condition based on the data transfer request; the authentication condition comprises: judging whether a user initiating the request obtains authorization of the request in advance; after the identity authentication of the first user is passed, the server informs a background transfer system to transfer the first data from the second client to the first client through the data interaction platform according to the relevant information of the second client in the data transfer request and the relevant information of the first data required to be transferred;
the server, based on the data transfer request, performs identity authentication on the first user according to a preset authentication condition, including: judging whether the first user exists in a preset authorization list or not based on the data transfer request; the authorization list comprises user information of a data transfer request of a second user through the second client based on authorization preset by the data interaction platform; the user information comprises the size of the authorized transfer data value or the range of the authorized transfer data value; and if so, judging whether the value of the first data requested to be transferred by the first user is smaller than the authorized transfer data value or is in the range of the authorized transfer data value, if so, performing identity authentication interaction with the first client according to a preset identity authentication rule to detect whether the identity of the first user is valid, and if so, performing identity authentication on the first user.
16. The system according to claim 15, wherein the server comprises a data processing apparatus according to any one of claims 8-12; the first client comprises a data processing device according to claim 13 or 14.
17. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to carry out the method according to any one of claims 1-7.
CN201410640492.0A 2014-11-13 2014-11-13 Data processing method, related device and system Active CN105656850B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410640492.0A CN105656850B (en) 2014-11-13 2014-11-13 Data processing method, related device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410640492.0A CN105656850B (en) 2014-11-13 2014-11-13 Data processing method, related device and system

Publications (2)

Publication Number Publication Date
CN105656850A CN105656850A (en) 2016-06-08
CN105656850B true CN105656850B (en) 2020-08-14

Family

ID=56479453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410640492.0A Active CN105656850B (en) 2014-11-13 2014-11-13 Data processing method, related device and system

Country Status (1)

Country Link
CN (1) CN105656850B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302558B (en) * 2015-05-11 2020-01-21 阿里巴巴集团控股有限公司 Service processing method and device
CN106203998A (en) * 2016-07-04 2016-12-07 天脉聚源(北京)传媒科技有限公司 A kind of method and device of withdrawing deposit of net cast
CN106332054B (en) * 2016-10-20 2018-03-27 广东欧珀移动通信有限公司 The method and device of Data Migration authentication
CN109446259B (en) * 2018-10-24 2021-01-12 北京慧流科技有限公司 Data processing method and device, processor and storage medium
CN111629033B (en) * 2020-04-30 2022-08-09 中国移动通信集团江苏有限公司 Data transfer method, device, equipment and computer readable storage medium
CN111800498A (en) * 2020-06-30 2020-10-20 联想(北京)有限公司 Data transmission method and device
CN113537507B (en) * 2020-09-02 2024-05-24 腾讯科技(深圳)有限公司 Machine learning system, method and electronic equipment
CN112737784B (en) * 2020-12-09 2022-03-22 中国电子科技集团公司第三十研究所 Method for realizing user data safe migration based on voice channel

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101203878A (en) * 2005-03-21 2008-06-18 金泳洙 System and method for transferring money based on approval of transfer request transmitted from receiver to sender
CN102568113A (en) * 2010-12-13 2012-07-11 中兴通讯股份有限公司 Module, device, system and method for capital transfer among electronic purses of mobile terminals
CN102663586A (en) * 2012-03-21 2012-09-12 华为技术有限公司 Method for payment transaction completed through two mobile terminals

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103401844B (en) * 2013-07-12 2016-09-14 天地融科技股份有限公司 The processing method of operation requests and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101203878A (en) * 2005-03-21 2008-06-18 金泳洙 System and method for transferring money based on approval of transfer request transmitted from receiver to sender
CN102568113A (en) * 2010-12-13 2012-07-11 中兴通讯股份有限公司 Module, device, system and method for capital transfer among electronic purses of mobile terminals
CN102663586A (en) * 2012-03-21 2012-09-12 华为技术有限公司 Method for payment transaction completed through two mobile terminals

Also Published As

Publication number Publication date
CN105656850A (en) 2016-06-08

Similar Documents

Publication Publication Date Title
CN105656850B (en) Data processing method, related device and system
US9413758B2 (en) Communication session transfer between devices
TWI635409B (en) Query system, method and non-transitory machine-readable medium to determine authentication capabilities
CN104077689B (en) A kind of method of Information Authentication, relevant apparatus and system
EP3378214B1 (en) Controlling access to online resources using device validations
EP2887615A1 (en) Cloud-based scalable authentication for electronic devices
JP5739008B2 (en) Method, apparatus, and system for verifying a communication session
US11539526B2 (en) Method and apparatus for managing user authentication in a blockchain network
US20130086655A1 (en) Password changing
KR20220019834A (en) Method and system for authenticating transmission of secure credentials to a device
US9306753B1 (en) Mobile system and method for improving safety of impromptu meetings
US10659458B2 (en) Systems and methods for performing biometric registration and authentication of a user to provide access to a secure network
CN107241306B (en) Man-machine identification method, server, client and man-machine identification system
TW201640423A (en) Computerized system and method for offline identity authentication of a user cross-reference to related applications
TWI680687B (en) Communication method and device
US11777942B2 (en) Transfer of trust between authentication devices
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN111404695B (en) Token request verification method and device
JP2022527798A (en) Systems and methods for efficient challenge response authentication
JP2017535893A (en) Payment verification method, apparatus and system
CA2797353C (en) Secure authentication
US20230063417A1 (en) System and method for forwarding authentication requests to a nearby authenticator
JP2024522281A (en) Code-based two-factor authentication
WO2016112792A1 (en) Identity authentication method and device
CN105516069B (en) Data processing method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant