CN105868596A - Method and device for real name authentication of identity - Google Patents
Method and device for real name authentication of identity Download PDFInfo
- Publication number
- CN105868596A CN105868596A CN201610366211.6A CN201610366211A CN105868596A CN 105868596 A CN105868596 A CN 105868596A CN 201610366211 A CN201610366211 A CN 201610366211A CN 105868596 A CN105868596 A CN 105868596A
- Authority
- CN
- China
- Prior art keywords
- identity
- problem set
- data
- proof
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method and a device for the real name authentication of an identity. The method for the real name authentication of the identity comprises the following steps of forwarding identity identification data which are used for identifying a target object and having uniqueness to an identity identification verifying party, wherein the target object is a to-be-validated object, and the identity identification verifying party is used for verifying whether the identity identification data are valid or not; when the identity identification verifying party verifies the identity identification data to be valid, inquiring the identity verification data of the target object in an identity verification database according to the identity identification data; generating a first problem set corresponding to the identity verification data according to the identity verification data; obtaining answers of problems in the first problem set, and carrying out verification on the answers of the problems in the first problem set, so as to obtain a verification result; when the verification result accords with a preset condition, determining that an identity data submitting party is the target object. Through the method and the device for the real name authentication of the identity, the effect of preventing the identity from being usurped is achieved.
Description
Technical field
The present invention relates to field of identity authentication, in particular to the method and apparatus of a kind of identity real name certification.
Background technology
In information system, identity represents a participant of business, and it often shows as an ID (User
ID) or login name (Login), may be corresponding a mechanism, an application system or individual.Many times, because of
For national policy, legal requiremnt or the needs promoting service quality, information system must determine the concrete machine that identity is corresponding
Structure or individual, carry out corresponding by the login name in information system with actual focal pointe, the need of identity real name certification
Ask and arise at the historic moment.
At present, information system have employed different modes, individual's real name to the real name authentication procedures of mechanism and individual
Authentication mode is mainly by the way of ID card verification and bank card checking, or is carried out the side verified by cell-phone number
Formula.The basic procedure verifying personal identification is as follows: user submits name, identification card number, bank's card number, pre-to
Stay cell-phone number;Service provider is by ID (identity number) card No. Help Center of Ministry of Public Security checking identification card number and the effectiveness of name, so
Afterwards by the interface checking name of bank or Unionpay, identification card number, bank's card number, the effectiveness of reserved cell-phone number,
Or by the way of online small amount beats money (service provider beats the bank card that money provides to user), verify bank card and name
Effectiveness;It it is the interface checking hands utilizing mobile communication carrier by the way of cell-phone number carries out individual's real-name authentication
The effectiveness of plane No., identity card and name;Existing mechanism real-name authentication mode is mainly by uploading business license copy
Carrying out with the checking of mechanism Bank Account Number, this process is similar with the process of individual real-name authentication.
Owing to Bank Account Number (or mobile phone) process of opening an account is to need real-name authentication, therefore by Bank Account Number (or mobile phone
Number) generally can be considered that real-name authentication and passed through after checking.Also have some tightened up real-name authentication modes, than
As, part Third-party payment requires that personal user uploads the copy of personal identity card, is verified by examination & verification copy
Everyone of identity card.
Above-mentioned steps demonstrates the verity of identity data, thus ensures that the identity data got is effective, that is,
Individual or mechanism that this identity data is corresponding are necessary beings.
The imperfection protected due to current individual privacy, name, identification card number, bank's card number, reserved cell-phone number, body
Part card information situation that is compromised and that usurp such as copy happens occasionally, therefore, name, identification card number, bank's card number,
The submission of the information such as reserved cell-phone number can not be for I, and therefore, existing real name identification method causes identity stolen
Situation of common occurrence;On the other hand, although the process of opening an account of bank card (or mobile phone) needs real-name authentication, but
It is that the use process of bank card (or mobile phone) is not required to real-name authentication, therefore, opening of bank card (or mobile phone)
People from family and in the case of making employment not be same people, even if not occurring information to usurp, bank card (or mobile phone) is verified also
Falsely using of identity can not be prevented.
In sum, the real-name authentication process verification of the prior art effectiveness of identity data, but do not verify body
Whether number is the identity owner itself according to submission side.Verify that merely identity data does not verify that identity holder is one
Incomplete proof procedure, it is impossible to prevent identity stolen.
For correlation technique cannot prevent the stolen problem of identity, effective solution is the most not yet proposed.
Summary of the invention
Present invention is primarily targeted at the method and apparatus that a kind of identity real name certification is provided, at least to solve relevant skill
Art cannot prevent the problem that identity is stolen.
To achieve these goals, according to an aspect of the invention, it is provided a kind of method of identity real name certification.
The method of this identity real name certification includes: forward for identifying the identity data with uniqueness of destination object extremely
Identity verification side, wherein, destination object is object to be verified, and identity verification side is used for verifying identity mark
Know data the most effective;When identity verification side verification identity data is effective, exist according to identity data
Inquiring about the proof of identity data of destination object in proof of identity data base, wherein, proof of identity data base is by gathering
Proof of identity data and the data base that pre-builds, proof of identity data are to destination object shape during daily routines
The historical record data become;According to the first problem set that proof of identity data genaration is corresponding with proof of identity data;
Obtain the answer of problem in first problem set, and the answer to the problem in first problem set performs verification, must
To check results;When check results meets pre-conditioned, the data that determine one's identity submission side is destination object.
Further, before the data submission side that determines one's identity is destination object, the method for this identity real name certification is also wrapped
Include: forwarding identity data is to the private data source side comprising proof of identity data, wherein, private data source root
Generate Second Problem set according to identity data, and the answer to the problem in Second Problem set performs verification,
To check results, after the first problem set corresponding with proof of identity data according to proof of identity data genaration,
The method of this identity real name certification also includes: obtain Second Problem set;To first problem set and Second Problem set
Collect, obtain the 3rd problem set.
Further, private data source side includes multiple private data source side, when check results meets pre-conditioned,
The data that determine one's identity submission side is that destination object includes: when the check results that first problem set is corresponding meets pre-conditioned
Time, the problem in Second Problem set is originated and is analyzed, obtain analysis result;By answering in Second Problem set
Case is committed to the multiple private data source sides corresponding with analysis result, wherein, multiple privately owned numbers respectively according to analysis result
According to source side, the answer of the problem in Second Problem set is performed verification, when each private data source side is to Second Problem collection
The answer of the problem in conjunction performs to verify when all passing through, and the data that determine one's identity submission side is destination object.
Further, the answer in Second Problem set is being committed to corresponding with analysis result respectively according to analysis result
Multiple private data source sides before, the method for this identity real name certification also includes: when the school that first problem set is corresponding
Testing result when not meeting pre-conditioned, the data that determine one's identity submission side is not destination object.
Further, multiple private data source sides are respectively equipped with weight, obtain Second Problem set and include: obtain multiple
Second Problem set, wherein, multiple private data source sides obtain multiple private data source side respectively according to preset rules
Weight, determines the problem set corresponding with multiple private data source sides according to the weight of multiple private data source sides respectively,
Obtain multiple Second Problem set, wherein, the problem of the Second Problem set that private data source side that weight is high is corresponding
The problem number of the Second Problem set that number private data source sides lower than weight are corresponding is many, to first problem set and the
Two problem set collect, and obtain the 3rd problem set and include: to first problem set and multiple Second Problem set
Collect, obtain the 3rd problem set, first problem set and Second Problem set are being collected, obtain
After three problem set, the method for this identity real name certification also includes: obtain problem in the 3rd problem set respectively
Answer;Calculating is performed respectively according to the answer of the problem in the weight of multiple private data source sides and the 3rd problem set,
Obtain result of calculation.
Further, before the data submission side that determines one's identity is destination object, the method for this identity real name certification is also wrapped
Include: judge that whether result of calculation is more than or equal to preset value;If it is judged that result of calculation is more than or equal to preset value, determine
Check results meets pre-conditioned;If it is judged that result of calculation is less than preset value, determine that check results does not meets default
Condition.
Further, when identity verification side verification identity data is effective, according to identity data at body
The proof of identity data inquiring about destination object in part calibration database include: when identity verification side verifies identity
When data are effective, in proof of identity data base, inquire about the proof of identity data strip of destination object according to identity data
Mesh set, includes according to the first problem set that proof of identity data genaration is corresponding with proof of identity data: select at random
Select the proof of identity Data Entry in proof of identity Data Entry set, and according to the proof of identity Data Entry selected
Generating first problem set, wherein, the problem in first problem set and proof of identity Data Entry have one_to_one corresponding
Relation.
To achieve these goals, according to a further aspect in the invention, the device of a kind of identity real name certification is additionally provided.
The device of this identity real name certification includes: the first retransmission unit, unique for forwarding for identifying having of destination object
The identity data of property is to identity verification side, and wherein, destination object is object to be verified, identity school
It is the most effective that proved recipe is used for verifying identity data;Query unit, for verifying identity mark when identity verification side
When knowledge data are effective, in proof of identity data base, inquire about the proof of identity data of destination object according to identity data,
Wherein, proof of identity data base is the data base pre-build by captured identity verification data, proof of identity data
For the historical record data that destination object is formed during day-to-day operations, work, studying or living;Problem generates
Unit, for the first problem set corresponding with proof of identity data according to proof of identity data genaration;Processing unit,
For obtaining the answer of the problem in first problem set, and the answer to the problem in first problem set performs verification,
Obtain check results;First determines unit, and for when check results meets pre-conditioned, the data that determine one's identity are submitted to
Side is destination object.
Further, the device of this identity real name certification also includes: the second retransmission unit, in the data that determine one's identity
Before submission side is destination object, forward identity data to comprising the private data source side of proof of identity data, its
In, private data source root generates Second Problem set according to identity data, and to the problem in Second Problem set
Answer perform verification, obtain check results, the first acquiring unit, for according to proof of identity data genaration and body
After the first problem set that part verification data are corresponding, obtain Second Problem set;Collection unit, for first
Problem set and Second Problem set collect, and obtain the 3rd problem set.
Further, private data source side includes multiple private data source side, when check results meets pre-conditioned,
This first determines that unit includes: analyze module, for meeting pre-conditioned when the check results that first problem set is corresponding
Time, the problem in Second Problem set is originated and is analyzed, obtain analysis result;Submit module to, for by second
Answer in problem set is committed to the multiple private data source sides corresponding with analysis result respectively according to analysis result, its
In, multiple private data source sides perform verification to the answer of the problem in Second Problem set, when each private data source
The answer of the problem in Second Problem set is performed to verify when all passing through by side, and the data that determine one's identity submission side is target pair
As.
Further, the device of this identity real name certification also includes: second determines unit, for by Second Problem collection
Before answer in conjunction is committed to multiple private data source sides corresponding with analysis result respectively according to analysis result, when
When check results corresponding to one problem set does not meets pre-conditioned, the data that determine one's identity submission side is not destination object.
Further, multiple private data source sides are respectively equipped with weight, and the first acquiring unit is used for obtaining multiple second and asks
Topic set, wherein, multiple private data source sides obtain the weight of multiple private data source side respectively according to preset rules,
Determine the problem set corresponding with multiple private data source sides according to the weight of multiple private data source sides respectively, obtain many
Individual Second Problem set, wherein, the problem number of the Second Problem set that private data source side that weight is high is corresponding is than power
The problem number of the Second Problem set that the lowest private data source side is corresponding is many, and collection unit is for first problem collection
Closing and multiple Second Problem set collect, obtain the 3rd problem set, the device of this identity real name certification also includes:
Second acquisition unit, for obtaining the answer of the problem in multiple 3rd problem set respectively;And computing unit, use
In performing calculating according to the answer of the problem in the weight of multiple private data source sides and the 3rd problem set respectively, obtain
Result of calculation.
By the present invention, use and forward for identifying the identity data with uniqueness of destination object to identity mark
Knowing verification side, wherein, destination object is object to be verified, and identity verification side is used for verifying identity data
The most effective;When identity verification side verification identity data is effective, according to identity data in identity school
Testing the proof of identity data inquiring about destination object in data base, wherein, proof of identity data base is by captured identity school
The data base testing data and pre-build, proof of identity data are to go through destination object formation during daily routines
Records of the Historian record data;According to the first problem set that proof of identity data genaration is corresponding with proof of identity data;Obtain the
The answer of the problem in one problem set, and the answer to the problem in first problem set performs verification, is verified
Result;When check results meets pre-conditioned, the data that determine one's identity submission side is destination object, solves relevant skill
Art cannot prevent the problem that identity is stolen, reached the effect preventing identity stolen.
Accompanying drawing explanation
The accompanying drawing of the part constituting the application is used for providing a further understanding of the present invention, and the present invention's is schematic real
Execute example and illustrate for explaining the present invention, being not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method for identity real name certification according to embodiments of the present invention;
Fig. 2 is the schematic flow sheet of the method for identity real name certification according to embodiments of the present invention;And
Fig. 3 is the schematic diagram of the device of identity real name certification according to embodiments of the present invention.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the application and the feature in embodiment can phases
Combination mutually.Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
In order to make those skilled in the art be more fully understood that the application scheme, below in conjunction with in the embodiment of the present application
Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present application, it is clear that described embodiment
It is only the embodiment of the application part rather than whole embodiments.Based on the embodiment in the application, ability
The every other embodiment that territory those of ordinary skill is obtained under not making creative work premise, all should belong to
The scope of the application protection.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, "
Two " it is etc. for distinguishing similar object, without being used for describing specific order or precedence.Should be appreciated that this
The data that sample uses can be exchanged in the appropriate case, in order to embodiments herein described herein.Additionally, term
" include " and " having " and their any deformation, it is intended that cover non-exclusive comprising, such as, comprise
The process of series of steps or unit, method, system, product or equipment are not necessarily limited to those steps clearly listed
Rapid or unit, but can include that the most clearly list or intrinsic for these processes, method, product or equipment
Other step or unit.
A kind of method that the invention provides identity real name certification, the method includes that identity data submission side, identity have
The related entities such as the person side of verification, identity verification side, non-private data source side;
Fig. 1 is the flow chart of the method for identity real name certification according to embodiments of the present invention.As it is shown in figure 1, this identity
The method of real-name authentication comprises the following steps:
Step S101, forwards and verifies for the identity data with uniqueness identifying destination object to identity
Side.
Identity data submission side submits to the identity data of destination object to the identity owner side of verification.Identity owner
Verification side obtains the identity data with uniqueness for identifying destination object, and forwards identity data extremely
Identity verification side.According to the destination object that identity data is corresponding, identity data is probably personal identification mark
Data or authority identity mark data, destination object is object to be verified, that is, identity owner, such as, should
Destination object is individual to be verified, or is mechanism to be verified, and identity verification side is used for verifying identity
Data are the most effective, can be personal identification mark verification side or authority identity mark verification side, and personal identification identifies
Whether verification can think " ID (identity number) card No. Help Center of the Ministry of Public Security ", exist for querying individual identity data, and
Whether within the time limit of rationally, authority identity mark verification can think " whole nation credit information of enterprise publicity system ", uses
In determining that enterprise or mechanism are the most effective.
When identity verification side verification identity data is effective, perform step S102.
Step S102, when identity verification side verification identity data is effective, according to identity data at body
Part calibration database is inquired about the proof of identity data of destination object.
Forwarding after the identity data with uniqueness identifying destination object to identity verification side,
When identity verification side verification identity data is effective, identity owner verifies root and exists according to identity data
Proof of identity data base inquires about the proof of identity data of destination object.
Proof of identity data base is the data base pre-build by captured identity verification data, and proof of identity data are
To destination object during daily routines formed historical record data, such as, destination object day-to-day operations,
The historical record data formed during work, studying or living, closely bound up with the identity information of destination object, one
For as, proof of identity data include the information such as beginning and ending time, place, related side, quantity.Proof of identity data base
Derive from the proof of identity data of the non-private data source side that the identity owner side of verification gathers, so-called non-private data source
Side, refers to that its proof of identity data can be gathered by proof of identity side, and identity owner verifies root according to the non-private gathered
The proof of identity data having data source set up proof of identity data base.Proof of identity data Kuku is by multiple proof of identity numbers
Constituting according to entry, proof of identity data base entries includes identity data and activity data.
Destination object is verified, need to use the proof of identity data of the stronger destination object of privacy or from
Destination object is verified by multiple dimensions.The character of the proof of identity data according to destination object and the process of generation are not
With, proof of identity data may reside in the machines such as government bodies, employer's organization, school, publishing house, telecommunications, electricity business
Structure.The data source of the part identity verification data of destination object is can be disclosed access or be gathered by the third-party institution
Non-private data source, such that it is able to by the identity owner side's of verification collection.
Step S103, according to the first problem set that proof of identity data genaration is corresponding with proof of identity data.
Identity owner verifies root according to the proof of identity data genaration first problem collection corresponding with proof of identity data
Close.The identity owner side of verification can select at random according to the proof of identity data inquired in proof of identity data base
Select proof of identity data, further according to the first problem that the proof of identity data genaration selected is corresponding with proof of identity data
Set.First problem set includes multiple problem, and each problem in first problem set can be with identity-based check number
According to time, related side, quantity etc. puts question to.
Step S104, the answer of the problem in acquisition first problem set, and answering the problem in first problem set
Case performs verification, obtains check results.
After the first problem set corresponding with proof of identity data according to proof of identity data genaration, identity has
Identity data submission side is submitted in first problem set by the person side of verification, and identity data submission side is answered in specifying the time limit
Problem in first problem set, obtains the answer of problem in first problem set, and by first problem set
The identity owner side of verification is submitted in the answer of problem.The identity owner side of verification obtains the problem in first problem set
Answer, and the answer to the problem in first problem set performs verification, obtains check results, and this check results can
Think the accuracy of answer to the problem in first problem set.If the answer to the problem in first problem set
Verification pass through, then perform step S105, if to the verification of the answer of the problem in first problem set not over,
Then represent that identity data submission side is not destination object, that is, identity data submission side is not identity owner, and then
Determine the failure of the verification to destination object.
Step S105, when check results meets pre-conditioned, the data that determine one's identity submission side is destination object.
The answer of the problem in first problem set is being performed verification, after obtaining check results, it is judged that check results
Whether meet pre-conditioned, when check results meets pre-conditioned, the data that determine one's identity submission side is destination object.
Alternatively, it is judged that whether the accuracy of the answer of the problem in first problem set is more than to asking in first problem set
The default accuracy that the answer of topic is arranged, if it is judged that the accuracy of the answer of the problem in first problem set is more than
Presetting accuracy, the data that determine one's identity submission side is destination object, that is, the data submission side that determines one's identity gathers around for identity
The person of having, thus the situation that the identity avoiding destination object is falsely used occurs.
This embodiment carries out identity real name certification to the proof of identity data of destination object, not only from multi-angle, various dimensions
Demonstrate the effectiveness of the identity data of destination object, realize identity alternately also by the question and answer of identity data submission side
Data submission side carries out identity owner's checking, it is ensured that only identity data submission side, could be the most correct
Answer the multiple problems relevant to destination object, effectively prevent identity stolen.
This embodiment is by forwarding for identifying the identity data with uniqueness of destination object to identity school
Proved recipe, destination object is object to be verified, and it is the most effective that identity verification side is used for verifying identity data;
When identity verification side verification identity data is effective, according to identity data in proof of identity data base
The proof of identity data of inquiry destination object, proof of identity data base is for pre-building by captured identity verification data
Data base, proof of identity data are the historical record data formed destination object during daily routines;According to
The first problem set that proof of identity data genaration is corresponding with proof of identity data;Obtain asking in first problem set
The answer of topic, and the answer to the problem in first problem set performs verification, obtains check results;Work as check results
When meeting pre-conditioned, the data that determine one's identity submission side is destination object, has reached the effect preventing identity stolen.
As the optional embodiment of one, before the data submission side that determines one's identity is destination object, forward identity mark
Knowing data to comprising the private data source side of proof of identity data, wherein, private data source root is according to identity data
Generate Second Problem set, and the answer to the problem in Second Problem set performs verification, obtains check results,
According to after the first problem set that proof of identity data genaration is corresponding with proof of identity data, identity real name certification
Method also includes: obtains Second Problem set and collects first problem set and Second Problem set, obtains the 3rd
Problem set.
If the information source of proof of identity data base is the abundantest, information privacy degree therein is relatively low, except destination object
Outside, the probability of other these information of object acquisition is bigger, it is possible to use destination object is carried out by private data source side
Verification.So-called private data source side, refers to that the data source of the part identity verification data of destination object is owing to privacy is former
Because of the private data source only allowing me directly to obtain, private data source cannot be by the 3rd due to the reason such as law, privacy
Side gathers.Before the data submission side that determines one's identity is destination object, the identity owner side of verification forwards identity number
According to comprising the private data source side of proof of identity data, private data source root generates second according to identity data and asks
Topic set, and the Second Problem set of generation is back to the identity owner side of verification.The identity owner side's of verification acquisition
Second Problem set, collects first problem set and Second Problem set, obtains the 3rd problem set, and the 3rd
Problem set is combined into final problem set.3rd problem set is submitted to identity data submission side, and identity data is submitted to
Side answers the problem answers in the 3rd problem set in specifying the time limit, and is carried by the problem answers in the 3rd problem set
Give identity owner the side of verification, the answer of the problem in acquisition the 3rd problem set of the identity owner side of verification, wherein,
Answer in first problem set is verified by the identity owner side of verification, obtains check results, private data source side
Answer to the problem in Second Problem set performs verification, obtains check results.
As the optional embodiment of one, private data source side includes multiple private data source side, when check results accords with
When closing pre-conditioned, the data that determine one's identity submission side is that destination object includes: when the verification knot that first problem set is corresponding
When fruit meets pre-conditioned, the problem in Second Problem set is originated and is analyzed, obtain analysis result;By second
Answer in problem set is committed to the multiple private data source sides corresponding with analysis result respectively according to analysis result, its
In, multiple private data source sides perform verification to the answer of the problem in Second Problem set, when each private data source
The answer of the problem in Second Problem set is performed to verify when all passing through by side, and the data that determine one's identity submission side is target pair
As.
Private data source side includes multiple private data source side, and each private data source side can be according to identity data
Generate Second Problem set.The answer of the problem in obtaining first problem set, and to asking in first problem set
The answer of topic performs verification, after obtaining check results, when the check results that first problem set is corresponding meets default bar
During part, the problem in Second Problem set is originated and is analyzed, obtain analysis result, by Second Problem set
Problem is committed to the multiple private data source sides corresponding with analysis result respectively according to analysis result, that is, identity has
The person side of verification decomposes the answer of the problem in Second Problem set, originates the problem in Second Problem set according to problem
Answer be committed to the multiple private data source sides corresponding with analysis result, each private data source side verification Second Problem
The answer of the problem in set, if the answer of the problem in Second Problem set is verified by each private data source side
Passing through, then it represents that verify successfully, the data that determine one's identity submission side is destination object.If there is private data source side pair
Problem in Second Problem set answer verification not over, then verify failure, the data that determine one's identity submission side is not
Destination object.
As the optional embodiment of one, the answer in Second Problem set is being committed to respectively according to analysis result
Before multiple private data source sides corresponding with analysis result, when the check results that first problem set is corresponding does not meets pre-
If during condition, the data that determine one's identity submission side is not destination object.
The answer in the 3rd problem set is committed to respectively according to analysis result corresponding with analysis result multiple privately owned
Before data source side, when the check results that first problem set is corresponding does not meets pre-conditioned, such as, when to first
The accuracy of the answer of the problem in problem set is less than when presetting accuracy, and the data that directly determine one's identity submission side is not
Destination object, the identity owner side of verification verification identity is invalid, the verification failure to destination object.When proof of identity side
When verification identity is invalid, terminate the checking flow process to identity.
As the optional embodiment of one, multiple private data source sides are respectively equipped with weight, obtain Second Problem set
Including: obtaining multiple Second Problem set, wherein, multiple private data source sides obtain multiple respectively according to preset rules
The weight of private data source side, determines and multiple private data source sides pair according to the weight of multiple private data source sides respectively
The problem set answered, obtains multiple Second Problem set, wherein, and corresponding second the asking in private data source side that weight is high
The problem number of the Second Problem set that the problem number private data source side lower than weight of topic set is corresponding is many, to the
One problem set and Second Problem set collect, and obtain the 3rd problem set and include: to first problem set with many
Individual Second Problem set collects, and obtains the 3rd problem set, is entering first problem set and Second Problem set
Row collects, and after obtaining the 3rd problem set, the method for this identity real name certification also includes: obtain the 3rd problem respectively
The answer of the problem in set;Respectively according to the problem in the weight of multiple private data source sides and the 3rd problem set
Answer performs calculating, obtains result of calculation.
Owing to proof of identity data are probably derived from various different data source, the degree of privacy of each data source, important
Degree and credibility are the most not quite identical, such as, from proof of identity data (such as, the Ministry of Education of official of government
Educational background data, social security pay record data), the credibility of the reference record of credit information service higher, its proof of identity data
Significance level the highest, and from the data reliability phase of the mechanisms such as commercial undertaking's (such as, electricity business), social networks
Relatively low to significance levels relatively low, its proof of identity data.Therefore, the answer to the problem from different pieces of information source
The impact that identity owner is verified by the check results carrying out verifying is different, this problem to different pieces of information source
The impact weight that identity owner is verified by the check results that answer carries out verifying is indicated.From the number that weight is high
Problem according to source is more in the quantity of final problem set, from the problem of the low data source of weight at the number of final problem set
Measure less.On the other hand, problem correct from the high data source of weight answers the check results to terminal check
Contribution rate is higher, from the correct contribution rate answering the check results to terminal check of the problem of the low data source of weight
Relatively low.
Multiple private data source sides can be respectively equipped with different size according to degree of privacy, significance level and credibility etc.
Weight, obtain multiple Second Problem set, wherein, multiple private data source sides obtain many respectively according to preset rules
The weight that individual private data source side is corresponding, that is, multiple private data source side according to degree of privacy, significance level and
Credibility obtains the weight that multiple private data source side is corresponding respectively, due to private data source side that weight is high corresponding
The problem number of the Second Problem set that private data source side that the problem number of two problem set is lower than weight is corresponding is many,
Determine the problem set corresponding with multiple private data source sides according to the weight of multiple private data source sides respectively, obtain many
Individual Second Problem set, the number of the problem in this Second Problem set is also determined.Obtaining Second Problem set
Afterwards, first problem set and multiple Second Problem set are collected, obtains the 3rd problem set, can will be somebody's turn to do
3rd problem set is committed to identity data submission side, and identity data submits to root to become the 3rd to ask according to the 3rd problem set symphysis
The answer of the problem in topic set, the respectively answer of the problem in acquisition the 3rd problem set, the most respectively according to multiple
The answer of the problem in the weight of private data source side and the 3rd problem set performs calculating, obtains result of calculation, thus
Realize identity certification effectively.
Alternatively, the data in proof of identity data base also are provided with due to degree of privacy, significance level and credibility etc.
Corresponding weight, determines the number of problem in first problem set, when number in proof of identity data base according to this weight
During according to corresponding weight height, the number of the problem in first problem set is many, the data pair in proof of identity data base
When the weight answered is low, the number of the problem in first problem set is low, and then affects problem in the 3rd problem set
Number, according to the number of the problem in the 3rd problem set, the most respectively according to the weight of multiple private data source sides,
In proof of identity data base, the answer of the problem in the weight of data and the 3rd problem set performs calculating, is calculated
As a result, thus realize to identity certification effectively.
As the optional embodiment of one, before the data submission side that determines one's identity is destination object, it is judged that calculate knot
Whether fruit is more than or equal to preset value;If it is judged that result of calculation is more than or equal to preset value, determine that check results meets pre-
If condition;If it is judged that result of calculation is less than preset value, determine that check results does not meets pre-conditioned.
Preset value is the threshold value verifying identity owner, and this preset value can be the problem in the 3rd problem set
Answer by verification time minimum accuracy, between 0 to 1.Judge that whether result of calculation is more than or equal to presetting
Value, if it is judged that result of calculation is more than or equal to preset value, determines that check results meets pre-conditioned, meets pre-to this
If the check results of condition is identified, the data that determine one's identity submission side is destination object;If it is judged that result of calculation
Less than preset value, determine that check results does not meets pre-conditioned, this is not met pre-conditioned check results and marks
Knowing, the data that determine one's identity submission side is destination object, has reached the effect preventing identity stolen.
As the optional embodiment of one, when identity verification side verification identity data is effective, according to body
Part mark data are inquired about the proof of identity data of destination object in proof of identity data base and are included: when identity verifies
When side's verification identity data is effective, in proof of identity data base, inquire about destination object according to identity data
Proof of identity Data Entry set, according to the first problem collection that proof of identity data genaration is corresponding with proof of identity data
Conjunction includes: randomly choose the proof of identity Data Entry in proof of identity Data Entry set, and according to the body selected
Part verification Data Entry generates first problem set, wherein, the problem in first problem set and the proof of identity of selection
Data Entry has one-to-one relationship.
The proof of identity data of destination object are represented by proof of identity Data Entry, and proof of identity Data Entry is included in
In proof of identity Data Entry set.When identity verification side verification identity data is effective, identity owner
Verification root inquires about the proof of identity Data Entry collection of destination object in proof of identity data base according to identity data
Closing, the identity owner side of verification randomly chooses the proof of identity Data Entry in proof of identity Data Entry set, and
Generating first problem set according to the proof of identity Data Entry selected, each problem in first problem set can be with base
Put question in proof of identity data strip object time, related side, quantity.Proof of identity in order to avoid destination object
It is excessive that data leak impacts face, and each proof of identity Data Entry only generates a problem, it is ensured that first problem collection
Problem in conjunction has one-to-one relationship with the proof of identity Data Entry of selection.
Alternatively, identity data is verified as the checking to personal identification data, it is also possible to for authority identity data
Checking.When destination object is individual, the identity data of destination object is that personal identification identifies data.Work as mesh
When mark object is mechanism, the identity data of destination object is that authority identity identifies data.
When destination object is individual, the proof of identity data of destination object are that personal identification verifies data, are to exist in person
The historical record formed in real work, studying and living.When destination object is mechanism, the identity school of destination object
Testing data is that authority identity verifies data, be mechanism the historical record self managed or perform to be formed in business procedure,
Qualification information etc..
Identity real name certification need in information system verify user online under actual identity, existing personal identification real name
Certification uses the identity datas such as name, identification card number, bank card, reserved cell-phone number, and authority identity real-name authentication uses
The information such as the copy of the business license, mechanism's Bank Account Number, the usage degree of these information own widely, such as bank's account
Number needing to be supplied to third party in transfer procedure, therefore the privacy of these information is not enough, very easy usurps,
Therefore it is not used to verify identity owner.This embodiment proposes a kind of method that destination object is carried out real-name authentication,
Only verify the effectiveness of identity data of destination object in prior art on the basis of, then verify that identity data submission side is
No is the owner of identity data, thus avoids the identity of destination object stolen.
Below in conjunction with preferred embodiment, technical scheme is illustrated.
Whether identity data submission side to be verified is destination object, needs the information of the destination object that use privacy is stronger
Verify, or from multiple dimensions, identity data is verified.
When destination object is individual, the identity data of destination object is that personal identification identifies data, personal identification
Identification data packet includes the identity card data of individual, name data.When destination object is mechanism, the identity of destination object
Mark data are that authority identity identifies data, and authority identity identification data packet includes organization mechanism code data, business license
Number etc..
When destination object is individual, the proof of identity data of destination object are that personal identification verifies data, are to exist in person
The historical record formed in real work, studying and living.Alternatively, personal identification verification data can be: education
Class, including academic summary (middle school, university, postgraduate), vocational education;Occupation class, including career, occupation
Ability/professional qualification certificate, industrial and commercial registration information, on-line shop, social security payment record, common reserve fund payment record etc.;Consumption
Class, including individual consumption record (on line or under line), individual bill, credit record etc.;Residential, including house property,
Residential area, community, relevant property service log etc.;Traffic class, including automobile running record, vehicle driving against traffic regulations record,
Location-based service record, seize the opportunity record, public transport/subway, tourism trip record etc.;Communication class, including message registration (Gu
Words, mobile phone) etc.;Social relations class, including kinsfolk, classmate, friend, the doings of participation, social network
Network etc.;Medical records class, including health check-up and diagnosis and therapy recording etc.;Academic space, including paper, works, patent etc.;Individual
People's identity check number is according to including personal preference etc..
When destination object is mechanism, the proof of identity data of destination object are that authority identity verifies data, including industry and commerce
Information, tax information, mechanism's annual report, bid, intellectual property, wherein, intellectual property includes copyright, patent
Power and trade mark right;Authority identity verification data also include mechanism's qualification information etc..
According to data character and produce process difference, these data be present in government bodies, employer's organization, school,
Publishing house, telecommunications, electricity Shang Deng mechanism;Part data source is can be disclosed access or by third-party institution's collection, portion
Divided data source only allows me directly to obtain due to privacy purposes.
This embodiment relies on multi-angle, the data of various dimensions carry out identity real name to the proof of identity data of destination object
Certification, the identity real name identifying procedure of simplification includes identity data submission side, the identity owner side of verification, identity
Verification side, non-private data source side, private data source side.
Fig. 2 is the schematic flow sheet of the method for identity real name certification according to embodiments of the present invention.As in figure 2 it is shown, should
The method of identity real name certification comprises the following steps:
Step S201, the identity owner side of verification sends asking of the proof of identity data for gathering non-private data source side
Ask order to non-private data source side.
The identity owner side of verification gathers the data of non-private data source side, first sends and is used for gathering non-private data source
The request command of the proof of identity data of side is to non-private data source side.
Step S202, non-private data source side sends proof of identity data to the identity owner side of verification.
Non-private data source side the proof of identity data received for gathering non-private data source side request command it
After, send proof of identity data to the identity owner side of verification.
Step S203, identity owner verifies root and sets up proof of identity data base according to proof of identity data.
The identity owner side of verification, after receiving proof of identity data, sets up proof of identity according to proof of identity data
Data base.Proof of identity data base is made up of multiple proof of identity Data Entry, and proof of identity Data Entry includes identity
Mark data and historical behavior data, wherein, personal identification identification data packet includes identity card, name, authority identity mark
Know data and include organization mechanism code, business license number, organization names;Historical behavior data include time of the act,
The information such as point, related side or associated mechanisms, item, quantity or the amount of money.
Proof of identity Data Entry list in table 1 personal identification calibration database
Table 1 is the personal identification verification data item list in proof of identity data base.As shown in table 1, in identity school
Testing in data base, destination object is Zhang San, and the proof of identity Data Entry of Zhang San includes two proof of identity Data Entry,
Article 1 proof of identity Data Entry be identification card number be 110114197912161428, time of the act include behavior initiate
Time, is 2009.4, and place is Beijing, and related side is industrial and commercial bank, and item is loan, and quantity is 650000.?
The Article 2 proof of identity Data Entry of three be identification card number be 110114197912161428, time of the act includes behavior
Beginning and ending time, is 2009.4 2029.4, and place is Beijing, and related side is China Construction Bank, and item is the housing loan moon
Refunding, quantity is 3200.
Step S204, identity data submission side submits to identity data to the identity owner side of verification.
Step S205, identity data is handed to identity verification side by the identity owner side of verification.
The identity owner side of verification is after receiving identity data, and the identity owner side of verification is by identity number
According to handing to identity verification side.Alternatively, the identity owner side of verification sends for asking identity verification side
The request command of verification identity data is to identity verification side.
Step S206, identity verification side verification identity data, obtain identity check results.
Identity verification side receives identity data, the effectiveness of verification identity data.Alternatively, identity
Verification side receives the request command for asking identity verification side verification identity data, according to request command pair
Identity data verifies, and obtains identity check results.If identity data verification is passed through, then
The mark that determines one's identity data are effective, then send identity check results to the identity owner side of verification, if to body
Part mark data check does not passes through, and represents that this identity data is illegal, and this focal pointe does not exists, then terminate
Checking to identity.
Identity verification side includes that personal identification mark verification side and authority identity identify verification side, such as, the individual person
Part mark verification side is " ID (identity number) card No. Help Center of the Ministry of Public Security ", and authority identity mark verification side is " whole nation enterprise letter
Use public notification of information system ".
Step S207, the identity owner side of verification inquiry proof of identity data base, randomly choose proof of identity Data Entry,
Generate first problem set.
When identity verification side verification identity data is effective, the identity owner side of verification inquiry proof of identity number
According to storehouse, in proof of identity data base, inquire corresponding proof of identity Data Entry set according to identity data,
And according to the proof of identity Data Entry set inquired, randomly choose proof of identity Data Entry, according to proof of identity
Data Entry generates first problem set.This first problem collection is combined into problem set 1, corresponding with identity data
Self checking problem set.First problem set includes multiple problem, and each problem can verify Data Entry with identity-based
Time, related side, quantity put question to, such as, generate following first according to the proof of identity Data Entry of table 1
Problem in problem set:
1) in April, 2009, you have handled loan in which bank:
A) Bank of China b) Bank of Beijing c) Construction Bank more than d) is not
2) in April, 2016, you in China Construction Bank's housing loan amount to pay are:
A) 5000-6000 b) 4000-5000 c) 3000-4000 d) and more than be not
Preferably, can be only generated a problem according to each proof of identity Data Entry, thus avoid destination object
Proof of identity data leak impacts the excessive situation in face and occurs.
Step S208, identity data is submitted to private data source side by the identity owner side of verification.
Identity data is committed to private data source side, alternatively, identity owner school by the identity owner side of verification
Proved recipe sends and obtains the request command of the problem set relevant to identity data to private data source side.
Step S209, private data source root generates Second Problem set according to identity data.
Private data source side includes that multiple private data source side, each private data source side are receiving identity data
Afterwards, generating multiple Second Problem set according to identity data, the plurality of Second Problem set is respectively problem set
2, problem set 3 ..., problem set n, and the problem set of generation is returned to the identity owner side of verification, that is, return
Return the problem set relevant to identity data to the identity owner side of verification.
Step S210, the identity owner side of verification collects first problem set and Second Problem set, obtains the 3rd problem
Set.
The identity owner side of verification is after receiving Second Problem set, to first problem set and Second Problem set
Collect, obtain the 3rd problem set.
Step S211, the 3rd problem set is sent to identity data submission side by the identity owner side of verification.
Step S212, identity data submission side answers the problem in the 3rd problem set in specifying the time limit.
Identity data submission side receives the 3rd problem set that the identity owner side of verification sends, and returns within the time limit specified
Answer the problem in the 3rd problem set, obtain the answer of problem in the 3rd problem set, and by the 3rd problem set
The answer of problem be committed to the identity owner side of verification.
Step S213, the verification of the identity owner side of verification derives from the answer of problem in first problem set, obtains the
One check results.
The identity owner side of verification receives the answer of the problem in the 3rd problem set, and verification derives from first problem set
In the answer of problem, obtain the first check results.When the first check results meets pre-conditioned, determine first
The answer verification of the problem in problem set is passed through, and performs step S214, if to the problem in first problem set
Answer verification not over time, then the identity data side of submissioning is not identity owner, termination to authentication.
Step S214, the identity owner side of verification decomposes the answer of the problem in Second Problem set.
The identity owner side of verification decomposes the answer of the problem in Second Problem set, according to asking in Second Problem set
Corresponding private data source side is submitted in the answer of the problem in Second Problem set by the source of topic.
Step S215, the answer of the problem in the verification Second Problem set of private data source side, obtain the second check results.
Private data source side receives the answer of the problem in Second Problem set, to answering of the problem in Second Problem set
Case verifies, and obtains the second check results, and sends the second check results to the identity owner side of verification.Privately owned
Answer in the verification Second Problem set of data source side, if the verification of each private data source side is passed through, then it represents that verification
Success, otherwise verifies failure.
Step S216, the identity owner side of verification collects to the problem in first problem set with in Second Problem set
The check results that verifies of the carrying out of problem, obtain terminal check result.
The identity owner side of verification collects the problem in first problem set and entering the problem in Second Problem set
The check results of row verification, that is, the identity owner side of verification collects the first check results and the second check results,
To terminal check result, calculate terminal check result.
Step S217, identity owner verifies root and determines that the real-name authentication to destination object is tied according to terminal check result
Really.
When terminal check result meets pre-conditioned, determine the success of the authentication to destination object.
The proof of identity Data Source of destination object is formed in the life and work process or mechanism's business activities of individual
Record, these records itself derive from multiple disclosed data sources or privately owned data source, and identity theft person is in short-term
Obtaining corresponding proof of identity data in phase, the problem concentrated of correctly answering a question has the biggest difficulty, such that it is able to
Avoid identity stolen;Secondly, problem set is dynamically to give birth to according to the data randomly choosed in proof of identity data
Becoming, the problem in each problem set all can be varied from, even if there is part leaking data, body in proof of identity data
Part appropriator is also impossible to can hit the answer of dynamic problem collection every time, thus avoids identity persistently to be usurped.
On the other hand, owing to the time span of proof of identity data record may be longer, identity owner may
Forgeing or paramnesia, therefore verification user answers the answer can being not required in problem set completely correctly,
Can arrange a threshold value, this threshold value is the accuracy of the answer in problem set, can regard as identity higher than this threshold value
Data submission side is destination object, that is, identity data submission side is identity owner, less than this threshold value
Regarding as identity data submission side is not destination object, can be considered as identity stolen.
Alternatively, if the information source in proof of identity data base is the abundantest, information privacy degree therein is higher, also
That is, except identity owner, the probability that other people obtain this information is little, can not use private data source
The verification of side.
Owing to proof of identity data are probably derived from various different data source, the degree of privacy of each data source, important
Degree, credibility not quite identical, such as, from the proof of identity data of official of government, (such as, the Ministry of Education is learned
Count one by one and pay record data according to, social security), the credibility of the reference record of credit information service higher, its proof of identity data
Significance level is the highest, and relative from the data reliability of the mechanisms such as commercial undertaking (such as, electricity business), social networks
Significance levels relatively low, its proof of identity data are relatively low, therefore, from the problem check result pair in different pieces of information source
The impact of identity owner verification is different, in consideration of it, the implementation that the present invention one optimizes is for each data
Source arranges a weight, more in the quantity of final problem set from the problem of the high data source of weight, on the other hand,
From the high data source of weight problem correctly answer higher to the contribution of terminal check.
For example, the verification threshold value of the identity owner side of verification is set to t (0 < t < 1), and identity data submission side is
Whole problem set derives from 3 data sources S1, S2, S3, and the weight of each data source is respectively w1, w2, w3, often
Problem number corresponding to individual data source is respectively c1, c2, c3, the problem set from each data source be respectively q11,
Q12 ..., q1C1}, { q21, q22 ..., q2C2}, { q31, q32 ..., q3C3}, for identity data
The scoring rule of submission side is as follows: if identity data submission side is correct to the answer of the problem in problem set, then score
Be 1, otherwise score be 0, the score of the problem in each problem set be sc11, sc 12 ..., sc 1C1}, sc 21,
Sc 22 ..., sc 2C2}, { sc 31, sc 32 ..., sc 3C3}, the then final calculating that identity data submission side is answered
Mark SC is as follows:
SC=w1* (sc11+sc 12+ ...+sc 1C1)+w2* (sc21+sc22+ ...+sc2C2)+w3* (sc31+sc
32+…+sc 3C3)/(c1+c2+c3)
Then as follows to the result of authentication: as SC >=t time, make check results V=1, verification pass through, that is,
Identity data submission side is destination object;As SC, < during t, making check results V=0, verification is not passed through, that is, body
Number is not destination object according to submission side, and identity is stolen.
This embodiment relies on multi-angle, the data of various dimensions, by the question answering process to identity data submission side, right
On the basis of identity data verifies, demonstrate the owner of identity data, it is ensured that the body of focal pointe
Part real-name authentication.This embodiment need not identity owner and submits the private data such as identity card, photo to, for privately owned
Proof of identity data source, its problem and verification be directed to data source side, and this embodiment does not collect other privacy number
According to, it is to avoid the risk that mechanism or individual privacy are revealed, reach the effect preventing identity stolen.This embodiment
In problem set be dynamically to generate according to the data randomly choosed in proof of identity data, each problem set all can
Change, even if there is part leaking data in proof of identity data, identity theft person is also impossible to can to hit dynamic every time
The answer of state problem set, thus avoid identity persistently to be usurped.This embodiment is that each data source is provided with weight, protects
Having demonstrate,proved the high data source of quality high to the contribution degree of proof of identity, low-quality data source is low to the contribution degree of proof of identity,
Improve the accuracy of identity owner checking.
It should be noted that can be at such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing
Computer system performs, and, although show logical order in flow charts, but in some cases, can
With to be different from the step shown or described by order execution herein.
The embodiment of the present invention additionally provides the device of a kind of identity real name certification.It should be noted that the body of this embodiment
The method that the device of part real-name authentication may be used for performing the identity real name certification of the embodiment of the present invention.
Fig. 3 is the schematic diagram of the device of identity real name certification according to embodiments of the present invention.As it is shown on figure 3, this identity
The device of real-name authentication includes: the first retransmission unit 10, query unit 20, problem signal generating unit 30, processing unit
40 and first determine unit 50.
First retransmission unit 10, for forwarding for identifying the identity data with uniqueness of destination object to body
Part mark verification side, wherein, destination object is object to be verified, and identity verification side is used for verifying identity
Data are the most effective.
Query unit 20, for when identity verification side verification identity data is effective, according to identity number
According to inquiring about the proof of identity data of destination object in proof of identity data base, wherein, proof of identity data base is for passing through
The data base that captured identity verifies data and pre-builds, proof of identity data are in daily routines process to destination object
The historical record data of middle formation.
Problem signal generating unit 30, for the first problem corresponding with proof of identity data according to proof of identity data genaration
Set.
Processing unit 40, for obtaining the answer of the problem in first problem set, and to asking in first problem set
The answer of topic performs verification, obtains check results.
First determines unit 50, and for when check results meets pre-conditioned, the data that determine one's identity submission side is target
Object.
Alternatively, the device of this identity real name certification also includes the second retransmission unit, acquiring unit, collection unit and
Two processing units.Wherein, the second retransmission unit, for before the data submission side that determines one's identity is destination object, turn
Sending out identity data and extremely comprised the private data source side of proof of identity data, wherein, private data source root is according to body
Part mark data genaration Second Problem set, acquiring unit, for according to proof of identity data genaration and proof of identity
After the first problem set that data are corresponding, obtain Second Problem set, and to the problem in Second Problem set
Answer performs verification, obtains check results;Collection unit, for carrying out first problem set and Second Problem set
Collect, obtain the 3rd problem set.
Alternatively, private data source side includes multiple private data source side, when check results meets pre-conditioned, the
One determines that unit 50 includes analyzing module and submitting module to.Wherein, analyze module, for when first problem set correspondence
Check results when meeting pre-conditioned, the problem in Second Problem set is originated and is analyzed, obtain analysis result;
Submit module to, for being committed to corresponding with analysis result respectively according to analysis result by the answer in Second Problem set
Multiple private data source sides, wherein, multiple private data source sides perform school to the answer of the problem in Second Problem set
Test, when the answer execution verification of the problem in Second Problem set is passed through by each private data source side, determine body
Number is destination object according to submission side.
Alternatively, the device of this identity real name certification also includes: second determines unit, for by Second Problem set
In answer be committed to the multiple private data source sides corresponding with analysis result respectively according to analysis result before, when first
When check results corresponding to problem set does not meets pre-conditioned, the data that determine one's identity submission side is not destination object.
Alternatively, multiple private data source sides are respectively equipped with weight, and the first acquiring unit is used for obtaining multiple Second Problem
Set, wherein, multiple private data source sides obtain the weight of multiple private data source side respectively according to preset rules, point
Do not determine the problem set corresponding with multiple private data source sides according to the weight of multiple private data source sides, obtain multiple
Second Problem set, wherein, the problem number of the Second Problem set that private data source side that weight is high is corresponding compares weight
The problem number of the Second Problem set that low private data source side is corresponding is many, and collection unit is for first problem set
Collecting with multiple Second Problem set, obtain the 3rd problem set, the device of this identity real name certification also includes:
Second acquisition unit, for obtaining the answer of the problem in multiple 3rd problem set respectively;Computing unit, for dividing
The answer of the problem in the other weight according to multiple private data source sides and the 3rd problem set performs calculating, is calculated
Result.
This embodiment forwards the identity with uniqueness for identifying destination object by the first retransmission unit 10
Data are to identity verification side, and destination object is object to be verified, and identity verification side is used for verifying identity mark
Know data the most effective, by query unit 20 when identity verification side verification identity data is effective, according to
Identity data inquires about the proof of identity data of destination object in proof of identity data base, and proof of identity data base is
The data base that pre-builds by captured identity verification data, proof of identity data be to destination object day-to-day operations,
The historical record data formed during work, studying or living, by problem signal generating unit 30 according to proof of identity number
According to generating the first problem set corresponding with proof of identity data, obtained in first problem set by processing unit 40
The answer of problem, and the answer to the problem in first problem set performs verification, obtains check results, by
One determine unit 50 when check results meets pre-conditioned, the data that determine one's identity submission side is destination object, reaches
Prevent the effect that identity is stolen.
The embodiment of the present invention additionally provides the system of a kind of identity real name certification.It should be noted that the body of this embodiment
Part real-name authentication system may be used for the method performing the identity real name certification of the embodiment of the present invention, mainly includes that identity is gathered around
The person's of having syndrome system, be used for forwarding identity data to identity syndrome system, when identity syndrome
When system check identity data is effective, in proof of identity data base, inquire about destination object according to identity data
Proof of identity data, according to the first problem set that proof of identity data genaration is corresponding with proof of identity data, obtain
Take the answer of problem in first problem set, and the answer to the problem in first problem set performs verification, obtains
Check results, when check results meets pre-conditioned, the data that determine one's identity submission side is destination object, wherein, body
It is the most effective that part mark syndrome system is used for verifying identity data, and proof of identity data base is for passing through captured identity
Verification data and the data base that pre-builds, proof of identity data for destination object in day-to-day operations, work, learn
Or the historical record data formed in life process.
This embodiment is mainly used in the user registration course of application system or the key business in application system
Journey, the former is served by system such as online tourism, calls a taxi online and be served by the user registration course of system etc.;The latter
Identity real name certification is carried out in signing such as the online contract of online tourism service.Reality in the system to identity real name certification
In the application of border, this embodiment exists mainly as the background support of application system, and therefore, identity data submission side wraps
Include application system client and application system two parts.
Alternatively, application system client enrollment status information in application system, submit identity data to;Application system exists
After receiving the identity data that application system client submits to, the identity data that application system client submits to is committed to body
Part owner's syndrome system;Identity owner's syndrome system generates problem set according to identity data.Have in identity
After person's syndrome system generates problem set according to identity data, problem set can be presented directly to application system client,
Problem set can also be returned to application system, then be presented to client by application system;If problem set directly presents
To application system client, then the question and answer result of the problem in problem set is gathered around by application system client by being directly committed to identity
The person's of having syndrome system, otherwise will be delivered to identity owner's syndrome system by application system;Identity owner
After identity data has been inspected by syndrome system, obtain the result of the identity real name certification to destination object, by real name
Authentication result returns to application system, it is achieved the real-name authentication to destination object, has reached the effect preventing identity stolen
Really.
Alternatively, before key business, the identity data of currently logged on user is committed to identity owner by application system
Syndrome system;After identity owner's syndrome system generates problem set according to identity data, can be by problem set
It is presented directly to application system client, it is also possible to problem set is returned to application system, application system presents to client;
If problem set is presented directly to application system client, then the question and answer of the problem in problem set are tied by application system client
Fruit will directly be committed to identity owner's syndrome system, otherwise will be delivered to identity owner verification by application system
Subsystem;After identity owner's syndrome system test completes, in identity owner's syndrome system to identity number
After having inspected, obtain the result of the identity real name certification to destination object, real-name authentication result is back to application
System, it is achieved the real-name authentication to destination object, has reached the effect preventing identity stolen in key business.
On the other hand, in private data source side, in order to reduce the difficulty that existing application system is transformed, one can be disposed
The individual real-name authentication Agent to destination object, the function that real-name authentication Agent mainly realizes is: be used for receiving
Identity data;In the own data base of private data source side, proof of identity number is inquired according to identity data
According to;According to proof of identity data generation problems collection, problem set is back to identity data submission side, receives identity data
The answer to the problem in problem set of the submission side, the correctness of the answer of the problem in check problem set, reach
Prevent the effect that identity is stolen.
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general
Calculating device realize, they can concentrate on single calculating device, or is distributed in multiple calculating device institute
On the network of composition, alternatively, they can realize with calculating the executable program code of device, it is thus possible to
It is stored in storing in device and is performed by calculating device, or they are fabricated to respectively each integrated circuit die
Block, or the multiple modules in them or step are fabricated to single integrated circuit module realize.So, the present invention
It is not restricted to any specific hardware and software combine.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, made
Any modification, equivalent substitution and improvement etc., should be included within the scope of the present invention.
Claims (12)
1. the method for an identity real name certification, it is characterised in that including:
Forward for identifying the identity data with uniqueness of destination object to identity verification side, its
In, described destination object is object to be verified, and described identity verification side is used for verifying described identity
Data are the most effective;
When the described identity verification side described identity data of verification is effective, according to described identity number
According to inquiring about the proof of identity data of described destination object in proof of identity data base, wherein, described proof of identity
Data base is the data base pre-build by gathering described proof of identity data, and described proof of identity data are
The historical record data that described destination object is formed during daily routines;
According to the first problem set that described proof of identity data genaration is corresponding with described proof of identity data;
Obtain the answer of problem in described first problem set, and to the problem in described first problem set
Answer performs verification, obtains check results;And
When described check results meets pre-conditioned, the data that determine one's identity submission side is described destination object.
Method the most according to claim 1, it is characterised in that
Before determining that described identity data submission side is described destination object, described method also includes: forward institute
State identity data to the private data source side comprising proof of identity data, wherein, described private data source side
Second Problem set, and answering the problem in described Second Problem set is generated according to described identity data
Case performs verification, obtains described check results,
The first problem set corresponding with described proof of identity data according to described proof of identity data genaration it
After, described method also includes: obtain described Second Problem set;To described first problem set and described second
Problem set collects, and obtains the 3rd problem set.
Method the most according to claim 2, it is characterised in that described private data source side includes multiple private data
Source side, when described check results meet described pre-conditioned time, determine that described identity data submission side is described mesh
Mark object includes:
When the check results that described first problem set is corresponding meet described pre-conditioned time, to described Second Problem
Problem source in set is analyzed, and obtains analysis result;And
Answer in described Second Problem set is committed to and described analysis result respectively according to described analysis result
Corresponding multiple private data source sides, wherein, the plurality of private data source side is in described Second Problem set
The answer of problem perform verification, when each described private data source side is to the problem in described Second Problem set
Answer perform verification when all passing through, determine that described identity data submission side is described destination object.
Method the most according to claim 3, it is characterised in that by the answer in described Second Problem set according to
Before described analysis result is committed to multiple private data source sides corresponding with described analysis result respectively, described side
Method also includes: when the check results that described first problem set is corresponding do not meet described pre-conditioned time, determine institute
Stating identity data submission side is not described destination object.
Method the most according to claim 3, it is characterised in that the plurality of private data source side is respectively equipped with weight,
Obtain described Second Problem set to include: obtain multiple Second Problem set, wherein, the plurality of privately owned
Data source side obtains the weight of the plurality of private data source side respectively according to preset rules, respectively according to described many
The weight of individual private data source side determines the problem set corresponding with the plurality of private data source side, obtains described
Multiple Second Problem set, wherein, asking of the Second Problem set that private data source side that described weight is high is corresponding
The problem number inscribing Second Problem set corresponding to the number private data source side lower than described weight is many,
Described first problem set and described Second Problem set are collected, obtains described 3rd problem set
Including: described first problem set and the plurality of Second Problem set are collected, obtains the described 3rd and ask
Topic set,
Described first problem set and described Second Problem set are being collected, is obtaining described 3rd problem set
After conjunction, described method also includes: obtain the answer of problem in described 3rd problem set respectively;Root respectively
Calculating is performed according to the answer of the problem in the weight of the plurality of private data source side and described 3rd problem set,
Obtain result of calculation.
Method the most according to claim 5, it is characterised in that determining that described identity data submission side is described mesh
Before mark object, described method includes:
Judge that whether described result of calculation is more than or equal to preset value;
If it is judged that described result of calculation is more than or equal to described preset value, determine that described check results meets described
Pre-conditioned;And
If it is judged that described result of calculation is less than described preset value, determine that described check results does not meets described pre-
If condition.
Method the most according to claim 1, it is characterised in that
When the described identity verification side described identity data of verification is effective, according to described identity number
Include according to the proof of identity data inquiring about described destination object in described proof of identity data base: when described identity
When verification described identity data in mark verification side is effective, according to described identity data in described identity school
Test the proof of identity Data Entry set inquiring about described destination object in data base,
According to the first problem set bag that described proof of identity data genaration is corresponding with described proof of identity data
Include: randomly choose the proof of identity Data Entry in described proof of identity Data Entry set, and according to selection
Described proof of identity Data Entry generate described first problem set, wherein, in described first problem set
Problem and described proof of identity Data Entry have one-to-one relationship.
8. the device of an identity real name certification, it is characterised in that including:
First retransmission unit, for forwarding for identifying the identity data with uniqueness of destination object extremely
Identity verification side, wherein, described destination object is object to be verified, and described identity verification side uses
In verifying, described identity data is the most effective;
Query unit, is used for when the described identity verification side described identity data of verification is effective, according to
Described identity data inquires about the proof of identity data of described destination object in proof of identity data base, wherein,
Described proof of identity data base is the data base pre-build by gathering described proof of identity data, described body
Part verification data are the historical record data formed described destination object during daily routines;
Problem signal generating unit, for corresponding with described proof of identity data according to described proof of identity data genaration
First problem set;
Processing unit, for obtaining the answer of the problem in described first problem set, and to described first problem
The answer of the problem in set performs verification, obtains check results;And
First determines unit, is used for when described check results meets pre-conditioned, the data that determine one's identity submission side
It it is described destination object.
Device the most according to claim 8, it is characterised in that described device also includes:
Second retransmission unit, for before determining that described identity data submission side is described destination object, forwards
Described identity data is to comprising the private data source side of proof of identity data, wherein, and described private data source
Root generates Second Problem set according to described identity data, and to the problem in described Second Problem set
Answer performs verification, obtains described check results;
First acquiring unit, for relative with described proof of identity data according to described proof of identity data genaration
After the first problem set answered, obtain described Second Problem set;And
Collection unit, for collecting described first problem set and described Second Problem set, obtains the
Three problem set.
Device the most according to claim 9, it is characterised in that described private data source side includes multiple private data
Source side, when described check results meet described pre-conditioned time, described first determines that unit includes:
Analyze module, for when the check results that described first problem set is corresponding meet described pre-conditioned time,
Problem in described Second Problem set is originated and is analyzed, obtain analysis result;And
Submit module to, for the answer in described Second Problem set being committed to respectively according to described analysis result
The multiple private data source sides corresponding with described analysis result, wherein, the plurality of private data source side is to described
The answer of the problem in Second Problem set performs verification, when each described private data source side is asked described second
The answer of the problem in topic set performs to verify when all passing through, and determines that described identity data submission side is described target
Object.
11. devices according to claim 10, it is characterised in that described device also includes: second determines unit, use
In the answer in described Second Problem set is being committed to and described analysis result respectively according to described analysis result
Before corresponding multiple private data source sides, when the check results that described first problem set is corresponding does not meets described
Time pre-conditioned, determine that described identity data submission side is not described destination object.
12. devices according to claim 10, it is characterised in that the plurality of private data source side is respectively equipped with weight,
Described first acquiring unit is used for obtaining multiple Second Problem set, wherein, the plurality of private data source
Side obtains the weight of the plurality of private data source side respectively according to preset rules, respectively according to the plurality of privately owned
The weight of data source side determines the problem set corresponding with the plurality of private data source side, obtains the plurality of
Two problem set, wherein, the problem number of the Second Problem set that private data source side that described weight is high is corresponding
The problem number of the Second Problem set that the private data source side lower than described weight is corresponding is many,
Described collection unit is used for collecting described first problem set and the plurality of Second Problem set,
Obtain described 3rd problem set,
Described device also includes: second acquisition unit, for obtaining asking in the plurality of 3rd problem set respectively
The answer of topic;And
Computing unit, for respectively according to weight and the described 3rd problem set of the plurality of private data source side
In the answer of problem perform calculating, obtain result of calculation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610366211.6A CN105868596B (en) | 2016-05-27 | 2016-05-27 | The method and apparatus of identity real name certification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610366211.6A CN105868596B (en) | 2016-05-27 | 2016-05-27 | The method and apparatus of identity real name certification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105868596A true CN105868596A (en) | 2016-08-17 |
CN105868596B CN105868596B (en) | 2019-11-05 |
Family
ID=56641624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610366211.6A Active CN105868596B (en) | 2016-05-27 | 2016-05-27 | The method and apparatus of identity real name certification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105868596B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106657164A (en) * | 2017-03-06 | 2017-05-10 | 泰华智慧产业集团股份有限公司 | Composite identity recognition algorithm for real name authentication, and identity recognition system for real name authentication |
CN107483456A (en) * | 2017-08-25 | 2017-12-15 | 北京元心科技有限公司 | Identity identifying method and device |
CN108074301A (en) * | 2016-11-15 | 2018-05-25 | 方正国际软件(北京)有限公司 | A kind of system of real name method and device of transportation card |
CN108256303A (en) * | 2018-01-10 | 2018-07-06 | 深圳壹账通智能科技有限公司 | Electronic device, auth method and storage medium |
CN108765126A (en) * | 2018-04-19 | 2018-11-06 | 出门问问信息科技有限公司 | Identity verify method and device |
CN110322646A (en) * | 2019-07-05 | 2019-10-11 | 上海卓繁信息技术股份有限公司 | Digital certificate handles method |
CN112348524A (en) * | 2020-10-27 | 2021-02-09 | 深圳前海微众银行股份有限公司 | Anti-fraud decision method, device, equipment and computer storage medium |
CN112632520A (en) * | 2020-11-23 | 2021-04-09 | 北京思特奇信息技术股份有限公司 | Method and system for real-name registration of group telephone service |
CN115952482A (en) * | 2023-03-13 | 2023-04-11 | 山东博奥克生物科技有限公司 | Medical equipment data management system and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103380430A (en) * | 2010-12-30 | 2013-10-30 | 环联有限责任公司 | Identity verification systems and methods |
CN104184709A (en) * | 2013-05-23 | 2014-12-03 | 腾讯科技(深圳)有限公司 | Verification method, device, server, service data center and system |
US20150143495A1 (en) * | 2012-01-06 | 2015-05-21 | Capy Inc. | Captcha provision method and program |
-
2016
- 2016-05-27 CN CN201610366211.6A patent/CN105868596B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103380430A (en) * | 2010-12-30 | 2013-10-30 | 环联有限责任公司 | Identity verification systems and methods |
US20150143495A1 (en) * | 2012-01-06 | 2015-05-21 | Capy Inc. | Captcha provision method and program |
CN104184709A (en) * | 2013-05-23 | 2014-12-03 | 腾讯科技(深圳)有限公司 | Verification method, device, server, service data center and system |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108074301A (en) * | 2016-11-15 | 2018-05-25 | 方正国际软件(北京)有限公司 | A kind of system of real name method and device of transportation card |
CN106657164A (en) * | 2017-03-06 | 2017-05-10 | 泰华智慧产业集团股份有限公司 | Composite identity recognition algorithm for real name authentication, and identity recognition system for real name authentication |
CN106657164B (en) * | 2017-03-06 | 2019-06-14 | 泰华智慧产业集团股份有限公司 | A kind of identification composite algorism and system for real-name authentication |
CN107483456A (en) * | 2017-08-25 | 2017-12-15 | 北京元心科技有限公司 | Identity identifying method and device |
CN108256303A (en) * | 2018-01-10 | 2018-07-06 | 深圳壹账通智能科技有限公司 | Electronic device, auth method and storage medium |
CN108765126A (en) * | 2018-04-19 | 2018-11-06 | 出门问问信息科技有限公司 | Identity verify method and device |
CN110322646A (en) * | 2019-07-05 | 2019-10-11 | 上海卓繁信息技术股份有限公司 | Digital certificate handles method |
CN112348524A (en) * | 2020-10-27 | 2021-02-09 | 深圳前海微众银行股份有限公司 | Anti-fraud decision method, device, equipment and computer storage medium |
CN112348524B (en) * | 2020-10-27 | 2024-05-10 | 深圳前海微众银行股份有限公司 | Anti-fraud decision method, device, equipment and computer storage medium |
CN112632520A (en) * | 2020-11-23 | 2021-04-09 | 北京思特奇信息技术股份有限公司 | Method and system for real-name registration of group telephone service |
CN112632520B (en) * | 2020-11-23 | 2024-03-19 | 北京思特奇信息技术股份有限公司 | Method and system for registering real names of group telephone services |
CN115952482A (en) * | 2023-03-13 | 2023-04-11 | 山东博奥克生物科技有限公司 | Medical equipment data management system and method |
Also Published As
Publication number | Publication date |
---|---|
CN105868596B (en) | 2019-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105868596A (en) | Method and device for real name authentication of identity | |
US8650103B2 (en) | Verification of a person identifier received online | |
US20070250459A1 (en) | Method and system for conducting background investigations | |
US20020083126A1 (en) | Online election system | |
McAllister | The Fourth Amendment and New Technologies: The Misapplication of Analogical Reasoning | |
AU2018201140A1 (en) | System and method for candidate profile screening | |
CN108769230A (en) | Transaction data storage method, device, server and storage medium | |
US10430569B2 (en) | Multicomputer system for user data authentication and processing | |
US20030171927A1 (en) | Method and system for verifying or certifying traits of candidates seeking employment | |
CN110309259A (en) | Audit result data storage, querying method, audit item storage method and device | |
CN107196896A (en) | Method for managing user right and device | |
Abomhara et al. | A comparison of primary stakeholders’ views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders | |
CN106060097A (en) | Management system and management method for information security competition | |
CN110071897A (en) | A kind of block catenary system based on mobile terminal | |
Hsiao et al. | Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme | |
CN106447342A (en) | Two-way evaluation system and method based on website platform | |
Maseno | Vishing attack detection model for mobile users. | |
CN106157214A (en) | The method and device of tracking of information | |
Bucher et al. | Captcha your location proof—A novel method for passive location proofs in adversarial environments | |
Jahanian et al. | Direct: Disaster response coordination with trusted volunteers | |
KR102612772B1 (en) | Method for providing online platform for community members and server for the same | |
CN106230862A (en) | A kind of business platform and business management method | |
Song et al. | Buying votes across Borders? A list experiment on mexican immigrants in the United States | |
CN113468457A (en) | Method, device and storage medium for centralized authentication and access of user information | |
CN109636574A (en) | Risk checking method, device, equipment and the storage medium of credit information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |