CN105868596A - Method and device for real name authentication of identity - Google Patents

Method and device for real name authentication of identity Download PDF

Info

Publication number
CN105868596A
CN105868596A CN201610366211.6A CN201610366211A CN105868596A CN 105868596 A CN105868596 A CN 105868596A CN 201610366211 A CN201610366211 A CN 201610366211A CN 105868596 A CN105868596 A CN 105868596A
Authority
CN
China
Prior art keywords
identity
problem set
data
proof
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610366211.6A
Other languages
Chinese (zh)
Other versions
CN105868596B (en
Inventor
王绪胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610366211.6A priority Critical patent/CN105868596B/en
Publication of CN105868596A publication Critical patent/CN105868596A/en
Application granted granted Critical
Publication of CN105868596B publication Critical patent/CN105868596B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method and a device for the real name authentication of an identity. The method for the real name authentication of the identity comprises the following steps of forwarding identity identification data which are used for identifying a target object and having uniqueness to an identity identification verifying party, wherein the target object is a to-be-validated object, and the identity identification verifying party is used for verifying whether the identity identification data are valid or not; when the identity identification verifying party verifies the identity identification data to be valid, inquiring the identity verification data of the target object in an identity verification database according to the identity identification data; generating a first problem set corresponding to the identity verification data according to the identity verification data; obtaining answers of problems in the first problem set, and carrying out verification on the answers of the problems in the first problem set, so as to obtain a verification result; when the verification result accords with a preset condition, determining that an identity data submitting party is the target object. Through the method and the device for the real name authentication of the identity, the effect of preventing the identity from being usurped is achieved.

Description

The method and apparatus of identity real name certification
Technical field
The present invention relates to field of identity authentication, in particular to the method and apparatus of a kind of identity real name certification.
Background technology
In information system, identity represents a participant of business, and it often shows as an ID (User ID) or login name (Login), may be corresponding a mechanism, an application system or individual.Many times, because of For national policy, legal requiremnt or the needs promoting service quality, information system must determine the concrete machine that identity is corresponding Structure or individual, carry out corresponding by the login name in information system with actual focal pointe, the need of identity real name certification Ask and arise at the historic moment.
At present, information system have employed different modes, individual's real name to the real name authentication procedures of mechanism and individual Authentication mode is mainly by the way of ID card verification and bank card checking, or is carried out the side verified by cell-phone number Formula.The basic procedure verifying personal identification is as follows: user submits name, identification card number, bank's card number, pre-to Stay cell-phone number;Service provider is by ID (identity number) card No. Help Center of Ministry of Public Security checking identification card number and the effectiveness of name, so Afterwards by the interface checking name of bank or Unionpay, identification card number, bank's card number, the effectiveness of reserved cell-phone number, Or by the way of online small amount beats money (service provider beats the bank card that money provides to user), verify bank card and name Effectiveness;It it is the interface checking hands utilizing mobile communication carrier by the way of cell-phone number carries out individual's real-name authentication The effectiveness of plane No., identity card and name;Existing mechanism real-name authentication mode is mainly by uploading business license copy Carrying out with the checking of mechanism Bank Account Number, this process is similar with the process of individual real-name authentication.
Owing to Bank Account Number (or mobile phone) process of opening an account is to need real-name authentication, therefore by Bank Account Number (or mobile phone Number) generally can be considered that real-name authentication and passed through after checking.Also have some tightened up real-name authentication modes, than As, part Third-party payment requires that personal user uploads the copy of personal identity card, is verified by examination & verification copy Everyone of identity card.
Above-mentioned steps demonstrates the verity of identity data, thus ensures that the identity data got is effective, that is, Individual or mechanism that this identity data is corresponding are necessary beings.
The imperfection protected due to current individual privacy, name, identification card number, bank's card number, reserved cell-phone number, body Part card information situation that is compromised and that usurp such as copy happens occasionally, therefore, name, identification card number, bank's card number, The submission of the information such as reserved cell-phone number can not be for I, and therefore, existing real name identification method causes identity stolen Situation of common occurrence;On the other hand, although the process of opening an account of bank card (or mobile phone) needs real-name authentication, but It is that the use process of bank card (or mobile phone) is not required to real-name authentication, therefore, opening of bank card (or mobile phone) People from family and in the case of making employment not be same people, even if not occurring information to usurp, bank card (or mobile phone) is verified also Falsely using of identity can not be prevented.
In sum, the real-name authentication process verification of the prior art effectiveness of identity data, but do not verify body Whether number is the identity owner itself according to submission side.Verify that merely identity data does not verify that identity holder is one Incomplete proof procedure, it is impossible to prevent identity stolen.
For correlation technique cannot prevent the stolen problem of identity, effective solution is the most not yet proposed.
Summary of the invention
Present invention is primarily targeted at the method and apparatus that a kind of identity real name certification is provided, at least to solve relevant skill Art cannot prevent the problem that identity is stolen.
To achieve these goals, according to an aspect of the invention, it is provided a kind of method of identity real name certification. The method of this identity real name certification includes: forward for identifying the identity data with uniqueness of destination object extremely Identity verification side, wherein, destination object is object to be verified, and identity verification side is used for verifying identity mark Know data the most effective;When identity verification side verification identity data is effective, exist according to identity data Inquiring about the proof of identity data of destination object in proof of identity data base, wherein, proof of identity data base is by gathering Proof of identity data and the data base that pre-builds, proof of identity data are to destination object shape during daily routines The historical record data become;According to the first problem set that proof of identity data genaration is corresponding with proof of identity data; Obtain the answer of problem in first problem set, and the answer to the problem in first problem set performs verification, must To check results;When check results meets pre-conditioned, the data that determine one's identity submission side is destination object.
Further, before the data submission side that determines one's identity is destination object, the method for this identity real name certification is also wrapped Include: forwarding identity data is to the private data source side comprising proof of identity data, wherein, private data source root Generate Second Problem set according to identity data, and the answer to the problem in Second Problem set performs verification, To check results, after the first problem set corresponding with proof of identity data according to proof of identity data genaration, The method of this identity real name certification also includes: obtain Second Problem set;To first problem set and Second Problem set Collect, obtain the 3rd problem set.
Further, private data source side includes multiple private data source side, when check results meets pre-conditioned, The data that determine one's identity submission side is that destination object includes: when the check results that first problem set is corresponding meets pre-conditioned Time, the problem in Second Problem set is originated and is analyzed, obtain analysis result;By answering in Second Problem set Case is committed to the multiple private data source sides corresponding with analysis result, wherein, multiple privately owned numbers respectively according to analysis result According to source side, the answer of the problem in Second Problem set is performed verification, when each private data source side is to Second Problem collection The answer of the problem in conjunction performs to verify when all passing through, and the data that determine one's identity submission side is destination object.
Further, the answer in Second Problem set is being committed to corresponding with analysis result respectively according to analysis result Multiple private data source sides before, the method for this identity real name certification also includes: when the school that first problem set is corresponding Testing result when not meeting pre-conditioned, the data that determine one's identity submission side is not destination object.
Further, multiple private data source sides are respectively equipped with weight, obtain Second Problem set and include: obtain multiple Second Problem set, wherein, multiple private data source sides obtain multiple private data source side respectively according to preset rules Weight, determines the problem set corresponding with multiple private data source sides according to the weight of multiple private data source sides respectively, Obtain multiple Second Problem set, wherein, the problem of the Second Problem set that private data source side that weight is high is corresponding The problem number of the Second Problem set that number private data source sides lower than weight are corresponding is many, to first problem set and the Two problem set collect, and obtain the 3rd problem set and include: to first problem set and multiple Second Problem set Collect, obtain the 3rd problem set, first problem set and Second Problem set are being collected, obtain After three problem set, the method for this identity real name certification also includes: obtain problem in the 3rd problem set respectively Answer;Calculating is performed respectively according to the answer of the problem in the weight of multiple private data source sides and the 3rd problem set, Obtain result of calculation.
Further, before the data submission side that determines one's identity is destination object, the method for this identity real name certification is also wrapped Include: judge that whether result of calculation is more than or equal to preset value;If it is judged that result of calculation is more than or equal to preset value, determine Check results meets pre-conditioned;If it is judged that result of calculation is less than preset value, determine that check results does not meets default Condition.
Further, when identity verification side verification identity data is effective, according to identity data at body The proof of identity data inquiring about destination object in part calibration database include: when identity verification side verifies identity When data are effective, in proof of identity data base, inquire about the proof of identity data strip of destination object according to identity data Mesh set, includes according to the first problem set that proof of identity data genaration is corresponding with proof of identity data: select at random Select the proof of identity Data Entry in proof of identity Data Entry set, and according to the proof of identity Data Entry selected Generating first problem set, wherein, the problem in first problem set and proof of identity Data Entry have one_to_one corresponding Relation.
To achieve these goals, according to a further aspect in the invention, the device of a kind of identity real name certification is additionally provided. The device of this identity real name certification includes: the first retransmission unit, unique for forwarding for identifying having of destination object The identity data of property is to identity verification side, and wherein, destination object is object to be verified, identity school It is the most effective that proved recipe is used for verifying identity data;Query unit, for verifying identity mark when identity verification side When knowledge data are effective, in proof of identity data base, inquire about the proof of identity data of destination object according to identity data, Wherein, proof of identity data base is the data base pre-build by captured identity verification data, proof of identity data For the historical record data that destination object is formed during day-to-day operations, work, studying or living;Problem generates Unit, for the first problem set corresponding with proof of identity data according to proof of identity data genaration;Processing unit, For obtaining the answer of the problem in first problem set, and the answer to the problem in first problem set performs verification, Obtain check results;First determines unit, and for when check results meets pre-conditioned, the data that determine one's identity are submitted to Side is destination object.
Further, the device of this identity real name certification also includes: the second retransmission unit, in the data that determine one's identity Before submission side is destination object, forward identity data to comprising the private data source side of proof of identity data, its In, private data source root generates Second Problem set according to identity data, and to the problem in Second Problem set Answer perform verification, obtain check results, the first acquiring unit, for according to proof of identity data genaration and body After the first problem set that part verification data are corresponding, obtain Second Problem set;Collection unit, for first Problem set and Second Problem set collect, and obtain the 3rd problem set.
Further, private data source side includes multiple private data source side, when check results meets pre-conditioned, This first determines that unit includes: analyze module, for meeting pre-conditioned when the check results that first problem set is corresponding Time, the problem in Second Problem set is originated and is analyzed, obtain analysis result;Submit module to, for by second Answer in problem set is committed to the multiple private data source sides corresponding with analysis result respectively according to analysis result, its In, multiple private data source sides perform verification to the answer of the problem in Second Problem set, when each private data source The answer of the problem in Second Problem set is performed to verify when all passing through by side, and the data that determine one's identity submission side is target pair As.
Further, the device of this identity real name certification also includes: second determines unit, for by Second Problem collection Before answer in conjunction is committed to multiple private data source sides corresponding with analysis result respectively according to analysis result, when When check results corresponding to one problem set does not meets pre-conditioned, the data that determine one's identity submission side is not destination object.
Further, multiple private data source sides are respectively equipped with weight, and the first acquiring unit is used for obtaining multiple second and asks Topic set, wherein, multiple private data source sides obtain the weight of multiple private data source side respectively according to preset rules, Determine the problem set corresponding with multiple private data source sides according to the weight of multiple private data source sides respectively, obtain many Individual Second Problem set, wherein, the problem number of the Second Problem set that private data source side that weight is high is corresponding is than power The problem number of the Second Problem set that the lowest private data source side is corresponding is many, and collection unit is for first problem collection Closing and multiple Second Problem set collect, obtain the 3rd problem set, the device of this identity real name certification also includes: Second acquisition unit, for obtaining the answer of the problem in multiple 3rd problem set respectively;And computing unit, use In performing calculating according to the answer of the problem in the weight of multiple private data source sides and the 3rd problem set respectively, obtain Result of calculation.
By the present invention, use and forward for identifying the identity data with uniqueness of destination object to identity mark Knowing verification side, wherein, destination object is object to be verified, and identity verification side is used for verifying identity data The most effective;When identity verification side verification identity data is effective, according to identity data in identity school Testing the proof of identity data inquiring about destination object in data base, wherein, proof of identity data base is by captured identity school The data base testing data and pre-build, proof of identity data are to go through destination object formation during daily routines Records of the Historian record data;According to the first problem set that proof of identity data genaration is corresponding with proof of identity data;Obtain the The answer of the problem in one problem set, and the answer to the problem in first problem set performs verification, is verified Result;When check results meets pre-conditioned, the data that determine one's identity submission side is destination object, solves relevant skill Art cannot prevent the problem that identity is stolen, reached the effect preventing identity stolen.
Accompanying drawing explanation
The accompanying drawing of the part constituting the application is used for providing a further understanding of the present invention, and the present invention's is schematic real Execute example and illustrate for explaining the present invention, being not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method for identity real name certification according to embodiments of the present invention;
Fig. 2 is the schematic flow sheet of the method for identity real name certification according to embodiments of the present invention;And
Fig. 3 is the schematic diagram of the device of identity real name certification according to embodiments of the present invention.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the application and the feature in embodiment can phases Combination mutually.Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
In order to make those skilled in the art be more fully understood that the application scheme, below in conjunction with in the embodiment of the present application Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present application, it is clear that described embodiment It is only the embodiment of the application part rather than whole embodiments.Based on the embodiment in the application, ability The every other embodiment that territory those of ordinary skill is obtained under not making creative work premise, all should belong to The scope of the application protection.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, " Two " it is etc. for distinguishing similar object, without being used for describing specific order or precedence.Should be appreciated that this The data that sample uses can be exchanged in the appropriate case, in order to embodiments herein described herein.Additionally, term " include " and " having " and their any deformation, it is intended that cover non-exclusive comprising, such as, comprise The process of series of steps or unit, method, system, product or equipment are not necessarily limited to those steps clearly listed Rapid or unit, but can include that the most clearly list or intrinsic for these processes, method, product or equipment Other step or unit.
A kind of method that the invention provides identity real name certification, the method includes that identity data submission side, identity have The related entities such as the person side of verification, identity verification side, non-private data source side;
Fig. 1 is the flow chart of the method for identity real name certification according to embodiments of the present invention.As it is shown in figure 1, this identity The method of real-name authentication comprises the following steps:
Step S101, forwards and verifies for the identity data with uniqueness identifying destination object to identity Side.
Identity data submission side submits to the identity data of destination object to the identity owner side of verification.Identity owner Verification side obtains the identity data with uniqueness for identifying destination object, and forwards identity data extremely Identity verification side.According to the destination object that identity data is corresponding, identity data is probably personal identification mark Data or authority identity mark data, destination object is object to be verified, that is, identity owner, such as, should Destination object is individual to be verified, or is mechanism to be verified, and identity verification side is used for verifying identity Data are the most effective, can be personal identification mark verification side or authority identity mark verification side, and personal identification identifies Whether verification can think " ID (identity number) card No. Help Center of the Ministry of Public Security ", exist for querying individual identity data, and Whether within the time limit of rationally, authority identity mark verification can think " whole nation credit information of enterprise publicity system ", uses In determining that enterprise or mechanism are the most effective.
When identity verification side verification identity data is effective, perform step S102.
Step S102, when identity verification side verification identity data is effective, according to identity data at body Part calibration database is inquired about the proof of identity data of destination object.
Forwarding after the identity data with uniqueness identifying destination object to identity verification side, When identity verification side verification identity data is effective, identity owner verifies root and exists according to identity data Proof of identity data base inquires about the proof of identity data of destination object.
Proof of identity data base is the data base pre-build by captured identity verification data, and proof of identity data are To destination object during daily routines formed historical record data, such as, destination object day-to-day operations, The historical record data formed during work, studying or living, closely bound up with the identity information of destination object, one For as, proof of identity data include the information such as beginning and ending time, place, related side, quantity.Proof of identity data base Derive from the proof of identity data of the non-private data source side that the identity owner side of verification gathers, so-called non-private data source Side, refers to that its proof of identity data can be gathered by proof of identity side, and identity owner verifies root according to the non-private gathered The proof of identity data having data source set up proof of identity data base.Proof of identity data Kuku is by multiple proof of identity numbers Constituting according to entry, proof of identity data base entries includes identity data and activity data.
Destination object is verified, need to use the proof of identity data of the stronger destination object of privacy or from Destination object is verified by multiple dimensions.The character of the proof of identity data according to destination object and the process of generation are not With, proof of identity data may reside in the machines such as government bodies, employer's organization, school, publishing house, telecommunications, electricity business Structure.The data source of the part identity verification data of destination object is can be disclosed access or be gathered by the third-party institution Non-private data source, such that it is able to by the identity owner side's of verification collection.
Step S103, according to the first problem set that proof of identity data genaration is corresponding with proof of identity data.
Identity owner verifies root according to the proof of identity data genaration first problem collection corresponding with proof of identity data Close.The identity owner side of verification can select at random according to the proof of identity data inquired in proof of identity data base Select proof of identity data, further according to the first problem that the proof of identity data genaration selected is corresponding with proof of identity data Set.First problem set includes multiple problem, and each problem in first problem set can be with identity-based check number According to time, related side, quantity etc. puts question to.
Step S104, the answer of the problem in acquisition first problem set, and answering the problem in first problem set Case performs verification, obtains check results.
After the first problem set corresponding with proof of identity data according to proof of identity data genaration, identity has Identity data submission side is submitted in first problem set by the person side of verification, and identity data submission side is answered in specifying the time limit Problem in first problem set, obtains the answer of problem in first problem set, and by first problem set The identity owner side of verification is submitted in the answer of problem.The identity owner side of verification obtains the problem in first problem set Answer, and the answer to the problem in first problem set performs verification, obtains check results, and this check results can Think the accuracy of answer to the problem in first problem set.If the answer to the problem in first problem set Verification pass through, then perform step S105, if to the verification of the answer of the problem in first problem set not over, Then represent that identity data submission side is not destination object, that is, identity data submission side is not identity owner, and then Determine the failure of the verification to destination object.
Step S105, when check results meets pre-conditioned, the data that determine one's identity submission side is destination object.
The answer of the problem in first problem set is being performed verification, after obtaining check results, it is judged that check results Whether meet pre-conditioned, when check results meets pre-conditioned, the data that determine one's identity submission side is destination object. Alternatively, it is judged that whether the accuracy of the answer of the problem in first problem set is more than to asking in first problem set The default accuracy that the answer of topic is arranged, if it is judged that the accuracy of the answer of the problem in first problem set is more than Presetting accuracy, the data that determine one's identity submission side is destination object, that is, the data submission side that determines one's identity gathers around for identity The person of having, thus the situation that the identity avoiding destination object is falsely used occurs.
This embodiment carries out identity real name certification to the proof of identity data of destination object, not only from multi-angle, various dimensions Demonstrate the effectiveness of the identity data of destination object, realize identity alternately also by the question and answer of identity data submission side Data submission side carries out identity owner's checking, it is ensured that only identity data submission side, could be the most correct Answer the multiple problems relevant to destination object, effectively prevent identity stolen.
This embodiment is by forwarding for identifying the identity data with uniqueness of destination object to identity school Proved recipe, destination object is object to be verified, and it is the most effective that identity verification side is used for verifying identity data; When identity verification side verification identity data is effective, according to identity data in proof of identity data base The proof of identity data of inquiry destination object, proof of identity data base is for pre-building by captured identity verification data Data base, proof of identity data are the historical record data formed destination object during daily routines;According to The first problem set that proof of identity data genaration is corresponding with proof of identity data;Obtain asking in first problem set The answer of topic, and the answer to the problem in first problem set performs verification, obtains check results;Work as check results When meeting pre-conditioned, the data that determine one's identity submission side is destination object, has reached the effect preventing identity stolen.
As the optional embodiment of one, before the data submission side that determines one's identity is destination object, forward identity mark Knowing data to comprising the private data source side of proof of identity data, wherein, private data source root is according to identity data Generate Second Problem set, and the answer to the problem in Second Problem set performs verification, obtains check results, According to after the first problem set that proof of identity data genaration is corresponding with proof of identity data, identity real name certification Method also includes: obtains Second Problem set and collects first problem set and Second Problem set, obtains the 3rd Problem set.
If the information source of proof of identity data base is the abundantest, information privacy degree therein is relatively low, except destination object Outside, the probability of other these information of object acquisition is bigger, it is possible to use destination object is carried out by private data source side Verification.So-called private data source side, refers to that the data source of the part identity verification data of destination object is owing to privacy is former Because of the private data source only allowing me directly to obtain, private data source cannot be by the 3rd due to the reason such as law, privacy Side gathers.Before the data submission side that determines one's identity is destination object, the identity owner side of verification forwards identity number According to comprising the private data source side of proof of identity data, private data source root generates second according to identity data and asks Topic set, and the Second Problem set of generation is back to the identity owner side of verification.The identity owner side's of verification acquisition Second Problem set, collects first problem set and Second Problem set, obtains the 3rd problem set, and the 3rd Problem set is combined into final problem set.3rd problem set is submitted to identity data submission side, and identity data is submitted to Side answers the problem answers in the 3rd problem set in specifying the time limit, and is carried by the problem answers in the 3rd problem set Give identity owner the side of verification, the answer of the problem in acquisition the 3rd problem set of the identity owner side of verification, wherein, Answer in first problem set is verified by the identity owner side of verification, obtains check results, private data source side Answer to the problem in Second Problem set performs verification, obtains check results.
As the optional embodiment of one, private data source side includes multiple private data source side, when check results accords with When closing pre-conditioned, the data that determine one's identity submission side is that destination object includes: when the verification knot that first problem set is corresponding When fruit meets pre-conditioned, the problem in Second Problem set is originated and is analyzed, obtain analysis result;By second Answer in problem set is committed to the multiple private data source sides corresponding with analysis result respectively according to analysis result, its In, multiple private data source sides perform verification to the answer of the problem in Second Problem set, when each private data source The answer of the problem in Second Problem set is performed to verify when all passing through by side, and the data that determine one's identity submission side is target pair As.
Private data source side includes multiple private data source side, and each private data source side can be according to identity data Generate Second Problem set.The answer of the problem in obtaining first problem set, and to asking in first problem set The answer of topic performs verification, after obtaining check results, when the check results that first problem set is corresponding meets default bar During part, the problem in Second Problem set is originated and is analyzed, obtain analysis result, by Second Problem set Problem is committed to the multiple private data source sides corresponding with analysis result respectively according to analysis result, that is, identity has The person side of verification decomposes the answer of the problem in Second Problem set, originates the problem in Second Problem set according to problem Answer be committed to the multiple private data source sides corresponding with analysis result, each private data source side verification Second Problem The answer of the problem in set, if the answer of the problem in Second Problem set is verified by each private data source side Passing through, then it represents that verify successfully, the data that determine one's identity submission side is destination object.If there is private data source side pair Problem in Second Problem set answer verification not over, then verify failure, the data that determine one's identity submission side is not Destination object.
As the optional embodiment of one, the answer in Second Problem set is being committed to respectively according to analysis result Before multiple private data source sides corresponding with analysis result, when the check results that first problem set is corresponding does not meets pre- If during condition, the data that determine one's identity submission side is not destination object.
The answer in the 3rd problem set is committed to respectively according to analysis result corresponding with analysis result multiple privately owned Before data source side, when the check results that first problem set is corresponding does not meets pre-conditioned, such as, when to first The accuracy of the answer of the problem in problem set is less than when presetting accuracy, and the data that directly determine one's identity submission side is not Destination object, the identity owner side of verification verification identity is invalid, the verification failure to destination object.When proof of identity side When verification identity is invalid, terminate the checking flow process to identity.
As the optional embodiment of one, multiple private data source sides are respectively equipped with weight, obtain Second Problem set Including: obtaining multiple Second Problem set, wherein, multiple private data source sides obtain multiple respectively according to preset rules The weight of private data source side, determines and multiple private data source sides pair according to the weight of multiple private data source sides respectively The problem set answered, obtains multiple Second Problem set, wherein, and corresponding second the asking in private data source side that weight is high The problem number of the Second Problem set that the problem number private data source side lower than weight of topic set is corresponding is many, to the One problem set and Second Problem set collect, and obtain the 3rd problem set and include: to first problem set with many Individual Second Problem set collects, and obtains the 3rd problem set, is entering first problem set and Second Problem set Row collects, and after obtaining the 3rd problem set, the method for this identity real name certification also includes: obtain the 3rd problem respectively The answer of the problem in set;Respectively according to the problem in the weight of multiple private data source sides and the 3rd problem set Answer performs calculating, obtains result of calculation.
Owing to proof of identity data are probably derived from various different data source, the degree of privacy of each data source, important Degree and credibility are the most not quite identical, such as, from proof of identity data (such as, the Ministry of Education of official of government Educational background data, social security pay record data), the credibility of the reference record of credit information service higher, its proof of identity data Significance level the highest, and from the data reliability phase of the mechanisms such as commercial undertaking's (such as, electricity business), social networks Relatively low to significance levels relatively low, its proof of identity data.Therefore, the answer to the problem from different pieces of information source The impact that identity owner is verified by the check results carrying out verifying is different, this problem to different pieces of information source The impact weight that identity owner is verified by the check results that answer carries out verifying is indicated.From the number that weight is high Problem according to source is more in the quantity of final problem set, from the problem of the low data source of weight at the number of final problem set Measure less.On the other hand, problem correct from the high data source of weight answers the check results to terminal check Contribution rate is higher, from the correct contribution rate answering the check results to terminal check of the problem of the low data source of weight Relatively low.
Multiple private data source sides can be respectively equipped with different size according to degree of privacy, significance level and credibility etc. Weight, obtain multiple Second Problem set, wherein, multiple private data source sides obtain many respectively according to preset rules The weight that individual private data source side is corresponding, that is, multiple private data source side according to degree of privacy, significance level and Credibility obtains the weight that multiple private data source side is corresponding respectively, due to private data source side that weight is high corresponding The problem number of the Second Problem set that private data source side that the problem number of two problem set is lower than weight is corresponding is many, Determine the problem set corresponding with multiple private data source sides according to the weight of multiple private data source sides respectively, obtain many Individual Second Problem set, the number of the problem in this Second Problem set is also determined.Obtaining Second Problem set Afterwards, first problem set and multiple Second Problem set are collected, obtains the 3rd problem set, can will be somebody's turn to do 3rd problem set is committed to identity data submission side, and identity data submits to root to become the 3rd to ask according to the 3rd problem set symphysis The answer of the problem in topic set, the respectively answer of the problem in acquisition the 3rd problem set, the most respectively according to multiple The answer of the problem in the weight of private data source side and the 3rd problem set performs calculating, obtains result of calculation, thus Realize identity certification effectively.
Alternatively, the data in proof of identity data base also are provided with due to degree of privacy, significance level and credibility etc. Corresponding weight, determines the number of problem in first problem set, when number in proof of identity data base according to this weight During according to corresponding weight height, the number of the problem in first problem set is many, the data pair in proof of identity data base When the weight answered is low, the number of the problem in first problem set is low, and then affects problem in the 3rd problem set Number, according to the number of the problem in the 3rd problem set, the most respectively according to the weight of multiple private data source sides, In proof of identity data base, the answer of the problem in the weight of data and the 3rd problem set performs calculating, is calculated As a result, thus realize to identity certification effectively.
As the optional embodiment of one, before the data submission side that determines one's identity is destination object, it is judged that calculate knot Whether fruit is more than or equal to preset value;If it is judged that result of calculation is more than or equal to preset value, determine that check results meets pre- If condition;If it is judged that result of calculation is less than preset value, determine that check results does not meets pre-conditioned.
Preset value is the threshold value verifying identity owner, and this preset value can be the problem in the 3rd problem set Answer by verification time minimum accuracy, between 0 to 1.Judge that whether result of calculation is more than or equal to presetting Value, if it is judged that result of calculation is more than or equal to preset value, determines that check results meets pre-conditioned, meets pre-to this If the check results of condition is identified, the data that determine one's identity submission side is destination object;If it is judged that result of calculation Less than preset value, determine that check results does not meets pre-conditioned, this is not met pre-conditioned check results and marks Knowing, the data that determine one's identity submission side is destination object, has reached the effect preventing identity stolen.
As the optional embodiment of one, when identity verification side verification identity data is effective, according to body Part mark data are inquired about the proof of identity data of destination object in proof of identity data base and are included: when identity verifies When side's verification identity data is effective, in proof of identity data base, inquire about destination object according to identity data Proof of identity Data Entry set, according to the first problem collection that proof of identity data genaration is corresponding with proof of identity data Conjunction includes: randomly choose the proof of identity Data Entry in proof of identity Data Entry set, and according to the body selected Part verification Data Entry generates first problem set, wherein, the problem in first problem set and the proof of identity of selection Data Entry has one-to-one relationship.
The proof of identity data of destination object are represented by proof of identity Data Entry, and proof of identity Data Entry is included in In proof of identity Data Entry set.When identity verification side verification identity data is effective, identity owner Verification root inquires about the proof of identity Data Entry collection of destination object in proof of identity data base according to identity data Closing, the identity owner side of verification randomly chooses the proof of identity Data Entry in proof of identity Data Entry set, and Generating first problem set according to the proof of identity Data Entry selected, each problem in first problem set can be with base Put question in proof of identity data strip object time, related side, quantity.Proof of identity in order to avoid destination object It is excessive that data leak impacts face, and each proof of identity Data Entry only generates a problem, it is ensured that first problem collection Problem in conjunction has one-to-one relationship with the proof of identity Data Entry of selection.
Alternatively, identity data is verified as the checking to personal identification data, it is also possible to for authority identity data Checking.When destination object is individual, the identity data of destination object is that personal identification identifies data.Work as mesh When mark object is mechanism, the identity data of destination object is that authority identity identifies data.
When destination object is individual, the proof of identity data of destination object are that personal identification verifies data, are to exist in person The historical record formed in real work, studying and living.When destination object is mechanism, the identity school of destination object Testing data is that authority identity verifies data, be mechanism the historical record self managed or perform to be formed in business procedure, Qualification information etc..
Identity real name certification need in information system verify user online under actual identity, existing personal identification real name Certification uses the identity datas such as name, identification card number, bank card, reserved cell-phone number, and authority identity real-name authentication uses The information such as the copy of the business license, mechanism's Bank Account Number, the usage degree of these information own widely, such as bank's account Number needing to be supplied to third party in transfer procedure, therefore the privacy of these information is not enough, very easy usurps, Therefore it is not used to verify identity owner.This embodiment proposes a kind of method that destination object is carried out real-name authentication, Only verify the effectiveness of identity data of destination object in prior art on the basis of, then verify that identity data submission side is No is the owner of identity data, thus avoids the identity of destination object stolen.
Below in conjunction with preferred embodiment, technical scheme is illustrated.
Whether identity data submission side to be verified is destination object, needs the information of the destination object that use privacy is stronger Verify, or from multiple dimensions, identity data is verified.
When destination object is individual, the identity data of destination object is that personal identification identifies data, personal identification Identification data packet includes the identity card data of individual, name data.When destination object is mechanism, the identity of destination object Mark data are that authority identity identifies data, and authority identity identification data packet includes organization mechanism code data, business license Number etc..
When destination object is individual, the proof of identity data of destination object are that personal identification verifies data, are to exist in person The historical record formed in real work, studying and living.Alternatively, personal identification verification data can be: education Class, including academic summary (middle school, university, postgraduate), vocational education;Occupation class, including career, occupation Ability/professional qualification certificate, industrial and commercial registration information, on-line shop, social security payment record, common reserve fund payment record etc.;Consumption Class, including individual consumption record (on line or under line), individual bill, credit record etc.;Residential, including house property, Residential area, community, relevant property service log etc.;Traffic class, including automobile running record, vehicle driving against traffic regulations record, Location-based service record, seize the opportunity record, public transport/subway, tourism trip record etc.;Communication class, including message registration (Gu Words, mobile phone) etc.;Social relations class, including kinsfolk, classmate, friend, the doings of participation, social network Network etc.;Medical records class, including health check-up and diagnosis and therapy recording etc.;Academic space, including paper, works, patent etc.;Individual People's identity check number is according to including personal preference etc..
When destination object is mechanism, the proof of identity data of destination object are that authority identity verifies data, including industry and commerce Information, tax information, mechanism's annual report, bid, intellectual property, wherein, intellectual property includes copyright, patent Power and trade mark right;Authority identity verification data also include mechanism's qualification information etc..
According to data character and produce process difference, these data be present in government bodies, employer's organization, school, Publishing house, telecommunications, electricity Shang Deng mechanism;Part data source is can be disclosed access or by third-party institution's collection, portion Divided data source only allows me directly to obtain due to privacy purposes.
This embodiment relies on multi-angle, the data of various dimensions carry out identity real name to the proof of identity data of destination object Certification, the identity real name identifying procedure of simplification includes identity data submission side, the identity owner side of verification, identity Verification side, non-private data source side, private data source side.
Fig. 2 is the schematic flow sheet of the method for identity real name certification according to embodiments of the present invention.As in figure 2 it is shown, should The method of identity real name certification comprises the following steps:
Step S201, the identity owner side of verification sends asking of the proof of identity data for gathering non-private data source side Ask order to non-private data source side.
The identity owner side of verification gathers the data of non-private data source side, first sends and is used for gathering non-private data source The request command of the proof of identity data of side is to non-private data source side.
Step S202, non-private data source side sends proof of identity data to the identity owner side of verification.
Non-private data source side the proof of identity data received for gathering non-private data source side request command it After, send proof of identity data to the identity owner side of verification.
Step S203, identity owner verifies root and sets up proof of identity data base according to proof of identity data.
The identity owner side of verification, after receiving proof of identity data, sets up proof of identity according to proof of identity data Data base.Proof of identity data base is made up of multiple proof of identity Data Entry, and proof of identity Data Entry includes identity Mark data and historical behavior data, wherein, personal identification identification data packet includes identity card, name, authority identity mark Know data and include organization mechanism code, business license number, organization names;Historical behavior data include time of the act, The information such as point, related side or associated mechanisms, item, quantity or the amount of money.
Proof of identity Data Entry list in table 1 personal identification calibration database
Table 1 is the personal identification verification data item list in proof of identity data base.As shown in table 1, in identity school Testing in data base, destination object is Zhang San, and the proof of identity Data Entry of Zhang San includes two proof of identity Data Entry, Article 1 proof of identity Data Entry be identification card number be 110114197912161428, time of the act include behavior initiate Time, is 2009.4, and place is Beijing, and related side is industrial and commercial bank, and item is loan, and quantity is 650000.? The Article 2 proof of identity Data Entry of three be identification card number be 110114197912161428, time of the act includes behavior Beginning and ending time, is 2009.4 2029.4, and place is Beijing, and related side is China Construction Bank, and item is the housing loan moon Refunding, quantity is 3200.
Step S204, identity data submission side submits to identity data to the identity owner side of verification.
Step S205, identity data is handed to identity verification side by the identity owner side of verification.
The identity owner side of verification is after receiving identity data, and the identity owner side of verification is by identity number According to handing to identity verification side.Alternatively, the identity owner side of verification sends for asking identity verification side The request command of verification identity data is to identity verification side.
Step S206, identity verification side verification identity data, obtain identity check results.
Identity verification side receives identity data, the effectiveness of verification identity data.Alternatively, identity Verification side receives the request command for asking identity verification side verification identity data, according to request command pair Identity data verifies, and obtains identity check results.If identity data verification is passed through, then The mark that determines one's identity data are effective, then send identity check results to the identity owner side of verification, if to body Part mark data check does not passes through, and represents that this identity data is illegal, and this focal pointe does not exists, then terminate Checking to identity.
Identity verification side includes that personal identification mark verification side and authority identity identify verification side, such as, the individual person Part mark verification side is " ID (identity number) card No. Help Center of the Ministry of Public Security ", and authority identity mark verification side is " whole nation enterprise letter Use public notification of information system ".
Step S207, the identity owner side of verification inquiry proof of identity data base, randomly choose proof of identity Data Entry, Generate first problem set.
When identity verification side verification identity data is effective, the identity owner side of verification inquiry proof of identity number According to storehouse, in proof of identity data base, inquire corresponding proof of identity Data Entry set according to identity data, And according to the proof of identity Data Entry set inquired, randomly choose proof of identity Data Entry, according to proof of identity Data Entry generates first problem set.This first problem collection is combined into problem set 1, corresponding with identity data Self checking problem set.First problem set includes multiple problem, and each problem can verify Data Entry with identity-based Time, related side, quantity put question to, such as, generate following first according to the proof of identity Data Entry of table 1 Problem in problem set:
1) in April, 2009, you have handled loan in which bank:
A) Bank of China b) Bank of Beijing c) Construction Bank more than d) is not
2) in April, 2016, you in China Construction Bank's housing loan amount to pay are:
A) 5000-6000 b) 4000-5000 c) 3000-4000 d) and more than be not
Preferably, can be only generated a problem according to each proof of identity Data Entry, thus avoid destination object Proof of identity data leak impacts the excessive situation in face and occurs.
Step S208, identity data is submitted to private data source side by the identity owner side of verification.
Identity data is committed to private data source side, alternatively, identity owner school by the identity owner side of verification Proved recipe sends and obtains the request command of the problem set relevant to identity data to private data source side.
Step S209, private data source root generates Second Problem set according to identity data.
Private data source side includes that multiple private data source side, each private data source side are receiving identity data Afterwards, generating multiple Second Problem set according to identity data, the plurality of Second Problem set is respectively problem set 2, problem set 3 ..., problem set n, and the problem set of generation is returned to the identity owner side of verification, that is, return Return the problem set relevant to identity data to the identity owner side of verification.
Step S210, the identity owner side of verification collects first problem set and Second Problem set, obtains the 3rd problem Set.
The identity owner side of verification is after receiving Second Problem set, to first problem set and Second Problem set Collect, obtain the 3rd problem set.
Step S211, the 3rd problem set is sent to identity data submission side by the identity owner side of verification.
Step S212, identity data submission side answers the problem in the 3rd problem set in specifying the time limit.
Identity data submission side receives the 3rd problem set that the identity owner side of verification sends, and returns within the time limit specified Answer the problem in the 3rd problem set, obtain the answer of problem in the 3rd problem set, and by the 3rd problem set The answer of problem be committed to the identity owner side of verification.
Step S213, the verification of the identity owner side of verification derives from the answer of problem in first problem set, obtains the One check results.
The identity owner side of verification receives the answer of the problem in the 3rd problem set, and verification derives from first problem set In the answer of problem, obtain the first check results.When the first check results meets pre-conditioned, determine first The answer verification of the problem in problem set is passed through, and performs step S214, if to the problem in first problem set Answer verification not over time, then the identity data side of submissioning is not identity owner, termination to authentication.
Step S214, the identity owner side of verification decomposes the answer of the problem in Second Problem set.
The identity owner side of verification decomposes the answer of the problem in Second Problem set, according to asking in Second Problem set Corresponding private data source side is submitted in the answer of the problem in Second Problem set by the source of topic.
Step S215, the answer of the problem in the verification Second Problem set of private data source side, obtain the second check results.
Private data source side receives the answer of the problem in Second Problem set, to answering of the problem in Second Problem set Case verifies, and obtains the second check results, and sends the second check results to the identity owner side of verification.Privately owned Answer in the verification Second Problem set of data source side, if the verification of each private data source side is passed through, then it represents that verification Success, otherwise verifies failure.
Step S216, the identity owner side of verification collects to the problem in first problem set with in Second Problem set The check results that verifies of the carrying out of problem, obtain terminal check result.
The identity owner side of verification collects the problem in first problem set and entering the problem in Second Problem set The check results of row verification, that is, the identity owner side of verification collects the first check results and the second check results, To terminal check result, calculate terminal check result.
Step S217, identity owner verifies root and determines that the real-name authentication to destination object is tied according to terminal check result Really.
When terminal check result meets pre-conditioned, determine the success of the authentication to destination object.
The proof of identity Data Source of destination object is formed in the life and work process or mechanism's business activities of individual Record, these records itself derive from multiple disclosed data sources or privately owned data source, and identity theft person is in short-term Obtaining corresponding proof of identity data in phase, the problem concentrated of correctly answering a question has the biggest difficulty, such that it is able to Avoid identity stolen;Secondly, problem set is dynamically to give birth to according to the data randomly choosed in proof of identity data Becoming, the problem in each problem set all can be varied from, even if there is part leaking data, body in proof of identity data Part appropriator is also impossible to can hit the answer of dynamic problem collection every time, thus avoids identity persistently to be usurped.
On the other hand, owing to the time span of proof of identity data record may be longer, identity owner may Forgeing or paramnesia, therefore verification user answers the answer can being not required in problem set completely correctly, Can arrange a threshold value, this threshold value is the accuracy of the answer in problem set, can regard as identity higher than this threshold value Data submission side is destination object, that is, identity data submission side is identity owner, less than this threshold value Regarding as identity data submission side is not destination object, can be considered as identity stolen.
Alternatively, if the information source in proof of identity data base is the abundantest, information privacy degree therein is higher, also That is, except identity owner, the probability that other people obtain this information is little, can not use private data source The verification of side.
Owing to proof of identity data are probably derived from various different data source, the degree of privacy of each data source, important Degree, credibility not quite identical, such as, from the proof of identity data of official of government, (such as, the Ministry of Education is learned Count one by one and pay record data according to, social security), the credibility of the reference record of credit information service higher, its proof of identity data Significance level is the highest, and relative from the data reliability of the mechanisms such as commercial undertaking (such as, electricity business), social networks Significance levels relatively low, its proof of identity data are relatively low, therefore, from the problem check result pair in different pieces of information source The impact of identity owner verification is different, in consideration of it, the implementation that the present invention one optimizes is for each data Source arranges a weight, more in the quantity of final problem set from the problem of the high data source of weight, on the other hand, From the high data source of weight problem correctly answer higher to the contribution of terminal check.
For example, the verification threshold value of the identity owner side of verification is set to t (0 < t < 1), and identity data submission side is Whole problem set derives from 3 data sources S1, S2, S3, and the weight of each data source is respectively w1, w2, w3, often Problem number corresponding to individual data source is respectively c1, c2, c3, the problem set from each data source be respectively q11, Q12 ..., q1C1}, { q21, q22 ..., q2C2}, { q31, q32 ..., q3C3}, for identity data The scoring rule of submission side is as follows: if identity data submission side is correct to the answer of the problem in problem set, then score Be 1, otherwise score be 0, the score of the problem in each problem set be sc11, sc 12 ..., sc 1C1}, sc 21, Sc 22 ..., sc 2C2}, { sc 31, sc 32 ..., sc 3C3}, the then final calculating that identity data submission side is answered Mark SC is as follows:
SC=w1* (sc11+sc 12+ ...+sc 1C1)+w2* (sc21+sc22+ ...+sc2C2)+w3* (sc31+sc 32+…+sc 3C3)/(c1+c2+c3)
Then as follows to the result of authentication: as SC >=t time, make check results V=1, verification pass through, that is, Identity data submission side is destination object;As SC, < during t, making check results V=0, verification is not passed through, that is, body Number is not destination object according to submission side, and identity is stolen.
This embodiment relies on multi-angle, the data of various dimensions, by the question answering process to identity data submission side, right On the basis of identity data verifies, demonstrate the owner of identity data, it is ensured that the body of focal pointe Part real-name authentication.This embodiment need not identity owner and submits the private data such as identity card, photo to, for privately owned Proof of identity data source, its problem and verification be directed to data source side, and this embodiment does not collect other privacy number According to, it is to avoid the risk that mechanism or individual privacy are revealed, reach the effect preventing identity stolen.This embodiment In problem set be dynamically to generate according to the data randomly choosed in proof of identity data, each problem set all can Change, even if there is part leaking data in proof of identity data, identity theft person is also impossible to can to hit dynamic every time The answer of state problem set, thus avoid identity persistently to be usurped.This embodiment is that each data source is provided with weight, protects Having demonstrate,proved the high data source of quality high to the contribution degree of proof of identity, low-quality data source is low to the contribution degree of proof of identity, Improve the accuracy of identity owner checking.
It should be noted that can be at such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing Computer system performs, and, although show logical order in flow charts, but in some cases, can With to be different from the step shown or described by order execution herein.
The embodiment of the present invention additionally provides the device of a kind of identity real name certification.It should be noted that the body of this embodiment The method that the device of part real-name authentication may be used for performing the identity real name certification of the embodiment of the present invention.
Fig. 3 is the schematic diagram of the device of identity real name certification according to embodiments of the present invention.As it is shown on figure 3, this identity The device of real-name authentication includes: the first retransmission unit 10, query unit 20, problem signal generating unit 30, processing unit 40 and first determine unit 50.
First retransmission unit 10, for forwarding for identifying the identity data with uniqueness of destination object to body Part mark verification side, wherein, destination object is object to be verified, and identity verification side is used for verifying identity Data are the most effective.
Query unit 20, for when identity verification side verification identity data is effective, according to identity number According to inquiring about the proof of identity data of destination object in proof of identity data base, wherein, proof of identity data base is for passing through The data base that captured identity verifies data and pre-builds, proof of identity data are in daily routines process to destination object The historical record data of middle formation.
Problem signal generating unit 30, for the first problem corresponding with proof of identity data according to proof of identity data genaration Set.
Processing unit 40, for obtaining the answer of the problem in first problem set, and to asking in first problem set The answer of topic performs verification, obtains check results.
First determines unit 50, and for when check results meets pre-conditioned, the data that determine one's identity submission side is target Object.
Alternatively, the device of this identity real name certification also includes the second retransmission unit, acquiring unit, collection unit and Two processing units.Wherein, the second retransmission unit, for before the data submission side that determines one's identity is destination object, turn Sending out identity data and extremely comprised the private data source side of proof of identity data, wherein, private data source root is according to body Part mark data genaration Second Problem set, acquiring unit, for according to proof of identity data genaration and proof of identity After the first problem set that data are corresponding, obtain Second Problem set, and to the problem in Second Problem set Answer performs verification, obtains check results;Collection unit, for carrying out first problem set and Second Problem set Collect, obtain the 3rd problem set.
Alternatively, private data source side includes multiple private data source side, when check results meets pre-conditioned, the One determines that unit 50 includes analyzing module and submitting module to.Wherein, analyze module, for when first problem set correspondence Check results when meeting pre-conditioned, the problem in Second Problem set is originated and is analyzed, obtain analysis result; Submit module to, for being committed to corresponding with analysis result respectively according to analysis result by the answer in Second Problem set Multiple private data source sides, wherein, multiple private data source sides perform school to the answer of the problem in Second Problem set Test, when the answer execution verification of the problem in Second Problem set is passed through by each private data source side, determine body Number is destination object according to submission side.
Alternatively, the device of this identity real name certification also includes: second determines unit, for by Second Problem set In answer be committed to the multiple private data source sides corresponding with analysis result respectively according to analysis result before, when first When check results corresponding to problem set does not meets pre-conditioned, the data that determine one's identity submission side is not destination object.
Alternatively, multiple private data source sides are respectively equipped with weight, and the first acquiring unit is used for obtaining multiple Second Problem Set, wherein, multiple private data source sides obtain the weight of multiple private data source side respectively according to preset rules, point Do not determine the problem set corresponding with multiple private data source sides according to the weight of multiple private data source sides, obtain multiple Second Problem set, wherein, the problem number of the Second Problem set that private data source side that weight is high is corresponding compares weight The problem number of the Second Problem set that low private data source side is corresponding is many, and collection unit is for first problem set Collecting with multiple Second Problem set, obtain the 3rd problem set, the device of this identity real name certification also includes: Second acquisition unit, for obtaining the answer of the problem in multiple 3rd problem set respectively;Computing unit, for dividing The answer of the problem in the other weight according to multiple private data source sides and the 3rd problem set performs calculating, is calculated Result.
This embodiment forwards the identity with uniqueness for identifying destination object by the first retransmission unit 10 Data are to identity verification side, and destination object is object to be verified, and identity verification side is used for verifying identity mark Know data the most effective, by query unit 20 when identity verification side verification identity data is effective, according to Identity data inquires about the proof of identity data of destination object in proof of identity data base, and proof of identity data base is The data base that pre-builds by captured identity verification data, proof of identity data be to destination object day-to-day operations, The historical record data formed during work, studying or living, by problem signal generating unit 30 according to proof of identity number According to generating the first problem set corresponding with proof of identity data, obtained in first problem set by processing unit 40 The answer of problem, and the answer to the problem in first problem set performs verification, obtains check results, by One determine unit 50 when check results meets pre-conditioned, the data that determine one's identity submission side is destination object, reaches Prevent the effect that identity is stolen.
The embodiment of the present invention additionally provides the system of a kind of identity real name certification.It should be noted that the body of this embodiment Part real-name authentication system may be used for the method performing the identity real name certification of the embodiment of the present invention, mainly includes that identity is gathered around The person's of having syndrome system, be used for forwarding identity data to identity syndrome system, when identity syndrome When system check identity data is effective, in proof of identity data base, inquire about destination object according to identity data Proof of identity data, according to the first problem set that proof of identity data genaration is corresponding with proof of identity data, obtain Take the answer of problem in first problem set, and the answer to the problem in first problem set performs verification, obtains Check results, when check results meets pre-conditioned, the data that determine one's identity submission side is destination object, wherein, body It is the most effective that part mark syndrome system is used for verifying identity data, and proof of identity data base is for passing through captured identity Verification data and the data base that pre-builds, proof of identity data for destination object in day-to-day operations, work, learn Or the historical record data formed in life process.
This embodiment is mainly used in the user registration course of application system or the key business in application system Journey, the former is served by system such as online tourism, calls a taxi online and be served by the user registration course of system etc.;The latter Identity real name certification is carried out in signing such as the online contract of online tourism service.Reality in the system to identity real name certification In the application of border, this embodiment exists mainly as the background support of application system, and therefore, identity data submission side wraps Include application system client and application system two parts.
Alternatively, application system client enrollment status information in application system, submit identity data to;Application system exists After receiving the identity data that application system client submits to, the identity data that application system client submits to is committed to body Part owner's syndrome system;Identity owner's syndrome system generates problem set according to identity data.Have in identity After person's syndrome system generates problem set according to identity data, problem set can be presented directly to application system client, Problem set can also be returned to application system, then be presented to client by application system;If problem set directly presents To application system client, then the question and answer result of the problem in problem set is gathered around by application system client by being directly committed to identity The person's of having syndrome system, otherwise will be delivered to identity owner's syndrome system by application system;Identity owner After identity data has been inspected by syndrome system, obtain the result of the identity real name certification to destination object, by real name Authentication result returns to application system, it is achieved the real-name authentication to destination object, has reached the effect preventing identity stolen Really.
Alternatively, before key business, the identity data of currently logged on user is committed to identity owner by application system Syndrome system;After identity owner's syndrome system generates problem set according to identity data, can be by problem set It is presented directly to application system client, it is also possible to problem set is returned to application system, application system presents to client; If problem set is presented directly to application system client, then the question and answer of the problem in problem set are tied by application system client Fruit will directly be committed to identity owner's syndrome system, otherwise will be delivered to identity owner verification by application system Subsystem;After identity owner's syndrome system test completes, in identity owner's syndrome system to identity number After having inspected, obtain the result of the identity real name certification to destination object, real-name authentication result is back to application System, it is achieved the real-name authentication to destination object, has reached the effect preventing identity stolen in key business.
On the other hand, in private data source side, in order to reduce the difficulty that existing application system is transformed, one can be disposed The individual real-name authentication Agent to destination object, the function that real-name authentication Agent mainly realizes is: be used for receiving Identity data;In the own data base of private data source side, proof of identity number is inquired according to identity data According to;According to proof of identity data generation problems collection, problem set is back to identity data submission side, receives identity data The answer to the problem in problem set of the submission side, the correctness of the answer of the problem in check problem set, reach Prevent the effect that identity is stolen.
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general Calculating device realize, they can concentrate on single calculating device, or is distributed in multiple calculating device institute On the network of composition, alternatively, they can realize with calculating the executable program code of device, it is thus possible to It is stored in storing in device and is performed by calculating device, or they are fabricated to respectively each integrated circuit die Block, or the multiple modules in them or step are fabricated to single integrated circuit module realize.So, the present invention It is not restricted to any specific hardware and software combine.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, made Any modification, equivalent substitution and improvement etc., should be included within the scope of the present invention.

Claims (12)

1. the method for an identity real name certification, it is characterised in that including:
Forward for identifying the identity data with uniqueness of destination object to identity verification side, its In, described destination object is object to be verified, and described identity verification side is used for verifying described identity Data are the most effective;
When the described identity verification side described identity data of verification is effective, according to described identity number According to inquiring about the proof of identity data of described destination object in proof of identity data base, wherein, described proof of identity Data base is the data base pre-build by gathering described proof of identity data, and described proof of identity data are The historical record data that described destination object is formed during daily routines;
According to the first problem set that described proof of identity data genaration is corresponding with described proof of identity data;
Obtain the answer of problem in described first problem set, and to the problem in described first problem set Answer performs verification, obtains check results;And
When described check results meets pre-conditioned, the data that determine one's identity submission side is described destination object.
Method the most according to claim 1, it is characterised in that
Before determining that described identity data submission side is described destination object, described method also includes: forward institute State identity data to the private data source side comprising proof of identity data, wherein, described private data source side Second Problem set, and answering the problem in described Second Problem set is generated according to described identity data Case performs verification, obtains described check results,
The first problem set corresponding with described proof of identity data according to described proof of identity data genaration it After, described method also includes: obtain described Second Problem set;To described first problem set and described second Problem set collects, and obtains the 3rd problem set.
Method the most according to claim 2, it is characterised in that described private data source side includes multiple private data Source side, when described check results meet described pre-conditioned time, determine that described identity data submission side is described mesh Mark object includes:
When the check results that described first problem set is corresponding meet described pre-conditioned time, to described Second Problem Problem source in set is analyzed, and obtains analysis result;And
Answer in described Second Problem set is committed to and described analysis result respectively according to described analysis result Corresponding multiple private data source sides, wherein, the plurality of private data source side is in described Second Problem set The answer of problem perform verification, when each described private data source side is to the problem in described Second Problem set Answer perform verification when all passing through, determine that described identity data submission side is described destination object.
Method the most according to claim 3, it is characterised in that by the answer in described Second Problem set according to Before described analysis result is committed to multiple private data source sides corresponding with described analysis result respectively, described side Method also includes: when the check results that described first problem set is corresponding do not meet described pre-conditioned time, determine institute Stating identity data submission side is not described destination object.
Method the most according to claim 3, it is characterised in that the plurality of private data source side is respectively equipped with weight, Obtain described Second Problem set to include: obtain multiple Second Problem set, wherein, the plurality of privately owned Data source side obtains the weight of the plurality of private data source side respectively according to preset rules, respectively according to described many The weight of individual private data source side determines the problem set corresponding with the plurality of private data source side, obtains described Multiple Second Problem set, wherein, asking of the Second Problem set that private data source side that described weight is high is corresponding The problem number inscribing Second Problem set corresponding to the number private data source side lower than described weight is many,
Described first problem set and described Second Problem set are collected, obtains described 3rd problem set Including: described first problem set and the plurality of Second Problem set are collected, obtains the described 3rd and ask Topic set,
Described first problem set and described Second Problem set are being collected, is obtaining described 3rd problem set After conjunction, described method also includes: obtain the answer of problem in described 3rd problem set respectively;Root respectively Calculating is performed according to the answer of the problem in the weight of the plurality of private data source side and described 3rd problem set, Obtain result of calculation.
Method the most according to claim 5, it is characterised in that determining that described identity data submission side is described mesh Before mark object, described method includes:
Judge that whether described result of calculation is more than or equal to preset value;
If it is judged that described result of calculation is more than or equal to described preset value, determine that described check results meets described Pre-conditioned;And
If it is judged that described result of calculation is less than described preset value, determine that described check results does not meets described pre- If condition.
Method the most according to claim 1, it is characterised in that
When the described identity verification side described identity data of verification is effective, according to described identity number Include according to the proof of identity data inquiring about described destination object in described proof of identity data base: when described identity When verification described identity data in mark verification side is effective, according to described identity data in described identity school Test the proof of identity Data Entry set inquiring about described destination object in data base,
According to the first problem set bag that described proof of identity data genaration is corresponding with described proof of identity data Include: randomly choose the proof of identity Data Entry in described proof of identity Data Entry set, and according to selection Described proof of identity Data Entry generate described first problem set, wherein, in described first problem set Problem and described proof of identity Data Entry have one-to-one relationship.
8. the device of an identity real name certification, it is characterised in that including:
First retransmission unit, for forwarding for identifying the identity data with uniqueness of destination object extremely Identity verification side, wherein, described destination object is object to be verified, and described identity verification side uses In verifying, described identity data is the most effective;
Query unit, is used for when the described identity verification side described identity data of verification is effective, according to Described identity data inquires about the proof of identity data of described destination object in proof of identity data base, wherein, Described proof of identity data base is the data base pre-build by gathering described proof of identity data, described body Part verification data are the historical record data formed described destination object during daily routines;
Problem signal generating unit, for corresponding with described proof of identity data according to described proof of identity data genaration First problem set;
Processing unit, for obtaining the answer of the problem in described first problem set, and to described first problem The answer of the problem in set performs verification, obtains check results;And
First determines unit, is used for when described check results meets pre-conditioned, the data that determine one's identity submission side It it is described destination object.
Device the most according to claim 8, it is characterised in that described device also includes:
Second retransmission unit, for before determining that described identity data submission side is described destination object, forwards Described identity data is to comprising the private data source side of proof of identity data, wherein, and described private data source Root generates Second Problem set according to described identity data, and to the problem in described Second Problem set Answer performs verification, obtains described check results;
First acquiring unit, for relative with described proof of identity data according to described proof of identity data genaration After the first problem set answered, obtain described Second Problem set;And
Collection unit, for collecting described first problem set and described Second Problem set, obtains the Three problem set.
Device the most according to claim 9, it is characterised in that described private data source side includes multiple private data Source side, when described check results meet described pre-conditioned time, described first determines that unit includes:
Analyze module, for when the check results that described first problem set is corresponding meet described pre-conditioned time, Problem in described Second Problem set is originated and is analyzed, obtain analysis result;And
Submit module to, for the answer in described Second Problem set being committed to respectively according to described analysis result The multiple private data source sides corresponding with described analysis result, wherein, the plurality of private data source side is to described The answer of the problem in Second Problem set performs verification, when each described private data source side is asked described second The answer of the problem in topic set performs to verify when all passing through, and determines that described identity data submission side is described target Object.
11. devices according to claim 10, it is characterised in that described device also includes: second determines unit, use In the answer in described Second Problem set is being committed to and described analysis result respectively according to described analysis result Before corresponding multiple private data source sides, when the check results that described first problem set is corresponding does not meets described Time pre-conditioned, determine that described identity data submission side is not described destination object.
12. devices according to claim 10, it is characterised in that the plurality of private data source side is respectively equipped with weight, Described first acquiring unit is used for obtaining multiple Second Problem set, wherein, the plurality of private data source Side obtains the weight of the plurality of private data source side respectively according to preset rules, respectively according to the plurality of privately owned The weight of data source side determines the problem set corresponding with the plurality of private data source side, obtains the plurality of Two problem set, wherein, the problem number of the Second Problem set that private data source side that described weight is high is corresponding The problem number of the Second Problem set that the private data source side lower than described weight is corresponding is many,
Described collection unit is used for collecting described first problem set and the plurality of Second Problem set, Obtain described 3rd problem set,
Described device also includes: second acquisition unit, for obtaining asking in the plurality of 3rd problem set respectively The answer of topic;And
Computing unit, for respectively according to weight and the described 3rd problem set of the plurality of private data source side In the answer of problem perform calculating, obtain result of calculation.
CN201610366211.6A 2016-05-27 2016-05-27 The method and apparatus of identity real name certification Active CN105868596B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610366211.6A CN105868596B (en) 2016-05-27 2016-05-27 The method and apparatus of identity real name certification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610366211.6A CN105868596B (en) 2016-05-27 2016-05-27 The method and apparatus of identity real name certification

Publications (2)

Publication Number Publication Date
CN105868596A true CN105868596A (en) 2016-08-17
CN105868596B CN105868596B (en) 2019-11-05

Family

ID=56641624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610366211.6A Active CN105868596B (en) 2016-05-27 2016-05-27 The method and apparatus of identity real name certification

Country Status (1)

Country Link
CN (1) CN105868596B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106657164A (en) * 2017-03-06 2017-05-10 泰华智慧产业集团股份有限公司 Composite identity recognition algorithm for real name authentication, and identity recognition system for real name authentication
CN107483456A (en) * 2017-08-25 2017-12-15 北京元心科技有限公司 Identity identifying method and device
CN108074301A (en) * 2016-11-15 2018-05-25 方正国际软件(北京)有限公司 A kind of system of real name method and device of transportation card
CN108256303A (en) * 2018-01-10 2018-07-06 深圳壹账通智能科技有限公司 Electronic device, auth method and storage medium
CN108765126A (en) * 2018-04-19 2018-11-06 出门问问信息科技有限公司 Identity verify method and device
CN110322646A (en) * 2019-07-05 2019-10-11 上海卓繁信息技术股份有限公司 Digital certificate handles method
CN112348524A (en) * 2020-10-27 2021-02-09 深圳前海微众银行股份有限公司 Anti-fraud decision method, device, equipment and computer storage medium
CN112632520A (en) * 2020-11-23 2021-04-09 北京思特奇信息技术股份有限公司 Method and system for real-name registration of group telephone service
CN115952482A (en) * 2023-03-13 2023-04-11 山东博奥克生物科技有限公司 Medical equipment data management system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103380430A (en) * 2010-12-30 2013-10-30 环联有限责任公司 Identity verification systems and methods
CN104184709A (en) * 2013-05-23 2014-12-03 腾讯科技(深圳)有限公司 Verification method, device, server, service data center and system
US20150143495A1 (en) * 2012-01-06 2015-05-21 Capy Inc. Captcha provision method and program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103380430A (en) * 2010-12-30 2013-10-30 环联有限责任公司 Identity verification systems and methods
US20150143495A1 (en) * 2012-01-06 2015-05-21 Capy Inc. Captcha provision method and program
CN104184709A (en) * 2013-05-23 2014-12-03 腾讯科技(深圳)有限公司 Verification method, device, server, service data center and system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108074301A (en) * 2016-11-15 2018-05-25 方正国际软件(北京)有限公司 A kind of system of real name method and device of transportation card
CN106657164A (en) * 2017-03-06 2017-05-10 泰华智慧产业集团股份有限公司 Composite identity recognition algorithm for real name authentication, and identity recognition system for real name authentication
CN106657164B (en) * 2017-03-06 2019-06-14 泰华智慧产业集团股份有限公司 A kind of identification composite algorism and system for real-name authentication
CN107483456A (en) * 2017-08-25 2017-12-15 北京元心科技有限公司 Identity identifying method and device
CN108256303A (en) * 2018-01-10 2018-07-06 深圳壹账通智能科技有限公司 Electronic device, auth method and storage medium
CN108765126A (en) * 2018-04-19 2018-11-06 出门问问信息科技有限公司 Identity verify method and device
CN110322646A (en) * 2019-07-05 2019-10-11 上海卓繁信息技术股份有限公司 Digital certificate handles method
CN112348524A (en) * 2020-10-27 2021-02-09 深圳前海微众银行股份有限公司 Anti-fraud decision method, device, equipment and computer storage medium
CN112348524B (en) * 2020-10-27 2024-05-10 深圳前海微众银行股份有限公司 Anti-fraud decision method, device, equipment and computer storage medium
CN112632520A (en) * 2020-11-23 2021-04-09 北京思特奇信息技术股份有限公司 Method and system for real-name registration of group telephone service
CN112632520B (en) * 2020-11-23 2024-03-19 北京思特奇信息技术股份有限公司 Method and system for registering real names of group telephone services
CN115952482A (en) * 2023-03-13 2023-04-11 山东博奥克生物科技有限公司 Medical equipment data management system and method

Also Published As

Publication number Publication date
CN105868596B (en) 2019-11-05

Similar Documents

Publication Publication Date Title
CN105868596A (en) Method and device for real name authentication of identity
US8650103B2 (en) Verification of a person identifier received online
US20070250459A1 (en) Method and system for conducting background investigations
US20020083126A1 (en) Online election system
McAllister The Fourth Amendment and New Technologies: The Misapplication of Analogical Reasoning
AU2018201140A1 (en) System and method for candidate profile screening
CN108769230A (en) Transaction data storage method, device, server and storage medium
US10430569B2 (en) Multicomputer system for user data authentication and processing
US20030171927A1 (en) Method and system for verifying or certifying traits of candidates seeking employment
CN110309259A (en) Audit result data storage, querying method, audit item storage method and device
CN107196896A (en) Method for managing user right and device
Abomhara et al. A comparison of primary stakeholders’ views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders
CN106060097A (en) Management system and management method for information security competition
CN110071897A (en) A kind of block catenary system based on mobile terminal
Hsiao et al. Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme
CN106447342A (en) Two-way evaluation system and method based on website platform
Maseno Vishing attack detection model for mobile users.
CN106157214A (en) The method and device of tracking of information
Bucher et al. Captcha your location proof—A novel method for passive location proofs in adversarial environments
Jahanian et al. Direct: Disaster response coordination with trusted volunteers
KR102612772B1 (en) Method for providing online platform for community members and server for the same
CN106230862A (en) A kind of business platform and business management method
Song et al. Buying votes across Borders? A list experiment on mexican immigrants in the United States
CN113468457A (en) Method, device and storage medium for centralized authentication and access of user information
CN109636574A (en) Risk checking method, device, equipment and the storage medium of credit information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant