CN106506459B - Identity information verification method and device - Google Patents

Identity information verification method and device Download PDF

Info

Publication number
CN106506459B
CN106506459B CN201610901831.5A CN201610901831A CN106506459B CN 106506459 B CN106506459 B CN 106506459B CN 201610901831 A CN201610901831 A CN 201610901831A CN 106506459 B CN106506459 B CN 106506459B
Authority
CN
China
Prior art keywords
information
request message
use information
history use
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610901831.5A
Other languages
Chinese (zh)
Other versions
CN106506459A (en
Inventor
张军
潘俊
衣少君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610901831.5A priority Critical patent/CN106506459B/en
Publication of CN106506459A publication Critical patent/CN106506459A/en
Application granted granted Critical
Publication of CN106506459B publication Critical patent/CN106506459B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The disclosure is directed to a kind of identity information verification method and devices, belong to network technique field, this method comprises: when the Authentication Events for detecting user account are triggered, obtain the history use information of the user account, the history use information is that the user account carries out used information when network operation before current time, based on the history use information, generate authentication request message, the authentication request message is sent to the user terminal for currently triggering the Authentication Events, when receiving the authentication response message that the user terminal is sent based on the authentication request message, based on the authentication response message and the history use information, identity information is verified, so, used information when due to the history use information being the daily carry out network operation of user, therefore, it does not need to use Family is purposely remembered, avoids user and is easy the case where forgetting, provides users with the convenient.

Description

Identity information verification method and device
Technical field
This disclosure relates to network technique field more particularly to a kind of identity information verification method and device.
Background technique
With the continuous development of network technology, Email Accounts, instant messaging account, Internet bank's account, social networks account Number equal to take on important role in people's daily life, at the same time, for such account, difference is usually arranged in user Password.In actual use, in some cases, it usually needs the identity information of user is verified, for example, working as When user needs to modify to set password, alternatively, when the password of user's input and account mismatch etc..
In the related technology, the process of identity information verifying generally includes: when initial password is arranged, account management server Multiple problems are provided for user, user selects at least one problem from multiple problem, fills in answering at least one problem Case, and the account management server is sent to by terminal, account management server carries out at least one problem and answer Corresponding storage.When needing to verify identity information, which provides above-mentioned at least one again for user A problem, user need to fill in the answer of at least one problem, later, the answer filled in are sent to the account by terminal Number management server, the answer which fills in user are verified, that is, judge that user filled in answers Whether the answer being arranged when initial with the user setting password of case is identical, if identical, it is determined that identity information is verified.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of identity information verification method and device.
In a first aspect, providing a kind of identity information verification method, which comprises
When the Authentication Events for detecting user account are triggered, the history for obtaining the user account uses letter Breath, the history use information are that the user account carries out used information when network operation before current time;
Based on the history use information, authentication request message is generated;
The authentication request message is sent to the user terminal for currently triggering the Authentication Events;
When receiving the authentication response message that the user terminal is sent based on the authentication request message, Based on the authentication response message and the history use information, identity information is verified.
Optionally, the history use information for obtaining the user account, comprising:
Information acquisition request is sent to data server, the information acquisition request carries the user account, the letter Breath acquisition request is used to indicate the history use information that the data server obtains and returns to the user account;
Receive the history use information that the data server is sent.
Optionally, described to be based on the history use information, generate authentication request message, comprising:
According to specified strategy, the partial information in the history use information is obtained;
Based on the partial information, the first checking request message is generated, the first checking request message is used to indicate base The other information in the history use information other than the partial information is supplemented in the partial information;
The first checking request message is determined as the authentication request message.
Optionally, described to be based on the history use information, generate authentication request message, comprising:
When the history use information is telephone number, multiple phone numbers are added at random in the history use information Code;
Based on the history use information after addition, the second checking request message is generated, the second checking request message is used The history use information is selected from the history use information after addition in instruction;
The second checking request message is determined as the authentication request message.
Optionally, described to be based on the history use information, generate authentication request message, comprising:
When in the history use information including the pictorial information of picture and the picture, the is generated based on the picture Three checking request message, the third checking request message are used to indicate the pictorial information for filling in the picture;
The third checking request message is determined as the authentication request message.
Optionally, described to be based on the history use information, generate authentication request message, comprising:
When the history use information further includes safe class mark, from the history use information selection with it is described The corresponding target use information of safe class mark, the history that the safe class mark is verified needed for being used to indicate use letter Breath;
Based on the target use information, the authentication request message is generated.
Optionally, described to be based on the authentication response message and the history use information, identity information is carried out Verifying, comprising:
The first verification information carried in the authentication response message is obtained, first verification information includes at least The partial information;
When first verification information is identical as the history use information, determine that the identity information is verified;
When first verification information and the history use information be not identical, determine that the identity information verifying is not led to It crosses.
Optionally, described to be based on the authentication response message and the history use information, identity information is carried out Verifying, comprising:
Obtain the second verification information carried in the authentication response message;
When second verification information is identical as the telephone number, determine that the identity information is verified;
When second verification information and the telephone number be not identical, determine that the identity information verifying does not pass through.
Optionally, described to be based on the authentication response message and the history use information, identity information is carried out Verifying, comprising:
Obtain the third verification information carried in the authentication response message;
When the third verification information is identical as the pictorial information, determine that the identity information is verified;
When the third verification information and the pictorial information be not identical, determine that the identity information verifying does not pass through.
Optionally, after the determination identity information verifying does not pass through, further includes:
Retransmit the authentication request message, and to retransmit the number of the authentication request message into Row statistics;
When the number for retransmitting the authentication request message is greater than or equal to preset threshold, stop retransmitting The authentication request message.
Optionally, before the history use information for obtaining the user account, further includes:
When detecting that the user account and the unmatched number of password reach preset times, the user account is triggered Authentication Events;Or
When receiving Modify password request, the Authentication Events of the user account are triggered.
Second aspect, provides a kind of identity information verifying device, and described device includes:
Module is obtained, for obtaining the user account when the Authentication Events for detecting user account are triggered History use information, the history use information carries out making when network operation before current time by the user account Information;
Generation module, the history use information for being obtained based on the acquisition module, generates authentication request Message;
Sending module, the authentication request message for generating the generation module are sent to current triggering institute State the user terminal of Authentication Events;
Authentication module is tested for that ought receive the identity that the user terminal is sent based on the authentication request message When demonstrate,proving response message, it is based on the authentication response message and the history use information, identity information is verified.
Optionally, the acquisition module is used for:
Information acquisition request is sent to data server, the information acquisition request carries the user account, the letter Breath acquisition request is used to indicate the history use information that the data server obtains and returns to the user account;
Receive the history use information that the data server is sent.
Optionally, the generation module is used for:
According to specified strategy, the partial information in the history use information is obtained;
Based on the partial information, the first checking request message is generated, the first checking request message is used to indicate base The other information in the history use information other than the partial information is supplemented in the partial information;
The first checking request message is determined as the authentication request message.
Optionally, the generation module is also used to:
When the history use information is telephone number, multiple phone numbers are added at random in the history use information Code;
Based on the history use information after addition, the second checking request message is generated, the second checking request message is used The history use information is selected from the history use information after addition in instruction;
The second checking request message is determined as the authentication request message.
Optionally, the generation module is also used to:
When in the history use information including the pictorial information of picture and the picture, the is generated based on the picture Three checking request message, the third checking request message are used to indicate the pictorial information for filling in the picture;
The third checking request message is determined as the authentication request message.
Optionally, the generation module is also used to:
When the history use information further includes safe class mark, from the history use information selection with it is described The corresponding target use information of safe class mark, the history that the safe class mark is verified needed for being used to indicate use letter Breath;
Based on the target use information, the authentication request message is generated.
Optionally, the authentication module is used for:
The first verification information carried in the authentication response message is obtained, first verification information includes at least The partial information;
When first verification information is identical as the history use information, determine that the identity information is verified;
When first verification information and the history use information be not identical, determine that the identity information verifying is not led to It crosses.
Optionally, the authentication module is also used to:
Obtain the second verification information carried in the authentication response message;
When second verification information is identical as the telephone number, determine that the identity information is verified;
When second verification information and the telephone number be not identical, determine that the identity information verifying does not pass through.
Optionally, the authentication module is also used to:
Obtain the third verification information carried in the authentication response message;
When the third verification information is identical as the pictorial information, determine that the identity information is verified;
When the third verification information and the pictorial information be not identical, determine that the identity information verifying does not pass through.
Optionally, described device further include:
Statistical module is asked for retransmitting the authentication request message, and to the authentication is retransmitted The number of message is asked to be counted;
Stopping modular, for being greater than or equal to preset threshold when the number for retransmitting the authentication request message When, stop retransmitting the authentication request message.
Optionally, described device further includes trigger module, and the trigger module is used for:
When detecting that the user account and the unmatched number of password reach preset times, the user account is triggered Authentication Events;Or
When receiving Modify password request, the Authentication Events of the user account are triggered.
The third aspect, provides a kind of identity information verifying device, and described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
When the Authentication Events for detecting user account are triggered, the history for obtaining the user account uses letter Breath, the history use information are that the user account carries out used information when network operation before current time;
Based on the history use information, authentication request message is generated;
The authentication request message is sent to the user terminal for currently triggering the Authentication Events;
When receiving the authentication response message that the user terminal is sent based on the authentication request message, Based on the authentication response message and the history use information, identity information is verified.
The technical scheme provided by this disclosed embodiment can include the following benefits:
In the embodiments of the present disclosure, when server detects that the Authentication Events of user account are triggered, illustrate to need The identity information of the user is verified, which obtains the user account and carry out network operation before current time When used history use information, that is to say, which is used when being the daily carry out network operation of the user Information, for example, the history use information can be for shipping address information etc., which is based on the history use information, raw At authentication request message, later, which is sent to the user terminal, when the server is based on the body When the authentication response message that part checking request message sink is sent to the user terminal, which is based on the authentication Response message verifies the identity information of the user, since the history use information is the daily carry out network operation of user When used information, therefore, there is no need to user and purposely remember, avoid user and be easy the case where forgetting, provided for user Convenience.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Figure 1A is a kind of implementation environment schematic diagram shown according to an exemplary embodiment.
Figure 1B is a kind of flow chart of identity information verification method shown according to an exemplary embodiment.
Fig. 2A is a kind of flow chart of the identity information verification method shown according to another exemplary embodiment.
Fig. 2 B is a kind of display schematic diagram of login interface involved in Fig. 2A embodiment.
Fig. 2 C (1) is a kind of display schematic diagram of authentication request message involved in Fig. 2A embodiment.
Fig. 2 C (2) is the display schematic diagram of another kind authentication request message involved in Fig. 2A embodiment.
Fig. 2 D is the display schematic diagram of another kind authentication request message involved in Fig. 2A embodiment.
Fig. 3 A is a kind of block diagram of identity information verifying device shown according to an exemplary embodiment.
Fig. 3 B is a kind of block diagram of identity information verifying device shown according to another exemplary embodiment.
Fig. 3 C is a kind of block diagram of identity information verifying device shown according to another exemplary embodiment.
Fig. 4 is a kind of block diagram of identity information verifying device 400 shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Figure 1A is a kind of implementation environment schematic diagram shown according to an exemplary embodiment, mainly includes in the implementation environment User terminal 110, account management server 120 and data server 130.Wherein, the data server 130 respectively with the user Communication connection is established by cable network or wireless network between terminal 110 and the account management server 120.
Wherein, application or browser can have been run in the user terminal 110, user can pass through the application or browser Carry out the operation such as account login.The user terminal 110 can be the equipment of such as mobile phone, tablet computer, computer or the like.
Wherein, which is mainly used for verifying the identity information of user, in addition, the account Management server 120 can be also used for management user account and password, wherein in one possible implementation, the account Management server 120 and above-mentioned data server 130 can be same server.
Wherein, which at least can be used for storing the history use information of the user account, for example, should Data server 130 can be for cloud server, operator's background server etc., for example, operator's background server can be with For the background server etc. in millet shop.
Figure 1B is a kind of flow chart of identity information verification method shown according to an exemplary embodiment, as shown in Figure 1, The identity information verification method includes the following steps.
In a step 101, when the Authentication Events for detecting user account are triggered, going through for the user account is obtained History use information, the history use information are that the user account carries out used letter when network operation before current time Breath.
In a step 102, it is based on the history use information, generates authentication request message.
In step 103, which is sent to the user's end for currently triggering the Authentication Events End.
At step 104, loud when receiving the authentication that the user terminal is sent based on the authentication request message When answering message, based on the authentication response message and the history use information, identity information is verified.
In the embodiments of the present disclosure, when server detects that the Authentication Events of user account are triggered, illustrate to need The identity information of the user is verified, which obtains the user account and carry out network operation before current time When used history use information, that is to say, which is used when being the daily carry out network operation of the user Information, for example, the history use information can be for shipping address etc., which is based on the history use information, generates body The authentication request message is sent to the user terminal by part checking request message later, is tested when the server is based on the identity When card request message receives the authentication response message of user terminal transmission, which is responded based on the authentication Message verifies the identity information of the user, since the history use information is the daily carry out network operation when institute of user The information used therefore, there is no need to user and purposely remember, avoids user and is easy the case where forgetting, for the user side of providing Just.
Optionally, the history use information of the acquisition user account, comprising:
Information acquisition request is sent to data server, which carries the user account, the acquisition of information Request is used to indicate the history use information that the data server obtains and returns to the user account;
Receive the history use information of data server transmission.
Optionally, it should be based on the history use information, generate authentication request message, comprising:
According to specified strategy, the partial information in the history use information is obtained;
Based on the partial information, the first checking request message is generated, which, which is used to indicate, is based on being somebody's turn to do Partial information supplements the other information in the history use information other than the partial information;
The first checking request message is determined as the authentication request message.
Optionally, it should be based on the history use information, generate authentication request message, comprising:
When the history use information is telephone number, multiple telephone numbers are added at random in the history use information;
Based on the history use information after addition, the second checking request message is generated, which is used for The history use information is selected in instruction from the history use information after addition;
The second checking request message is determined as the authentication request message.
Optionally, it should be based on the history use information, generate authentication request message, comprising:
When in the history use information including the pictorial information of picture and the picture, third verifying is generated based on the picture Request message, the third checking request message are used to indicate the pictorial information for filling in the picture;
The third checking request message is determined as the authentication request message.
Optionally, it should be based on the history use information, generate authentication request message, comprising:
When the history use information further includes safe class mark, selection and the safety etc. from the history use information Grade identifies corresponding target use information, the history use information which verifies needed for being used to indicate;
Based on the target use information, the authentication request message is generated.
Optionally, identity information should be verified based on the authentication response message and the history use information, was wrapped It includes:
The first verification information carried in the authentication response message is obtained, which includes at least the portion Divide information;
When first verification information is identical as the history use information, determine that the identity information is verified;
When first verification information and the history use information be not identical, determine that identity information verifying does not pass through.
Optionally, identity information should be verified based on the authentication response message and the history use information, was wrapped It includes:
Obtain the second verification information carried in the authentication response message;
When second verification information is identical as the telephone number, determine that the identity information is verified;
When second verification information and the telephone number be not identical, determine that identity information verifying does not pass through.
Optionally, identity information should be verified based on the authentication response message and the history use information, was wrapped It includes:
Obtain the third verification information carried in the authentication response message;
When the third verification information is identical as the pictorial information, determine that the identity information is verified;
When the third verification information and the pictorial information be not identical, determine that identity information verifying does not pass through.
Optionally, after the verifying of the determination identity information does not pass through, further includes:
The authentication request message is retransmitted, and is united to the number for retransmitting the authentication request message Meter;
When the number for retransmitting the authentication request message is greater than or equal to preset threshold, stops retransmitting and be somebody's turn to do Authentication request message.
Optionally, before the history use information for obtaining the user account, further includes:
When detecting that the user account and the unmatched number of password reach preset times, the body of the user account is triggered Part verifying event;Or
When receiving Modify password request, the Authentication Events of the user account are triggered.
All the above alternatives, can form the alternative embodiment of the disclosure according to any combination, and the disclosure is real It applies example and this is no longer repeated one by one.
Fig. 2A is a kind of flow chart of identity information verification method shown according to an exemplary embodiment, such as Fig. 2A institute Show, the embodiment of the present disclosure is illustrated so that multi-party interactive mode realizes the identity information verification method as an example, which tests Card method the following steps are included:
In step 201, it when account management server detects that the Authentication Events of user account are triggered, obtains The history use information of the user account, the history use information are that the user account carries out network operation before current time When used information.
During using user account and password, in some cases, inevitably need to the identity information of user into Row verifying.Currently, in identity information verification method provided by the relevant technologies, since user is typically easy to forget that setting is initial close When code therefore set answer causes user can not be by the verifying of identity information, in this way, bringing inconvenience to users.For This provides a kind of identity information verification method in the embodiments of the present disclosure, which can be to avoid above-mentioned Problem, it is specific as follows text described in.
Wherein, before the identity information to user is verified, need to trigger the Authentication Events of the user account, It that is to say, before the history use information for obtaining the user account, which needs under specified requirements, touching Send out the Authentication Events of the user account.Wherein, which may include following any possible implementation:
First way: when detecting that the user account and the unmatched number of password reach preset times, triggering should The Authentication Events of user account.
Wherein, which can also be taken by user's customized setting according to actual needs by the account management Business device default setting, the embodiment of the present disclosure do not limit this.
In this kind of implementation, when detecting that the user account and the unmatched number of password reach preset times, Illustrate that the user may not be the owner of the user account, therefore, it is necessary to the identity to the user to verify, i.e., in this kind In the case of, trigger the Authentication Events of the user account.
The second way: when receiving Modify password request, the Authentication Events of the user account are triggered.
In this kind of implementation, when receiving Modify password request, in order to guarantee the safety of account, need to desired The identity information of the user of Modify password is verified, i.e. the authentication thing of the account management server triggers user account Part.
Wherein, in one possible implementation, Modify password request is sent by user terminal, and the user terminal When receiving Modify password instruction, Modify password request is sent.Wherein, Modify password instruction can be triggered by user, The user can be by specified operation triggering, which may include clicking operation, slide etc., and the disclosure is implemented Example does not limit this.
For example, please refer to Fig. 2 B, include in the current display interface of the user terminal login account option 21, log in it is close Code option 22 and the Modify password option 23 can click the Modify password option 23 when user wants Modify password, should User terminal, which determines, receives Modify password instruction, and later, which sends the modification to the account management server Password request.
It is only the account management server in above-mentioned two situations it should be noted that in the embodiments of the present disclosure It triggers and is illustrated for the Authentication Events of the user account, in another embodiment, can also be in other cases, The Authentication Events of the account management server triggers user account, the embodiment of the present disclosure are not construed as limiting this.
When the account management server detects that the Authentication Events of user account are triggered, the user account is obtained History use information, the history use information used information when being the daily carry out network operation of the user.Wherein, the net Network operation can be the operation synchronized to the data information on user terminal, for example, the data information on the user terminal It may include: the telephone number, the picture in photograph album, short message etc. of all good friends.Alternatively, the network operation may be online Transactional operation, wherein online transaction operation may include again shopping online operation, online transfer operation etc..Certainly, the network Operation can also be other operations, and the embodiment of the present disclosure does not limit this.
It that is to say, when user, which is based on the user account, carries out such network operation, this can have been retained in the server and gone through History use information, for example, when user is based on user account progress shopping online, it will usually there be place of acceptance in the server Location information etc..Wherein, which can be the account management server, and certainly, which may be for storing net The data server of network data, the type referred to according to the server is different, and the history of the above-mentioned acquisition user account uses The realization process of information may include following any possible implementation:
First way: sending information acquisition request to data server, which carries the user account, The information acquisition request is used to indicate the history use information that the data server obtains and returns to the user account, receives the number The history use information sent according to server.
Wherein, which at least is used to store the history use information of the user account, for example, the data service Device can be cloud server, the data information being stored in the cloud server on the corresponding user terminal of the user account, In this case, which can be some or all of data information on the user terminal.
In this kind of implementation, which is triggered in the Authentication Events for detecting user account When, information acquisition request, which is sent, to the data server deposits after the data server receives the information acquisition request from itself In multiple use informations of storage, the corresponding history use information of the user account is obtained, and the history use information is sent to The account management server, in this way, the account management server is the history use information for getting the user account.
In addition, the data server is also possible to the security level requirement with verification information in this kind of implementation, That is may have different security level requirements to verification information, for example, for cloud for different data server For server, it usually needs verifying telephone number, the telephone number can be the telephone number of user oneself, or should The telephone number of the good friend of user, and for some shopping websites, it may not be necessary to telephone number is verified, as long as verifying is received Goods address information.When also there is the data server security level of verification information to require, which is received Can also include any in following (1)-(2) implementation to after information acquisition request:
(1), the data server obtains the history for needing the user account verified according to itself security level demand Use information, and the history use information is sent to the account management server.
In this kind of implementation, for the account management server, do not need to data server transmission History use information is screened, that is to say, that the data server is sending history use to the account management server Before information, according to the security level demand of itself, select to need from the corresponding multiple history use informations of the user account The history use information to be verified.
(2), the data server obtain itself safe class mark and the user account all history use informations, And all history use informations of the safe class mark He the user account are sent to the account management server.
Wherein, the history use information verified needed for which is used to indicate.No with above-mentioned implementation (1) With in this kind of implementation, which makes all history of the safe class mark He the user account After being sent to the account management server with information, the account management server is needed to be based on the safe class mark, from the use The history use information verified is selected in all history use informations of family account.
Wherein, the division of above-mentioned security level can be arranged according to actual needs by technical staff, for example, the security level Division can be with are as follows: the verifying grade of telephone number is higher than the verifying grade, etc. of the shipping address information, the embodiment of the present disclosure It does not limit this.In addition, the safe class mark can be rank 1, rank 2, rank 3 etc., with the increase of number, safety Grade becomes smaller, and for above-mentioned, the corresponding safe class mark of verifying grade of the telephone number is rank 1, the shipping address The corresponding safe class mark of verifying grade of information can be rank 2 or rank 3 etc..Certainly, which may be used also To exist in other forms, the embodiment of the present disclosure is not limited this.
The second way: the account management server obtains the user account from pre-stored multiple use informations History use information.
As described above, in one possible implementation, since the account management server and data server can Think same equipment, therefore, when the account management server is same equipment with the data server, the history use information It itself can be stored in advance by the account management server.
In step 202, which is based on the history use information, generates authentication request message.
Wherein, which is based on the history use information, generates the realization of authentication request message Journey may include following at least one possible implementation:
First way: according to specified strategy, obtaining the partial information in the history use information, is believed based on the part Breath generates the first checking request message, which, which is used to indicate, uses the history based on the partial information Other information in information other than the partial information is supplemented, which is determined as the identity and is tested Demonstrate,prove request message.
Wherein, which can be arranged in advance in the account management server.For example, the specified strategy can be with Are as follows: the other information other than number and letter in the history use information is obtained, and the other information is determined into the portion Divide information.Alternatively, the specified strategy can be with are as follows: determine the character number i for including in the history use information, obtain the history The corresponding history use information of preceding i/2 character in use information, and acquired history use information is determined as above-mentioned portion Divide information, etc., wherein character number i is more than or equal to 1.
For example, other other than number and letter in the history use information to obtain with the above-mentioned specified strategy Information, and for the other information is determined the partial information, when the history use information includes shipping address information, and the receipts Goods address information is No. 16 Bank of New York buildings in New York Wall Street Building A, then the partial information can be New York Wall Street xx knob About banking house x.It that is to say, user is needed to fill in " 16 " and " A " in the shipping address information.
The second way: it when the history use information is telephone number, is added at random in the history use information more A telephone number generates the second checking request message based on the history use information after addition, which uses The history use information is selected from the history use information after addition in instruction, which is determined as this Authentication request message.
In this kind of implementation, multiple telephone number is added at random, and its object is to allow the user based on addition In the case where obscuring number, the telephone number of to one's name good friend is selected from the history use information after the addition, i.e., It, can be with when the user is added in the history use information for obscuring number from this, selects the buddy phone number of the user Determining the user not is the owner of the user account.
The third mode: when in the history use information including the pictorial information of picture and the picture, it is based on the picture Third checking request message is generated, which is used to indicate the pictorial information for filling in the picture, by the third Checking request message is determined as the authentication request message.
For example, in one possible implementation, which can serve to indicate that whom the personage in the picture is, It that is to say, after generating the third checking request message based on the picture, so that user terminal receives the third checking request Message, after showing the picture, user recognizes the personage in the picture, and identified people information is sent to the account Number management server judges whether people information that user determines and the pictorial information are identical convenient for the account management server.
It should be noted that be only to be based on the history use information in a manner of above-mentioned three kinds in the embodiments of the present disclosure, It is illustrated for generation authentication request message, in another embodiment, it is also possible to by other forms, be based on the history Use information, generates authentication request message, and the embodiment of the present disclosure does not limit this.
Three kinds of implementations of above-mentioned offer are corresponding with implementation in step 201 (1), that is to say, mention above-mentioned The three kinds of implementations supplied, can be the security level demand by the data server according to itself, corresponding from the user account Multiple history use informations in, select the history use information verified, and by selected history use information It is sent to the account management server, that is to say, that for the account management server, do not need to use letter to the history Breath is selected, which is sent to which history use information of the account management server, the account management service Which history use information device is based on, and generates authentication request message.
In addition, in alternatively possible implementation, as described in implementation (2) in step 201, when the history uses When information further includes safe class mark, which selects and the security level mark from the history use information Know corresponding target use information, the history use information which verifies needed for being used to indicate is based on the target Use information generates the authentication request message.
Wherein, it is based on the target use information, the implementation for generating authentication request message is based on history with above-mentioned Use information, the implementation for generating authentication request message similarly, are not detailed herein.
In step 203, which, which is sent to the authentication request message, currently triggers the identity The user terminal of verifying event.
In step 204, which receives authentication request message, and the identity is shown in current display interface Checking request message.
The authentication request message is sent to the user terminal by the account management server, and correspondingly, the user is whole After termination receives the authentication request message, the authentication request message is shown in current display interface, so that user Information relevant to history use information can be filled in or selected based on shown authentication request message.
For example, in one possible implementation, which can be shown as such as Fig. 2 C (1) institute Show, when the authentication request message is to be based on above-mentioned partial information by the account management server to generate, the display interface It is middle to show the partial information 24 carried in the authentication request message, and further include having input reminder item in the display interface 25, which is corresponding with input frame 26, and user can input in the history use information in the input frame 26 and remove Other information except above-mentioned partial information, later, which can click the confirmation option 27.
For another example, in alternatively possible implementation, which can be shown as such as Fig. 2 C (2) institute Show, when the authentication request message is to be based on above-mentioned telephone number by the account management server to generate, the display interface It is middle to show all telephone numbers for carrying in the authentication request message, and prompt shown in showing just like in figure 281: it please select The telephone number of good friend is selected, and each telephone number is corresponding with an option 282 in all telephone numbers, user can be from In shown multiple telephone numbers, the telephone number of the good friend of oneself is selected, that is, the telephone number for clicking oneself good friend is corresponding Option 282, later, which can click the confirmation option 27.
For another example, in another possible implementation, which can be shown as shown in Figure 2 D, When the authentication request message is to be based on above-mentioned picture by the account management server to generate, display should in the display interface The picture 29 carried in authentication request message, and prompt the person names of user's input picture, i.e. the display interface provides Input frame 30, user can input the title of personage in the picture in the input frame 30, and later, which can click this Confirm option 27.
In step 205, authentication response instruction is received when the user terminal is based on the authentication request message When, it is based on the verification information, generates authentication response message, and the authentication response message is sent to the account management Server.
Wherein, authentication response instruction can be triggered by user, which can be triggered by above-mentioned specified operation. For example, as shown in Figure 2 C, after the user clicks the confirmation option 27, user terminal confirmation receives authentication response Instruction, the information and the partial information which is inputted based on the user generate the authentication response message.
In step 206, account management server, which is worked as, receives the user terminal based on authentication request message hair When the authentication response message sent, based on the authentication response message and the history use information, identity information is carried out Verifying.
Wherein, the content for including according to the history use information is different, based on the authentication response message and the history Use information, the realization process verified to identity information may include following any:
First way: obtaining the first verification information carried in the authentication response message, first verification information Including at least the partial information, when first verification information is identical as the history use information, determine that the identity information is verified Pass through, when first verification information and the history use information be not identical, determines that identity information verifying does not pass through.
It is that implementation (1) is corresponding in the first implementation and above-mentioned steps 202, for example, if the history makes It is shipping address information with information, and the shipping address information is No. 16 Bank of New York buildings in New York Wall Street Building A, part letter Breath is New York Wall Street xx Bank of New York building x, then when first verification information is the Bank of New York of New York Wall Street 16 When building Building A, determine that the identity information is verified, and when first verification information is that the Bank of New York of New York Wall Street 23 is big When building Building B, determine that identity information verifying does not pass through.
It should be noted that above-mentioned first verification information include at least the partial information be only it is exemplary, in another implementation In example, which can also only include the other information in the history use information other than the partial information, In this case, after which receives first verification information, judge first verification information and be somebody's turn to do Whether the other information in history use information other than the partial information is identical, if first verification information and the history Other information in use information other than the partial information is identical, it is determined that the identity information of the user is verified, no Then, it is determined that the identity information verifying of the user does not pass through, and the embodiment of the present disclosure does not limit this.
The second way: obtaining the second verification information carried in the authentication response message, when the second verifying letter When ceasing identical as the telephone number, determine that the identity information is verified, when second verification information and the telephone number not phase Meanwhile determining that identity information verifying does not pass through.
The second way is corresponding with implementation (2) in above-mentioned steps 202, when second verification information and the phone Number is identical, illustrates that the user can be added in the multiple telephone numbers obscured from this, selects the electricity of to one's name good friend Number is talked about, that is to say, can determine that the identity information of the user is the corresponding identity information of the account information, account management clothes Business device determines that the identity information of the user is verified.
Be exemplified as example with above-mentioned, which includes telephone number 138xxxx5608,136xxxx3507 and 184xxxx9561 is determined when second verification information includes 138xxxx5608,136xxxx3507 and 184xxxx9561 The identity information of the user is verified, when second verification information includes 138xxxx75608,135xxxx3507 and When 184xxxx3561, determine that the identity information verifying of the user does not pass through.
The third mode: obtaining the third verification information carried in the authentication response message, verifies and believes when the third When ceasing identical as the pictorial information, determine that the identity information is verified, when the third verification information and the pictorial information not phase Meanwhile determining that identity information verifying does not pass through.
It is exemplified as example with above-mentioned, the pictorial information in the history use information is " jony ", when the third verification information is It when " jony ", determines that the identity information of the user is verified, when the third verification information is " honiey ", determines the user Identity information verifying do not pass through.
It should be noted that the embodiment of the present disclosure be only in a manner of above-mentioned three kinds, based on the authentication response message and The history use information, is illustrated for verifying to identity information, in another embodiment, can also pass through other sides Formula is verified identity information, the embodiment of the present disclosure is to this based on the authentication response message and the history use information Without limitation.
So far, the embodiment of the present disclosure realizes the identity information verification method, in addition, in actual application, it may Due to input fault etc., the information of user input for the first time may be wrong, in this case, if it is determined that the user Identity information authentication failed, may make troubles to user.Therefore, for this kind of situation, the embodiment of the present disclosure is also provided Following steps 207 and step 208.
In step 207, which retransmits the authentication request message, and should to retransmitting The number of authentication request message is counted.
After the identity information for determining the user, which is verified, not to be passed through, in order to avoid being verified caused by the fault as the user Do not pass through, which sends authentication request message to the terminal again, so that the user can fill out again Write or select corresponding information.
In addition, illustrating that the user may not be all of the user account when the information of user's input is incorrect always Person, therefore, for the safety of the user account, the server also to retransmit the number of the authentication request message into Row statistics.
In a step 208, the account management server when retransmit the authentication request message number be greater than or When equal to preset threshold, stop retransmitting the authentication request message.
Wherein, which can also be taken by user's customized setting according to actual needs by the account management Business device default setting, the embodiment of the present disclosure do not limit this.
When the number for retransmitting the authentication request message is greater than or equal to preset threshold, it can determine the use Family is not the owner of the user account, i.e., the user does not have the permission using the user account, alternatively, the user does not also have There is the permission for modifying the user account password, therefore, account management server stopping retransmits the authentication request and disappears Breath, that is, determine the identity information authentication failed of the user.
In the embodiments of the present disclosure, when server detects that the Authentication Events of user account are triggered, illustrate to need The identity information of the user is verified, which obtains the user account and carry out network operation before current time When used history use information, that is to say, which is used when being the daily carry out network operation of the user Information, for example, the history use information can be for shipping address etc., which is based on the history use information, generates body The authentication request message is sent to the user terminal by part checking request message later, so that the user can be based on the body Part checking request message, fills in or selects information relevant to the historical user information, and later, which passes through the user terminal The information filled in or selected is sent to the server, i.e., the user terminal sends authentication response to the server and disappears Breath, the authentication response message carry the information that the user fills in or selects, which is based on the user and fills in or select Information, the identity information of the user is verified, when due to the history use information being the daily carry out network operation of user Used information therefore, there is no need to user and purposely remember, avoids user and is easy the case where forgetting, provides for user It is convenient.
Fig. 3 A is a kind of identity information verifying device shown according to an exemplary embodiment.The identity information verifies device Can being implemented in combination with by software, hardware or both, the identity information verifying device include:
Module 310 is obtained, for obtaining the user account when the Authentication Events for detecting user account are triggered History use information, the history use information be the user account carried out before current time it is used when network operation Information;
Generation module 320, the history use information for being obtained based on the acquisition module 310 are generated authentication and asked Seek message;
Sending module 330, the authentication request message for generating the generation module 320 are sent to current triggering The user terminal of the Authentication Events;
Authentication module 340 is tested for that ought receive the identity that the user terminal is sent based on the authentication request message When demonstrate,proving response message, based on the authentication response message and the history use information, identity information is verified.
Optionally, Fig. 3 B to Fig. 3 C is please referred to, which is used for:
Information acquisition request is sent to data server, which carries the user account, the acquisition of information Request is used to indicate the history use information that the data server obtains and returns to the user account;
Receive the history use information of data server transmission.
Optionally, which is used for:
According to specified strategy, the partial information in the history use information is obtained;
Based on the partial information, the first checking request message is generated, which, which is used to indicate, is based on being somebody's turn to do Partial information supplements the other information in the history use information other than the partial information;
The first checking request message is determined as the authentication request message.
Optionally, which is also used to:
When the history use information is telephone number, multiple telephone numbers are added at random in the history use information;
Based on the history use information after addition, the second checking request message is generated, which is used for The history use information is selected in instruction from the history use information after addition;
The second checking request message is determined as the authentication request message.
Optionally, which is also used to:
When in the history use information including the pictorial information of picture and the picture, third verifying is generated based on the picture Request message, the third checking request message are used to indicate the pictorial information for filling in the picture;
The third checking request message is determined as the authentication request message.
Optionally, which is also used to:
When the history use information further includes safe class mark, selection and the safety etc. from the history use information Grade identifies corresponding target use information, the history use information which verifies needed for being used to indicate;
Based on the target use information, the authentication request message is generated.
Optionally, which is used for:
The first verification information carried in the authentication response message is obtained, which includes at least the portion Divide information;
When first verification information is identical as the history use information, determine that the identity information is verified;
When first verification information and the history use information be not identical, determine that identity information verifying does not pass through.
Optionally, which is also used to:
Obtain the second verification information carried in the authentication response message;
When second verification information is identical as the telephone number, determine that the identity information is verified;
When second verification information and the telephone number be not identical, determine that identity information verifying does not pass through.
Optionally, which is also used to:
Obtain the third verification information carried in the authentication response message;
When the third verification information is identical as the pictorial information, determine that the identity information is verified;
When the third verification information and the pictorial information be not identical, determine that identity information verifying does not pass through.
Optionally, the device further include:
Statistical module 350, for retransmitting the authentication request message, and to the retransmission authentication request The number of message is counted;
Stopping modular 360, for being greater than or equal to preset threshold when the number for retransmitting the authentication request message When, stop retransmitting the authentication request message.
Optionally, which further includes trigger module 370, which is used for:
When detecting that the user account and the unmatched number of password reach preset times, the body of the user account is triggered Part verifying event;Or
When receiving Modify password request, the Authentication Events of the user account are triggered.
In the embodiments of the present disclosure, when server detects that the Authentication Events of user account are triggered, illustrate to need The identity information of the user is verified, which obtains the user account and carry out network operation before current time When used history use information, that is to say, which is used when being the daily carry out network operation of the user Information, for example, the history use information can be for shipping address etc., which is based on the history use information, generates body The authentication request message is sent to the user terminal by part checking request message later, is tested when the server is based on the identity When card request message receives the authentication response message of user terminal transmission, which is responded based on the authentication Message verifies the identity information of the user, since the history use information is the daily carry out network operation when institute of user The information used therefore, there is no need to user and purposely remember, avoids user and is easy the case where forgetting, for the user side of providing Just.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 4 is a kind of block diagram of identity information verifying device 400 shown according to an exemplary embodiment.For example, device 400 may be provided as an account management server.Referring to Fig. 4, it further comprises one that device 400, which includes processing component 422, A or multiple processors, and the memory resource as representated by memory 432, can holding by processing component 422 for storing Capable instruction, such as application program.The application program stored in memory 432 may include it is one or more each Module corresponding to one group of instruction.In addition, processing component 422 is configured as executing instruction, to execute above-mentioned identity information verifying Method.
Device 400 can also include the power management that a power supply module 426 is configured as executive device 400, and one has Line or radio network interface 450 are configured as device 400 being connected to network and input and output (I/O) interface 458.Dress Setting 400 can operate based on the operating system for being stored in memory 432, such as Windows ServerTM, Mac OS XTM, UnixTM,LinuxTM, FreeBSDTMOr it is similar.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (21)

1. a kind of identity information verification method, which is characterized in that the described method includes:
When the Authentication Events for detecting user account are triggered, the history of the user account is obtained from data server Use information, the history use information are that the user account carries out used letter when network operation before current time Breath;
When the history use information further includes safe class mark, selection and the safety from the history use information The corresponding target use information of class letter, the history use information that the safe class mark is verified needed for being used to indicate, institute The safe class mark that safe class mark is the data server itself is stated, for different data server, verifying is believed Ceasing has different security level requirements;
Based on the target use information, the authentication request message is generated;
The authentication request message is sent to the user terminal for currently triggering the Authentication Events;
When receiving the authentication response message that the user terminal is sent based on the authentication request message, it is based on The authentication response message and the history use information, verify identity information;
Wherein, the verifying grade of telephone number is higher than the verifying grade of shipping address information.
2. the method as described in claim 1, which is characterized in that the history use information for obtaining the user account, packet It includes:
Information acquisition request is sent to the data server, the information acquisition request carries the user account, the letter Breath acquisition request is used to indicate the history use information that the data server obtains and returns to the user account;
Receive the history use information that the data server is sent.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
According to specified strategy, the partial information in the history use information is obtained;
Based on the partial information, the first checking request message is generated, the first checking request message is used to indicate based on institute Partial information is stated to supplement the other information in the history use information other than the partial information;
The first checking request message is determined as the authentication request message.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
When the history use information is telephone number, multiple telephone numbers are added at random in the history use information;
Based on the history use information after addition, the second checking request message is generated, the second checking request message is for referring to Show and selects the history use information from the history use information after addition;
The second checking request message is determined as the authentication request message.
5. method according to claim 1 or 2, which is characterized in that the method also includes:
When in the history use information including the pictorial information of picture and the picture, third is generated based on the picture and is tested Request message is demonstrate,proved, the third checking request message is used to indicate the pictorial information for filling in the picture;
The third checking request message is determined as the authentication request message.
6. method as claimed in claim 3, which is characterized in that described to be based on the authentication response message and the history Use information verifies identity information, comprising:
The first verification information carried in the authentication response message is obtained, first verification information includes at least described Partial information;
When first verification information is identical as the history use information, determine that the identity information is verified;
When first verification information and the history use information be not identical, determine that the identity information verifying does not pass through.
7. method as claimed in claim 4, which is characterized in that described to be based on the authentication response message and the history Use information verifies identity information, comprising:
Obtain the second verification information carried in the authentication response message;
When second verification information is identical as the telephone number, determine that the identity information is verified;
When second verification information and the telephone number be not identical, determine that the identity information verifying does not pass through.
8. method as claimed in claim 5, which is characterized in that described to be based on the authentication response message and the history Use information verifies identity information, comprising:
Obtain the third verification information carried in the authentication response message;
When the third verification information is identical as the pictorial information, determine that the identity information is verified;
When the third verification information and the pictorial information be not identical, determine that the identity information verifying does not pass through.
9. such as method as claimed in claim 6 to 8, which is characterized in that the determination identity information verifying does not pass through it Afterwards, further includes:
The authentication request message is retransmitted, and is united to the number for retransmitting the authentication request message Meter;
When the number for retransmitting the authentication request message is greater than or equal to preset threshold, stop described in retransmission Authentication request message.
10. the method as described in claim 1, which is characterized in that before the history use information for obtaining the user account, also Include:
When detecting that the user account and the unmatched number of password reach preset times, the body of the user account is triggered Part verifying event;Or
When receiving Modify password request, the Authentication Events of the user account are triggered.
11. a kind of identity information verifies device, which is characterized in that described device includes:
Obtain module, for when the Authentication Events for detecting user account are triggered, obtain from data server described in The history use information of user account, the history use information are that the user account carries out network behaviour before current time Used information when making;
Generation module, for when the history use information further includes safe class mark, from the history use information That verifies needed for selecting target use information corresponding with the safe class mark, the safe class mark to be used to indicate goes through History use information, the safe class mark are the safe class marks of the data server itself, and different data is taken Business device has different security level requirements to verification information;
Based on the target use information, the authentication request message is generated;
Sending module, the authentication request message for generating the generation module, which is sent to, currently triggers the body The user terminal of part verifying event;
Authentication module, for working as the authentication sound for receiving the user terminal and sending based on the authentication request message When answering message, it is based on the authentication response message and the history use information, identity information is verified;
Wherein, the verifying grade of telephone number is higher than the verifying grade of shipping address information.
12. device as claimed in claim 11, which is characterized in that the acquisition module is used for:
Information acquisition request is sent to the data server, the information acquisition request carries the user account, the letter Breath acquisition request is used to indicate the history use information that the data server obtains and returns to the user account;
Receive the history use information that the data server is sent.
13. the device as described in claim 11 or 12, which is characterized in that the generation module is also used to:
According to specified strategy, the partial information in the history use information is obtained;
Based on the partial information, the first checking request message is generated, the first checking request message is used to indicate based on institute Partial information is stated to supplement the other information in the history use information other than the partial information;
The first checking request message is determined as the authentication request message.
14. the device as described in claim 11 or 12, which is characterized in that the generation module is also used to:
When the history use information is telephone number, multiple telephone numbers are added at random in the history use information;
Based on the history use information after the addition, the second checking request message is generated, the second checking request message is used The history use information is selected from the history use information after addition in instruction;
The second checking request message is determined as the authentication request message.
15. the device as described in claim 11 or 12, which is characterized in that the generation module is also used to:
When in the history use information including the pictorial information of picture and the picture, third is generated based on the picture and is tested Request message is demonstrate,proved, the third checking request message is used to indicate the pictorial information for filling in the picture;
The third checking request message is determined as the authentication request message.
16. device as claimed in claim 13, which is characterized in that the authentication module is used for:
The first verification information carried in the authentication response message is obtained, first verification information includes at least described Partial information;
When first verification information is identical as the history use information, determine that the identity information is verified;
When first verification information and the history use information be not identical, determine that the identity information verifying does not pass through.
17. device as claimed in claim 14, which is characterized in that the authentication module is also used to:
Obtain the second verification information carried in the authentication response message;
When second verification information is identical as the telephone number, determine that the identity information is verified;
When second verification information and the telephone number be not identical, determine that the identity information verifying does not pass through.
18. device as claimed in claim 15, which is characterized in that the authentication module is also used to:
Obtain the third verification information carried in the authentication response message;
When the third verification information is identical as the pictorial information, determine that the identity information is verified;
When the third verification information and the pictorial information be not identical, determine that the identity information verifying does not pass through.
19. the device as described in claim 16-18 is any, which is characterized in that described device further include:
Statistical module disappears for retransmitting the authentication request message, and to the authentication request is retransmitted The number of breath is counted;
Stopping modular, for stopping when the number for retransmitting the authentication request message is greater than or equal to preset threshold Only retransmit the authentication request message.
20. device as claimed in claim 11, which is characterized in that described device further includes trigger module, the trigger module For:
When detecting that the user account and the unmatched number of password reach preset times, the body of the user account is triggered Part verifying event;Or
When receiving Modify password request, the Authentication Events of the user account are triggered.
21. a kind of identity information verifies device, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
When the Authentication Events for detecting user account are triggered, the history of the user account is obtained from data server Use information, the history use information are that the user account carries out used letter when network operation before current time Breath;
When the history use information further includes safe class mark, selection and the safety from the history use information The corresponding target use information of class letter, the history use information that the safe class mark is verified needed for being used to indicate, institute The safe class mark that safe class mark is the data server itself is stated, for different data server, verifying is believed Ceasing has different security level requirements;
Based on the target use information, the authentication request message is generated;
The authentication request message is sent to the user terminal for currently triggering the Authentication Events;
When receiving the authentication response message that the user terminal is sent based on the authentication request message, it is based on The authentication response message and the history use information, verify identity information;
Wherein, the verifying grade of telephone number is higher than the verifying grade of shipping address information.
CN201610901831.5A 2016-10-17 2016-10-17 Identity information verification method and device Active CN106506459B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610901831.5A CN106506459B (en) 2016-10-17 2016-10-17 Identity information verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610901831.5A CN106506459B (en) 2016-10-17 2016-10-17 Identity information verification method and device

Publications (2)

Publication Number Publication Date
CN106506459A CN106506459A (en) 2017-03-15
CN106506459B true CN106506459B (en) 2019-08-30

Family

ID=58294443

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610901831.5A Active CN106506459B (en) 2016-10-17 2016-10-17 Identity information verification method and device

Country Status (1)

Country Link
CN (1) CN106506459B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106888223B (en) * 2017-04-26 2020-04-17 维沃移动通信有限公司 User account login method and mobile terminal
CN107172053A (en) * 2017-05-26 2017-09-15 河南职业技术学院 The method of controlling security and safety control of computer
CN108183924A (en) * 2018-03-01 2018-06-19 深圳市买买提信息科技有限公司 A kind of login validation method and terminal device
CN110769013A (en) * 2018-07-26 2020-02-07 国信优易数据有限公司 User dynamic recording method, user identity authentication method and device
CN111163049B (en) * 2019-11-26 2022-02-25 全球创新网络香港有限公司 Platform docking and authentication method and system
CN111224865B (en) * 2020-04-23 2022-11-01 深圳市爱聊科技有限公司 User identification method based on payment session, electronic device and storage medium
CN112016067A (en) * 2020-08-14 2020-12-01 支付宝(杭州)信息技术有限公司 User identity verification method and device
CN117171724A (en) * 2023-08-16 2023-12-05 安徽悠扬互联科技有限公司 Enterprise information management method and system based on digitization

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103944737A (en) * 2014-05-06 2014-07-23 中国联合网络通信集团有限公司 User identity authentication method, third-party authentication platform and operator authentication platform
CN104751032A (en) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 Authentication method and authentication device
CN104811428A (en) * 2014-01-28 2015-07-29 阿里巴巴集团控股有限公司 Method, device and system for verifying client identity by social relation data
CN105099675A (en) * 2014-04-17 2015-11-25 阿里巴巴集团控股有限公司 Method and device for generating authentication data for identity authentication and method and device for identity authentication
CN105553947A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Methods and devices for finding account back, protecting account security and preventing account theft

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751032A (en) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 Authentication method and authentication device
CN104811428A (en) * 2014-01-28 2015-07-29 阿里巴巴集团控股有限公司 Method, device and system for verifying client identity by social relation data
CN105099675A (en) * 2014-04-17 2015-11-25 阿里巴巴集团控股有限公司 Method and device for generating authentication data for identity authentication and method and device for identity authentication
CN103944737A (en) * 2014-05-06 2014-07-23 中国联合网络通信集团有限公司 User identity authentication method, third-party authentication platform and operator authentication platform
CN105553947A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Methods and devices for finding account back, protecting account security and preventing account theft

Also Published As

Publication number Publication date
CN106506459A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN106506459B (en) Identity information verification method and device
AU2020203752B2 (en) Authentication of service requests initiated from a social networking site
US9967245B2 (en) User authentication using unique hidden identifiers
CN109587044B (en) Group creation and message interaction method and device
US10306002B2 (en) Must-reply mobile questionnaire system and method
EP2193495A1 (en) Dynamic instant comments
CN105357110B (en) E-mail sending method, apparatus and system
US11120409B1 (en) Calendar comparison system and method
CN108337210A (en) Equipment configuration method and device, system
US9081945B2 (en) Information processing device and method
US20140035741A1 (en) Security Alarm Systems and Methods
CN109586930A (en) Participant user adding method, first terminal, second terminal and processing server
CN109995748A (en) A kind of identifying code processing method, equipment and system
EP2538349A2 (en) Server, inter-business enterprise information control method and computer program
CN109218389A (en) The method, apparatus and storage medium and electronic equipment of processing business request
CN111147348B (en) Instant message sending method, device and readable medium
CN103970814A (en) Indicating Organization Of Visitor On User Interface Of User Engaged In Collaborative Activity With Visitor
CN103927680B (en) The shipping order sending method and device of a kind of network application dependent merchandise
CN104270357A (en) Service information sending method and device
CN105721274B (en) The fusion method and device of one kind of multiple instant messagings
CN103209113A (en) Method, facility, device and system for transmitting and receiving content information
JP6999056B2 (en) Message management device and message management method
CN110912883A (en) Instant messaging method, device, equipment and system
CN106230778A (en) A kind of tele-control system
KR20120069318A (en) Automatic creating method of group application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant