CN106534041B - Verification method, verification platform and client - Google Patents

Verification method, verification platform and client Download PDF

Info

Publication number
CN106534041B
CN106534041B CN201510570808.8A CN201510570808A CN106534041B CN 106534041 B CN106534041 B CN 106534041B CN 201510570808 A CN201510570808 A CN 201510570808A CN 106534041 B CN106534041 B CN 106534041B
Authority
CN
China
Prior art keywords
verification
user
authentication
social
assisting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510570808.8A
Other languages
Chinese (zh)
Other versions
CN106534041A (en
Inventor
朱晨鸣
何瑞
占学良
陈龙辉
宗旋
陈妍蓉
董梁
张彦玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510570808.8A priority Critical patent/CN106534041B/en
Publication of CN106534041A publication Critical patent/CN106534041A/en
Application granted granted Critical
Publication of CN106534041B publication Critical patent/CN106534041B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs

Abstract

The embodiment of the invention discloses a verification method, a verification platform and a client, wherein the method comprises the following steps: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements; sending an authentication assistance request to the authentication assistance user; receiving authentication information returned by the authentication assisting user based on the authentication assisting request; sending at least part of the verification information to a user to be verified; receiving authentication feedback formed by the authentication user based on the authentication information; determining whether the authentication is passed based on the authentication feedback.

Description

Verification method, verification platform and client
Technical Field
The present invention relates to the field of information technologies, and in particular, to a verification method, a verification platform, and a client.
Background
With the rise of the development of information technology, people utilize networks to realize social contact, consume, learn and manage money. However, these network activities usually involve verification of a lot of information, such as user authentication, and so on. In the prior art, authentication is generally performed, and an authentication key and the like are generally input for a user. Generally, the verification method is rather inflexible, and once the verification question and the verification answer are set, the verification question and the verification answer are generally static if the verification question and the verification answer are not specially set and changed. In this way, an illegal user can steal the verification key by adopting technical means such as violence verification and the like; and thus the safety is low. Meanwhile, once the verification key of the legal user is stolen, the illegal user can also pass the verification by using the verification key. If the legitimate user forgets the verification key, the verification key may be found through a complicated process, and obviously, the legitimate user must remember the verification key of the legitimate user, otherwise, the legitimate user may fail the verification, or the verification process is very troublesome.
Disclosure of Invention
In view of this, embodiments of the present invention are expected to provide an authentication method, an authentication platform, and a client, which can improve the security of authentication.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a first aspect of an embodiment of the present invention provides a verification method, where the method includes:
selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
sending an authentication assistance request to the authentication assistance user;
receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
sending at least part of the verification information to a user to be verified;
receiving authentication feedback formed by the authentication user based on the authentication information;
determining whether the authentication is passed based on the authentication feedback.
Based on the scheme, the verification information comprises a verification question and a verification answer; the authentication problem is authentication information to be sent to a user to be authenticated;
the determining whether authentication is passed based on the authentication feedback includes:
checking the verification feedback and the verification answer to form a checking result;
and if the verification result meets the verification passing condition, determining that the verification passes.
Based on the scheme, the verification information comprises a verification problem;
the determining whether authentication is passed based on the authentication feedback includes:
sending the verification feedback to the verification assisting user;
receiving the assistance verification for a verification evaluation given based on the verification feedback;
determining whether the authentication is passed based on the authentication evaluation.
Based on the scheme, the verification information comprises a verification problem; wherein the verification question comprises a verification question selected from a preset verification question bank.
Based on the above scheme, the method further comprises:
sending an alternative authentication question forming the authentication information to the authentication assisting user.
Based on the above scheme, the selecting at least one verification assisting user from the social relationships of the users to be verified based on the verification requirement includes:
extracting social attributes and/or user attributes of all social users in the social relationship of the user to be verified based on a selection strategy;
and selecting the social users meeting the selection requirements in the selection strategy as the verification assisting users based on the social attributes and/or the user attributes.
Based on the above scheme, the selecting, based on the social attributes and/or the user attributes, the social user that meets the selection requirement in the selection policy as the verification assisting user includes:
selecting the social users meeting the selection requirement as alternative users based on the social attributes and/or user attributes;
sending the alternative user to the user to be verified;
receiving a selection indication formed by the user to be verified based on the alternative user;
determining the verification assisting user based on the selection indication.
Based on the above scheme, the selecting, based on the social attributes and/or the user attributes, the social user that meets the selection requirement in the selection policy as the verification assisting user includes:
assigning a scoring value to the social attribute and/or the user attribute according to the selection strategy;
determining the scoring weight of the social attribute and/or the user attribute;
determining a function value representing verification reliability based on the score value and the score weight value;
determining the verification assisting user based on the function value.
A second aspect of the embodiments of the present invention provides a verification method, where the method includes:
receiving at least part of the authentication information formed by the authentication assisting user from the authentication platform;
outputting the verification information received from the verification platform;
forming verification feedback based on the verification information and user indication;
sending the feedback to the verification platform; wherein the verification feedback is used for the verification platform to determine whether verification is passed.
Based on the above scheme, the method further comprises:
selecting a social user from the social relationship as an authentication assisting user;
and sending the information of the verification assisting user to a verification platform.
A third aspect of the embodiments of the present invention provides a verification method, where the method includes:
receiving a verification assistance request sent by a verification platform to assist a user to be verified in verification;
forming authentication information in response to the authentication assistance request based on a user indication; the verification information is used for the verification platform to verify the user to be verified;
and sending the verification information to the verification platform.
Based on the scheme, the verification information comprises a verification question and a verification answer.
Based on the above scheme, the method further comprises:
receiving verification feedback forwarded by the verification platform;
outputting verification feedback;
determining a verification evaluation for the verification feedback based on a user indication;
sending the verification evaluation to the verification platform.
A fourth aspect of the embodiments of the present invention provides a verification platform, where the verification platform includes:
the selection unit is used for selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
a first sending unit, configured to send an authentication assistance request to the authentication assistance user;
a first receiving unit, configured to receive authentication information returned by the authentication assisting user based on the authentication assisting request;
the second sending unit is used for sending at least part of the verification information to a user to be verified;
a second receiving unit configured to receive authentication feedback formed by the authenticated user based on the authentication information;
an authentication unit to determine whether authentication is passed based on the authentication feedback.
Based on the scheme, the verification information comprises a verification question and a verification answer; the authentication problem is authentication information to be sent to a user to be authenticated;
the verification unit is specifically used for verifying the verification feedback and the verification answer to form a verification result; and if the verification result meets the verification passing condition, determining that the verification passes.
Based on the scheme, the verification information comprises a verification problem;
the verification platform is specifically configured to send the verification feedback to the verification assisting user; receiving the assistance verification for a verification evaluation given based on the verification feedback; determining whether the authentication is passed based on the authentication evaluation.
Based on the above scheme, the selecting unit includes:
the extraction module is used for extracting social attributes and/or user attributes of all social users in the social relationship of the user to be verified based on a selection strategy;
and the selection module is used for selecting the social users meeting the selection requirements in the selection strategy as verification assisting users based on the social attributes and/or the user attributes.
Based on the above scheme, the selection module is specifically configured to select, based on the social attributes and/or the user attributes, a social user that meets the selection requirement as a candidate user; sending the alternative user to the user to be verified; receiving a selection indication formed by the user to be verified based on the alternative user; determining the verification assisting user based on the selection indication.
Based on the scheme, the selection module is specifically configured to assign a score value to the social attribute and/or the user attribute according to the selection policy; determining the scoring weight of the social attribute and/or the user attribute; determining a function value representing verification reliability based on the score value and the score weight value; determining the verification assisting user based on the function value.
A fifth aspect of an embodiment of the present invention provides a client, where the client includes:
a third receiving unit, configured to receive at least part of the authentication information formed by the authentication assisting user from the authentication platform;
an output unit for outputting the authentication information received from the authentication platform;
a forming unit, configured to form an authentication feedback based on the authentication information and a user instruction;
a third sending unit, configured to send the feedback to the verification platform; wherein the verification feedback is used for the verification platform to determine whether verification is passed.
A sixth aspect of the present embodiment provides a client, where the client includes:
the fourth receiving unit is used for receiving an authentication assisting request which is sent by the authentication platform and used for assisting the user to be authenticated in authentication;
a response unit for forming authentication information responding to the authentication assistance request based on a user indication; the verification information is used for the verification platform to verify the user to be verified;
and the fourth sending unit is used for sending the verification information to the verification platform.
According to the verification method, the verification platform and the client, when verification is carried out, the verification assisting user is dynamically determined, and the verification assisting user provides verification information for verification, so that the verification information is formed dynamically, and the problem of low verification safety caused by the fact that an illegal user steals static verification information is solved. Meanwhile, the user to be verified does not need to memorize the verification key, verification troubles caused by theft or forgetting of the verification key can be avoided, and the user verification satisfaction degree is improved.
Drawings
Fig. 1 is a schematic flowchart of a first verification method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of determining whether verification passes based on verification feedback according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a second verification method according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of another process for determining whether to pass verification based on verification feedback according to an embodiment of the present invention;
fig. 5 is a schematic flowchart of a third verification method according to an embodiment of the present invention;
fig. 6 is a schematic flowchart of a fourth verification method according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of a first verification platform according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a first client according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a second client according to an embodiment of the present invention;
fig. 10 is a schematic flowchart of a fifth verification method according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a second verification platform according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail with reference to the drawings and the specific embodiments of the specification.
The first embodiment of the method comprises the following steps:
as shown in fig. 1, the present embodiment provides a verification method, including:
step S110: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
step S120: sending an authentication assistance request to the authentication assistance user;
step S130: receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
step S140: sending at least part of the verification information to a user to be verified;
step S150: receiving authentication feedback formed by the authentication user based on the authentication information;
step S160: determining whether the authentication is passed based on the authentication feedback.
The verification method described in this embodiment may be applied to a verification platform, where the verification platform may be a wechat service platform, a QQ service platform, a financial and payment platform, a credit platform, or a treasury payment platform. In this embodiment, the user to be authenticated and the authentication assisting user may be an account registered or rated on the authentication platform. For example, the user to be authenticated and the authentication assisting user can be QQ accounts registered in a QQ service platform.
The authentication requirement may be determined based on an authentication request sent by the user to be authenticated, or may be determined in response to other operations of the user. For example, a user borrows a request to a financial platform; the paymate platform generates a verification requirement for verifying the identity of the user at this time in determining whether to credit the user in response.
In step S110 of this embodiment, when there is a verification requirement, 1 or more users are selected from the social relationships of the user to assist the verification of the user at this time.
When the authentication assisting user is selected, the authentication platform sends an authentication assisting request to the authentication assisting user. Usually, the authentication assistance request may include identity information of the user to be authenticated, and the like. The request for verification assistance may also include the purpose of performing this verification, such as verifying loan to assist other users. The verification assisting request can also carry verification obligation and assistance verification operation information for prompting a verification assisting user.
If the assisting user is authenticated and the assisting authentication is agreed, the authentication platform will receive the authentication information provided by the assisting user in step S130. The authentication information typically includes at least authentication questions.
In this embodiment, at least a part of the verification information, for example, the verification question, is sent to the user to be verified in step S140. In this way, the authentication information is displayed on the user interface of the user to be authenticated. The user to be authenticated can form the authentication feedback through the problem to be authenticated.
In step S150, the verification platform receives the reported verification feedback from the user to be verified, and finally determines whether the verification is passed based on the verification feedback in step S160.
Obviously, in the authentication method described in this embodiment, the authentication information is formed based on the social users in the social relationship of the user to be authenticated, and the social users may have a friend relationship, a colleague relationship, a classmate relationship, a teacher-student relationship, or the like with the user to be authenticated. The authentication assisting users may ask authentication questions that they only know themselves, and when the answer provided in the authentication feedback is correct, may be considered to pass the authentication, or the like.
Obviously, the verification information and the verification answer are dynamically formed in the process, an illegal user is difficult to steal in a mode of multiple attempts by using technologies such as network violence and the like, the safety is obviously greatly improved, the legal user does not need to remember the verification key, and the use satisfaction degree of the user is improved.
In a specific implementation, the verification platform further forms a verification record, which may include one or more of the following information:
the user information to be verified comprises information such as an identifier of the user to be verified;
verifying the information of the assisted user, wherein the information comprises the identification and other information of the user to be verified;
verifying the information;
verifying the feedback;
verifying the time;
information such as rights, obligations and commitments of the three parties participating in the verification; the three parties participating in the verification comprise a user to be verified, a verification assisting user and a verification platform;
verifying the use; and the verification purpose indicates that the user to be verified can obtain information such as authorization and the like after the verification is passed.
Through the information recorded by the verification, the follow-up verification participating parties can conveniently check the information, and the divergence and dispute in the verification process or caused by the verification are solved.
The second method embodiment:
as shown in fig. 1, the present embodiment provides a verification method, including:
step S110: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
step S120: sending an authentication assistance request to the authentication assistance user;
step S130: receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
step S140: sending at least part of the verification information to a user to be verified;
step S150: receiving authentication feedback formed by the authentication user based on the authentication information;
step S160: determining whether the authentication is passed based on the authentication feedback.
The verification information comprises a verification question and a verification answer; the authentication problem is authentication information to be sent to a user to be authenticated;
the step S150 includes:
checking the verification feedback and the verification answer to form a checking result;
and if the verification result meets the verification passing condition, determining that the verification passes.
In this embodiment, the verification assisting user can submit the verification question and the verification feedback to the verification platform at one time through the verification information, so that the verification platform can perform self-verification and verification after receiving the verification feedback, and finally determine whether the verification is passed according to the verification answer provided by the verification assisting user and the verification feedback provided by the user to be verified.
For example, the assisting user provides 10 authentication questions and answers to the 10 authentication questions, and if the verification is passed, it is determined that the authentication feedback of the user to be authenticated answers 9 of the authentication questions. According to the verification passing condition, if all verification problems are required to pass, the user to be verified does not pass verification, and if only 8 verification problem answers in 10 verification problems are required, the user to be verified passes verification.
The verification passing condition may be set for the verification platform or determined by the user to be verified. The authentication passing condition may be submitted to an authentication platform as part of the authentication information, or may be submitted to the authentication platform by the user to be authenticated through a dedicated message.
For example, when the user to be authenticated sets the authentication passing condition, it may also be specified that some authentication questions of the plurality of authentication questions must be correct to determine that the authentication passes.
In this embodiment, the verification information includes not only the verification question and the verification answer, so that the verification assisting user can complete the assisted verification by only sending the information to the verification platform once, thereby simplifying the operation of the verification assisting user and improving the user experience of the verification assisting user.
The third method embodiment:
as shown in fig. 1, the present embodiment provides a verification method, including:
step S110: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
step S120: sending an authentication assistance request to the authentication assistance user;
step S130: receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
step S140: sending at least part of the verification information to a user to be verified;
step S150: receiving authentication feedback formed by the authentication user based on the authentication information;
step S160: determining whether the authentication is passed based on the authentication feedback.
The verification information comprises a verification question;
as shown in fig. 2, the step S160 may include:
step S161: sending the verification feedback to the verification assisting user;
step S162: receiving the assistance verification for a verification evaluation given based on the verification feedback;
step S163: determining whether the authentication is passed based on the authentication evaluation.
In this embodiment, the step S160 can be divided into at least three sub-steps. The verification platform will send the verification feedback to the verification assisting user, and after receiving the verification feedback, the verification assisting user will give a verification evaluation, so that the verification assisting user does not need to form a verification answer in advance, and the verification platform does not need to receive the verification answer from the verification assisting user, and in step S163, the verification platform will determine whether the verification is passed directly according to the verification evaluation.
The verification evaluation here may be directly evaluation information of whether the verification is passed or not given by the verification assisting user, and may also include an evaluation parameter of whether the verification is passed or not which may be determined by the verification platform, such as an accuracy of verification feedback given by the verification assisting user.
For example, the authentication information given by authentication assisting user widget a is: please respond to my name and birthday information with a voice. The verification platform sends the verification information to the user B to be verified, receives verification feedback in a voice form from the user to be verified, and forwards the verification feedback in the voice form to the verification assisting user. After the small A listens the voice, evaluation can be given according to the voice content, and the small B of the social friend can be judged through the voice information. In the verification evaluation, the small a may directly give the user determination as small B, or may be: verifying that the question responds correctly. In short, the form of the verification evaluation is various, and information that can be used to assist the verification platform in verification is all possible, which is not necessarily exemplified here.
The authentication method can also perform authentication safely, quickly and simply.
The method comprises the following steps:
as shown in fig. 1, the present embodiment provides a verification method, including:
step S110: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
step S120: sending an authentication assistance request to the authentication assistance user;
step S130: receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
step S140: sending at least part of the verification information to a user to be verified;
step S150: receiving authentication feedback formed by the authentication user based on the authentication information;
step S160: determining whether the authentication is passed based on the authentication feedback.
The verification information comprises a verification question; wherein the verification question comprises a verification question selected from a preset verification question bank.
In this embodiment, the verification problem may be preset in the verification question bank, so that the verification assisting user can form the verification information more conveniently, and thus the verification speed of the user to be verified can be accelerated, and the verification delay can be reduced.
Method example five:
as shown in fig. 1, the present embodiment provides a verification method, including:
step S110: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
step S120: sending an authentication assistance request to the authentication assistance user;
step S130: receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
step S140: sending at least part of the verification information to a user to be verified;
step S150: receiving authentication feedback formed by the authentication user based on the authentication information;
step S160: determining whether the authentication is passed based on the authentication feedback.
The method further comprises the following steps:
sending an alternative authentication question forming the authentication information to the authentication assisting user.
In this embodiment, in order to help the verification assisting user to quickly form the verification information, in this embodiment, the verification platform further sends the alternative verification question to the verification assisting user. When sending the alternative verification problem, the method may include that entry information for acquiring the selected verification problem is carried in the verification assistance request, where the entry information may include information such as a web link; and after the verification assisting user performs corresponding operation on the entry information, the verification platform sends the alternative verification problem to the verification assisting user. Of course, the verification platform may also send the alternative verification question directly to the verification assisting user.
Of course, the authentication questions in the authentication information received in step S130 may all be from the alternative authentication questions, may also be authentication questions formed by the authentication assisting user through manual or voice input, and may also be from authentication questions pre-stored in the local client of the authentication assisting user.
In short, in this embodiment, the verification platform may simplify the operation of the verification assisting user by sending the alternative verification problem to the verification assisting user, so as to improve the user experience of the verification assisting user.
Method example six:
as shown in fig. 1, the present embodiment provides a verification method, including:
step S110: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
step S120: sending an authentication assistance request to the authentication assistance user;
step S130: receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
step S140: sending at least part of the verification information to a user to be verified;
step S150: receiving authentication feedback formed by the authentication user based on the authentication information;
step S160: determining whether the authentication is passed based on the authentication feedback.
As shown in fig. 3, the step S110 may include:
step S111: extracting social attributes and/or user attributes of all social users in the social relationship of the user to be verified based on a selection strategy;
step S112: and selecting the social users meeting the selection requirements in the selection strategy as the verification assisting users based on the social attributes and/or the user attributes.
In this embodiment, in the step S110, one or more authentication assisting users selected from the social relationships of the users to be authenticated are selected according to the selection policy to assist the authentication.
The social attributes may include the social frequency, the social relationship establishment time, the mutual information amount of each interaction, and the like of the user to be authenticated and each social user in the social relationship.
The user attributes may include personal attributes and behavior attributes of each social user in the social relationship of the user to be verified. For example, the personal attributes include user identity information, user occupation information, user social relationship network, hobbies, and the like. The behavior attribute may include information such as user consumption record information, user credit records, user-assisted authentication records, and other user or other platform evaluation records for the user.
The social contact attribute can reflect the social contact closeness between the user to be verified and the social contact user, and whether the verification such as identity verification or authentication verification is carried out on the user to be verified or not is supported by enough social relation.
The user attribute can characterize whether the user is a trusted person, which provides verification that the user attribute is sufficiently trusted.
Therefore, in the authentication method of the present embodiment, the information for selecting the authentication assisting user is extracted from at least the at least one dimension, and the authentication assisting user is determined based on the extracted information.
In step S112, the selection requirement may be specifically set for the verification platform according to the current verification requirement.
For example, in step S111, the social frequency of the user to be authenticated and the corresponding social user within a specified time is extracted, and in step S112: and comparing the social frequency with a preset frequency, and when the social frequency is greater than the preset frequency, the social user can be called as an authentication assisting user of the user to be authenticated.
As another example, in performing authentication, to prevent assisted authentication flooding, the authentication platform may specify that a social user can only provide authentication assistance for a limited number of other social users. At this time, in step S111, the assistance verification record of each social user in the social relationship of the user to be verified may be extracted, and the number of verified assistance users of each social user is determined; in step S112: and selecting the social users of which the number of verified assisted users does not reach the upper limit of the assisted verification as the verification assisted users of the current user to be verified.
For another example, when performing the verification, in order to ensure the reliability of the verification, for a social user with a poor credit record, the social user is prohibited or limited from being the verification-assisting user, then in step S110, the credit record of the social user in the social relationship of the user to be verified is extracted, and in step S112: social users with good or excellent credit record will be selected as the verification assisting users.
In short, the verification method provided by the embodiment is further limited to how to select the verification assisting user on the basis of the embodiment, and has the characteristics of simplicity and convenience in implementation and high feasibility.
Method embodiment seven:
as shown in fig. 1, the present embodiment provides a verification method, including:
step S110: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
step S120: sending an authentication assistance request to the authentication assistance user;
step S130: receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
step S140: sending at least part of the verification information to a user to be verified;
step S150: receiving authentication feedback formed by the authentication user based on the authentication information;
step S160: determining whether the authentication is passed based on the authentication feedback.
As shown in fig. 3, the step S110 may include:
step S111: extracting social attributes and/or user attributes of all social users in the social relationship of the user to be verified based on a selection strategy;
step S112: and selecting the social users meeting the selection requirements in the selection strategy as the verification assisting users based on the social attributes and/or the user attributes.
The step S112 may include:
selecting the social users meeting the selection requirement as alternative users based on the social attributes and/or user attributes;
sending the alternative user to the user to be verified;
receiving a selection indication formed by the user to be verified based on the alternative user;
determining the verification assisting user based on the selection indication.
When the verification is carried out, the user to be verified and the verification assisting user can interact information such as verification answers and the like through modes such as timely communication or mobile phone communication and the like. In order to facilitate the verification process and improve the use satisfaction of the user to be verified, in step S112 in this embodiment, first, a candidate user serving as the verification assisting user is determined based on at least one of the social attributes and the user attributes; and sending the selected user to the user to be verified for selection by the user to be verified. Of course, these registered users are all users meeting the selection requirements, and the credibility of the verification is ensured. Finally, in step S112, 1 or more verification-assisting users are determined according to the selection indication of the user to be verified.
The authentication method of the present embodiment is a further improvement on the basis of the previous embodiment, and in the present embodiment, the user to be authenticated also participates in the selection of the authentication assisting user, so that the participation degree and the authentication satisfaction degree of the user to be authenticated are improved.
The eighth embodiment of the method:
as shown in fig. 1, the present embodiment provides a verification method, including:
step S110: selecting at least one verification assisting user from the social relations of the users to be verified based on verification requirements;
step S120: sending an authentication assistance request to the authentication assistance user;
step S130: receiving authentication information returned by the authentication assisting user based on the authentication assisting request;
step S140: sending at least part of the verification information to a user to be verified;
step S150: receiving authentication feedback formed by the authentication user based on the authentication information;
step S160: determining whether the authentication is passed based on the authentication feedback.
As shown in fig. 3, the step S110 may include:
step S111: extracting social attributes and/or user attributes of all social users in the social relationship of the user to be verified based on a selection strategy;
step S112: and selecting the social users meeting the selection requirements in the selection strategy as the verification assisting users based on the social attributes and/or the user attributes.
As shown in fig. 4, the step S112 includes:
step S1121: assigning a scoring value to the social attribute and/or the user attribute according to the selection strategy;
step S1122: determining the scoring weight of the social attribute and/or the user attribute;
step S1123: determining a function value representing verification reliability based on the score value and the score weight value;
step S1124: determining the verification assisting user based on the function value.
In this embodiment, the social attributes and/or user attributes are first assigned to the scores according to a selection policy.
Specifically, if the time for establishing the social relationship between the user to be authenticated and the social user a is as long as 2 years, and the time for establishing the social relationship between the user to be authenticated and the social user B is only 3 months, then at this time, a score may be given to the social relationship duration of the social user a; and B points are given to the social relation duration of the social user B. Both a and b are positive numbers, but a is greater than b. Generally, a greater score value is available for a longer social relationship. For example, if the credit record of the social user a is worse than the credit record of the social user B, the credit score value corresponding to the credit record of the social user a may be greater than the credit score value corresponding to the credit record of the social user B.
Different social attributes and user attributes are different in contribution value to the credibility of the verification assisting user, and the scoring weight value is further introduced in the embodiment, for example, the greater the corresponding scoring weight value is for the contribution value of one attribute to the credibility. In step S1122, the social attributes and the scoring weights of the user attributes involved in calculating the confidence level are determined. In step S1123, a function value is calculated based on the score value and the score weight value according to a preset functional relationship. The function value can be used to reflect the provided verification credibility of the social user.
In step S1124, selecting the verification assistant user according to the function value may include selecting a social user with a function value greater than a specified value as the verification assistant user, or selecting a social user with a function value sorted from high to low and sorted in the top N as the verification assistant user. Wherein N is an integer not less than 1.
The embodiment provides a method for selecting verification assistance users, which can convert social attributes or user attributes with different dimensions into score values with unified measurement by giving the score values; different contribution values of each attribute to the verification reliability are fully considered through the introduction of the scoring weight, and the verification assisting user meeting the selection requirement can be simply and conveniently determined through the function value; the method has the characteristics of simple implementation, high verification reliability and the like.
Method example nine:
as shown in fig. 5, the present embodiment provides a verification method, including:
step S210: receiving at least part of the authentication information formed by the authentication assisting user from the authentication platform;
step S220: outputting the verification information received from the verification platform;
step S230: forming verification feedback based on the verification information and user indication;
step S240: sending the feedback to the verification platform; wherein the verification feedback is used for the verification platform to determine whether verification is passed.
The authentication method described in this embodiment may be a processing method applied to a client where a user to be authenticated is located. In this embodiment, the authentication information is formed for the authenticated user. The authentication information includes at least an authentication question. The source of the verification problem can be found in the method embodiments described above and will not be repeated here.
Obviously, the authentication information is not static information preset by the user to be authenticated, but may be dynamically formed by the user assisted by the authentication. The authentication assists the user to have a social relationship with the user to be authenticated, and the social relationship can be represented by QQ friends, WeChat friends, classmate relationships of people and networks and the like.
The authentication information will be output in step S220; the method of outputting authentication information may include a display output and a voice output.
The client will receive the user indication in step S230, forming the authentication feedback.
In step S240, the user to be verified submits the verification feedback to the verification platform, so as to facilitate the verification platform to verify whether the verification platform passes the verification.
The embodiment provides a verification method which can be used for identity verification, authentication verification and the like and has the characteristics of high verification safety, no need of recording a verification key by a user and the like.
As a further improvement of this embodiment, the method further includes: selecting a social user from the social relationship as an authentication assisting user; and sending the information of the verification assisting user to a verification platform.
In this embodiment, the user to be authenticated participates in selecting the authentication assisting user, and in a specific implementation process, the user to be authenticated may directly select one or more social users from the social relationships thereof based on the instruction, and submit information such as the identifiers of the social users to the authentication platform. Of course, the user to be authenticated may also receive, from the authentication platform, an alternative user formed by the selection of the platform to be authenticated, where the user to be authenticated selects the authentication assisting user from the alternative users based on a user instruction.
The user to be verified participates in the selective verification to assist the user, so that the participation degree and the satisfaction degree of the user to be verified are improved.
Method example ten:
as shown in fig. 6, the present embodiment provides a verification method, including:
step S310: receiving a verification assistance request sent by a verification platform to assist a user to be verified in verification;
step S320: forming authentication information in response to the authentication assistance request based on a user indication; the verification information is used for the verification platform to verify the user to be verified;
step S330: and sending the verification information to the verification platform.
The authentication method described in this embodiment is a method applied to the client where the authentication assisting user is located, and in this embodiment, the authentication assisting user responds to the authentication assisting request to form the authentication information. Obviously, the verification information is dynamically formed, and the security of verification is improved.
In this embodiment, a social relationship is established between the authentication assisting user and the user to be authenticated.
The authentication information formed in step S320 may include an authentication question and an authentication answer. In this way, the verification assisting user sends the verification question and the verification answer to the verification platform at the same time at one time, so that the verification platform can check the verification feedback and the verification answer.
Of course, the authentication information also includes only authentication questions. As such, the method further comprises:
receiving verification feedback forwarded by the verification platform;
outputting verification feedback;
determining a verification evaluation for the verification feedback based on a user indication;
sending the verification evaluation to the verification platform.
At this time, after the user to be authenticated forms user feedback, the authentication platform forwards the authentication feedback to the authentication assisting user, and the authentication assisting user outputs the authentication feedback in a voice output or display output mode. The client receives the user instruction to form verification evaluation on the verification feedback; and submitting the verification evaluation to a verification platform, and finally determining whether the verification is passed by the verification platform. The verification evaluation described in this example can be found in the previous examples and will not be repeated here.
The first embodiment of the device:
as shown in fig. 7, the present embodiment provides a verification platform, which includes:
the selection unit 110 is configured to select at least one authentication assisting user from social relationships of users to be authenticated based on authentication requirements;
a first sending unit 120, configured to send an authentication assistance request to the authentication assistance user;
a first receiving unit 130, configured to receive authentication information returned by the authentication assisting user based on the authentication assisting request;
a second sending unit 140, configured to send at least part of the authentication information to a user to be authenticated;
a second receiving unit 150, configured to receive authentication feedback formed by the authenticated user based on the authentication information;
an authentication unit 160 for determining whether authentication is passed based on the authentication feedback.
The verification platform described in this embodiment may include one or more computers.
The specific structure of the selection unit 110 and the verification unit 160 may include a processor or a processing circuit. The processor may include a central processing unit, a microprocessor, a digital signal processor, a programmable array, or other processing architecture capable of processing information. The processing circuitry may comprise an application specific integrated circuit or the like.
The selection unit 110 and the verification unit 160 may be integrated to correspond to the same processor or respectively correspond to different processors. The verification platform further comprises a storage medium and the like, and the processor or the processing circuit is connected with the storage medium through a bus and the like. The storage medium may store executable instructions, and the processor or processing circuit may be configured to perform various functions by executing the executable instructions.
The specific structures of the first sending unit 120, the first receiving unit 130, the second sending unit 140, and the second receiving unit 150 may correspond to different communication interfaces respectively, or may correspond to the same communication interface. The communication interface may be a wired interface or a wireless interface. The wired interface can be a cable interface or an optical cable interface; the wireless interface may be various types of transceiving antennas.
The authentication platform can invite other social users to authenticate the user to be authenticated, so that the formed authentication information has the characteristic of high safety, and the user to be authenticated does not need to record an authentication key and worry about the trouble caused by forgetting the authentication key.
The specific structure of the authentication unit 160 is various, and two alternative structures are provided below.
An optional structure one:
the verification information comprises a verification question and a verification answer; the authentication problem is authentication information to be sent to a user to be authenticated;
the verification unit 160 is specifically configured to verify the verification feedback and the verification answer to form a verification result; and if the verification result meets the verification passing condition, determining that the verification passes.
The verification unit 160 checks the verification feedback with the verification answer after the second receiving unit 150 receives the verification feedback, and forms a check result; and determining whether the verification is passed or not according to the checking result.
Optional structure two:
the verification information comprises a verification question;
the verification platform 160 is specifically configured to send the verification feedback to the verification assisting user; receiving the assistance verification for a verification evaluation given based on the verification feedback; determining whether the authentication is passed based on the authentication evaluation.
In this embodiment, the verification platform 160 may also include a communication interface, which is capable of performing information interaction with the verification assisting user, for example, sending the verification feedback to the verification assisting user, receiving the verification evaluation, and determining that the verification passes according to the verification evaluation.
The two verification units have the advantages of being simple in structure and convenient and intelligent to achieve, and the verification platform has the advantage of being high in verification safety. In a specific implementation process, the verification platform may be a social platform having a verification function, and in this case, a social database in the social platform may provide data support for selecting the verification assisting user. The verification platform may be a WeChat platform or the like.
The verification information at least comprises verification questions, wherein the verification questions comprise verification questions selected from a preset verification question bank. The preset authentication question bank can be preset in the local client of the authentication assisting user, so that the authentication rate can be improved.
Of course, the first sending unit 120 of the authentication platform may also be configured to send an alternative authentication question forming the authentication information to the authentication assisting user. This can help the authentication to assist the user in quickly and easily forming the authentication information.
The second equipment embodiment:
as shown in fig. 7, the present embodiment provides a verification platform, which includes:
the selection unit 110 is configured to select at least one authentication assisting user from social relationships of users to be authenticated based on authentication requirements;
a first sending unit 120, configured to send an authentication assistance request to the authentication assistance user;
a first receiving unit 130, configured to receive authentication information returned by the authentication assisting user based on the authentication assisting request;
a second sending unit 140, configured to send at least part of the authentication information to a user to be authenticated;
a second receiving unit 150, configured to receive authentication feedback formed by the authenticated user based on the authentication information;
an authentication unit 160 for determining whether authentication is passed based on the authentication feedback.
The selection unit 110 includes:
the extraction module is used for extracting social attributes and/or user attributes of all social users in the social relationship of the user to be verified based on a selection strategy;
and the selection module is used for selecting the social users meeting the selection requirements in the selection strategy as verification assisting users based on the social attributes and/or the user attributes.
The selection unit 110 may be divided into an extraction module and a selection module in this embodiment. The selection module is used for extracting at least one of the social attribute and the user attribute. The selection module determines to authenticate the assisting user according to the social attribute and/or the user attribute, and it is seen that the authentication assisting user is not randomly selected but needs to be selected according to the authentication platform in the embodiment, so that the reliability of authentication can be improved.
The detailed description of the social attributes and the user attributes may be referred to corresponding method embodiments and will not be repeated here.
The extraction module and the verification module may also correspond to a processor or processing circuitry; the specific structure of the processor or processing circuit can be seen in the first embodiment of the apparatus. The extraction module and the verification module may correspond to the same processor or processing circuit, or may correspond to different processors or processing circuits. When integrated corresponding to the same processor or processing circuit, the processor or processing circuit respectively implements functions of different modules by adopting time division multiplexing or concurrent threads.
The third equipment embodiment:
as shown in fig. 7, the present embodiment provides a verification platform, which includes:
the selection unit 110 is configured to select at least one authentication assisting user from social relationships of users to be authenticated based on authentication requirements;
a first sending unit 120, configured to send an authentication assistance request to the authentication assistance user;
a first receiving unit 130, configured to receive authentication information returned by the authentication assisting user based on the authentication assisting request;
a second sending unit 140, configured to send at least part of the authentication information to a user to be authenticated;
a second receiving unit 150, configured to receive authentication feedback formed by the authenticated user based on the authentication information;
an authentication unit 160 for determining whether authentication is passed based on the authentication feedback.
The selection unit 110 includes:
the extraction module is used for extracting social attributes and/or user attributes of all social users in the social relationship of the user to be verified based on a selection strategy;
and the selection module is used for selecting the social users meeting the selection requirements in the selection strategy as verification assisting users based on the social attributes and/or the user attributes.
The selection module is specifically configured to select, based on the social attributes and/or the user attributes, a social user that meets the selection requirement as an alternative user; sending the alternative user to the user to be verified; receiving a selection indication formed by the user to be verified based on the alternative user; determining the verification assisting user based on the selection indication.
In this embodiment, the selection module also includes a communication interface, which is capable of performing information interaction with a client where the user to be authenticated is located, and determines the authentication assisting user meeting the selection requirement based on the user instruction of the user to be authenticated, so that the decision degree of the user to be authenticated participating in authentication is improved, and the user authentication satisfaction degree is improved.
The fourth equipment embodiment:
as shown in fig. 7, the present embodiment provides a verification platform, which includes:
the selection unit 110 is configured to select at least one authentication assisting user from social relationships of users to be authenticated based on authentication requirements;
a first sending unit 120, configured to send an authentication assistance request to the authentication assistance user;
a first receiving unit 130, configured to receive authentication information returned by the authentication assisting user based on the authentication assisting request;
a second sending unit 140, configured to send at least part of the authentication information to a user to be authenticated;
a second receiving unit 150, configured to receive authentication feedback formed by the authenticated user based on the authentication information;
an authentication unit 160 for determining whether authentication is passed based on the authentication feedback.
The selection unit 110 includes:
the extraction module is used for extracting social attributes and/or user attributes of all social users in the social relationship of the user to be verified based on a selection strategy;
and the selection module is used for selecting the social users meeting the selection requirements in the selection strategy as verification assisting users based on the social attributes and/or the user attributes.
The selection module is specifically used for endowing the social attributes and/or the user attributes with scoring values according to the selection strategy; determining the scoring weight of the social attribute and/or the user attribute; determining a function value representing verification reliability based on the score value and the score weight value; determining the verification assisting user based on the function value.
In this embodiment, the selection module of the verification platform converts the attributes extracted by the extraction module into score values with the same scale, sets a score weight according to the contribution value of each attribute to the verification reliability, and finally calculates a function value capable of reflecting the verification reliability based on the score values and the score weights. And the selection module finally determines the verification assisting user according to the function value.
Obviously, the authentication assistance of the user determined by the authentication platform described in this embodiment can be beneficial to ensuring the reliability of authentication.
Device example five:
as shown in fig. 8, the present embodiment provides a client, where the client includes:
a third receiving unit 210, configured to receive at least part of the authentication information formed by the authentication assisting user from the authentication platform;
an output unit 220 for outputting the authentication information received from the authentication platform;
a forming unit 230, configured to form an authentication feedback based on the authentication information and a user instruction;
a third sending unit 240, configured to send the feedback to the verification platform; wherein the verification feedback is used for the verification platform to determine whether verification is passed.
The client described in this embodiment is a client where the user to be authenticated is located, and may correspond to a terminal device such as a mobile phone, a tablet computer, or a wearable device.
The third receiving unit 210 may correspond to a communication interface, which may be a wired interface or a wireless interface, and may be capable of receiving the authentication information formed by the authentication assisting user forwarded by the authentication platform. Typically the authentication information comprises at least an authentication question.
The output unit 220 may include a display screen; and the display screen outputs the verification information through information display. The output unit 220 may further include an audio output structure such as a speaker or a loudspeaker, and the verification information is output in a voice manner.
The processor or processing circuit of the forming unit 230 may be a central processing unit, an application processor, a digital signal processor, or a programmable array in the client, and has a structure for information processing. The processing circuitry may comprise a dedicated integrated circuit. The forming unit 230 is operable to form the verification feedback based on the user indication. The user indication may be received by a human-computer interaction interface of the client, for example, the display interaction screen obtains the user indication by receiving a gesture operation of a user, for example, a voice interaction interface, and obtains the user indication by receiving a voice of the user.
The third sending unit 240 may include a sending interface, and may specifically correspond to a sending antenna, and the like, and may be capable of sending the verification feedback.
In the client described in this embodiment, the verification information during verification is dynamically formed by the verification-assisting user, so that the security of verification can be improved, and the user does not need to remember the verification key, thereby avoiding the trouble caused by the loss of the verification key or the verification key.
In the client described in this embodiment, the client is further configured to select a social user from the social relationships as an authentication assisting user; the third sending unit 240 is further configured to send the information of the verification assisting user to a verification platform. The client described in this embodiment can also participate in selecting authentication participating in authentication to assist the user, so that the user authentication participation and authentication satisfaction can be improved.
Device example six:
as shown in fig. 9, the present embodiment provides a client, where the client includes:
a fourth receiving unit 310, configured to receive an authentication assisting request sent by the authentication platform to assist a user to be authenticated in authentication;
a response unit 320 for forming authentication information in response to the request for authentication assistance based on a user indication; the verification information is used for the verification platform to verify the user to be verified;
a fourth sending unit 330, configured to send the verification information to the verification platform.
The client described in this embodiment is a client where the verification assisting user is located, and the client may correspond to a mobile phone, a tablet computer, a wearable device, or the like.
The specific structure of the fourth receiving unit 310 and the fourth sending unit 330 corresponds to a communication interface, which may be a wired communication interface or a wireless interface, or in short, an interface capable of performing information interaction with the authentication platform.
The specific structure of the response unit 320 may correspond to a processor or a processing circuit in the client. The processor may be a central processor, a digital signal processor, a programmable array or an application processor, etc., and may be capable of forming the authentication information based on the user indication being directed to the authentication information to assist the user to be authenticated in authentication. The client is used for verification and has the advantages of being high in verification safety and simple and convenient to verify.
The authentication information includes an authentication question and an authentication answer. In this way, the fourth sending unit 330 of the client sends the verification question and the verification answer to the verification platform at one time, so that the number of information interaction with the verification platform can be reduced, the power consumption of the client is reduced, and the user operation is simplified.
Of course, the fourth receiving unit 310 may also be configured to receive the verification feedback forwarded by the verification platform; the client can also comprise a display screen or a voice output structure and the like for outputting verification feedback; the response unit will also be configured to determine a verification evaluation for the verification feedback based on a user indication; the fourth sending unit 330 is further configured to send the verification evaluation to the verification platform. The client described in this embodiment can also assist the verification of the verification platform by forming the verification evaluation, and has the characteristics of simple structure and high intelligence.
Several specific examples are provided below in connection with any of the embodiments described above:
example one:
as shown in fig. 10, the present example includes:
step S1: the user A initiates an identity authentication request; the authentication request initiated by the user a in this example is one of the authentication requirements in the foregoing embodiments.
Step S2: the system selects a batch of credible people according to specific regulations and algorithms; the trusted people group here may correspond to the alternative users described in the previous embodiments. The system herein may include the aforementioned verification platform. The specific provisions and algorithms described herein are part of the aforementioned selection strategy.
Step S3: the user A selects 1 friend B from the credible crowd. Here, friend B will act as the authentication assisting user.
Step S4: the system issues a request for verification assistance to friend B.
Step S5: friend B receives the authentication assistance request to formulate a set of questions and answers. The question is the above-mentioned verification question, and the answer is the above-mentioned verification answer.
Step S6: the system issues the question posed by friend B to user a.
Step S7: user a answers the question.
Step S8: the system determines whether the answer of the user a matches the answer formulated by the friend B, if yes, step S9 is performed, and if no, the verification fails.
Step S9: and determining that the verification is passed.
In this example, when the verification fails, the user a may contact friend B by himself to obtain an answer, and return to step S7 to answer the question again.
Example two:
the present example provides a verification platform that includes a verification server, a database, and a gateway. The database can store information data such as social relations and verification records of all users.
And the verification server is respectively connected with the database and the gateway. The gateway may be an interface for the authentication platform to communicate with the user to be authenticated and an authentication assisting user. The gateway can be used for filtering illegal users and illegal operations and is used for defending the use safety and information safety of the verification platform.
The verification server may be configured to read the social relationship from the database, select a verification-assisting user, determine whether the verification is passed based on the verification feedback, and finally update the verification record in the database.
The verification platform described in this example may be a hardware structure for implementing method embodiment one to method embodiment nine, and has a feature of high verification security.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (22)

1. A verification method is applied to a verification platform and is characterized by comprising the following steps:
receiving an authentication request of a user to be authenticated, wherein the authentication request is initiated when a network is used for performing activities and authentication is required before the activities;
selecting social users meeting the selection requirement of at least one dimension of the credibility and the social closeness from the social users of the users to be verified to serve as verification assisting users;
sending an authentication assistance request to the authentication assistance user;
wherein the authentication assistance request comprises: the identity information and the verification purpose of the user to be verified;
receiving authentication information returned by the authentication assisting user based on the authentication assisting request, wherein the authentication information at least comprises: verifying the question, the verification answer and the verification passing condition;
wherein the verification question comprises a question that only the verification assisting user and the to-be-verified user know correct answers, and the verification passing condition comprises that the to-be-verified user answers at least a plurality of verification questions which are specified by the verification assisting user and must be answered correctly;
sending the verification problem to the user to be verified;
receiving authentication feedback formed by the authentication user based on the authentication information;
determining whether the authentication is passed based on the authentication feedback.
2. The method of claim 1,
the determining whether authentication is passed based on the authentication feedback includes:
checking the verification feedback and the verification answer to form a checking result;
and if the verification result meets the verification passing condition, determining that the verification passes.
3. The method of claim 1,
the determining whether authentication is passed based on the authentication feedback includes:
sending the verification feedback to the verification assisting user;
receiving verification evaluation given by the assistant verification user based on the verification feedback;
determining whether the authentication is passed based on the authentication evaluation.
4. The method of claim 1,
the verification questions comprise verification questions selected from a preset verification question bank.
5. The method of claim 1,
the method further comprises the following steps:
sending an alternative authentication question forming the authentication information to the authentication assisting user.
6. The method of claim 1,
selecting, from the social users of the user to be authenticated, a social user that meets a selection requirement of at least one dimension of reliability and social closeness, as an authentication assisting user, including:
extracting social attributes and/or user attributes of all social users in the social relations of the users to be verified based on the selection requirements;
and selecting the social users meeting the selection requirements as the verification assisting users based on the social attributes and/or the user attributes.
7. The method of claim 6,
the selecting, based on the social attributes and/or user attributes, a social user that meets the selection requirement as the authentication assisting user includes:
selecting the social users meeting the selection requirement as alternative users based on the social attributes and/or user attributes;
sending the alternative user to the user to be verified;
receiving a selection indication formed by the user to be verified based on the alternative user;
determining the verification assisting user based on the selection indication.
8. The method of claim 6,
the selecting, based on the social attributes and/or user attributes, a social user that meets the selection requirement as the authentication assisting user includes:
assigning a scoring value to the social attribute and/or the user attribute according to the selection requirement;
determining the scoring weight of the social attribute and/or the user attribute;
determining a function value representing verification reliability based on the score value and the score weight value;
determining the verification assisting user based on the function value.
9. An authentication method applied to a client, the method comprising:
receiving at least part of authentication information formed by an authentication assisting user from an authentication platform, wherein at least part of the authentication information comprises: verifying the question, the verification answer and the verification passing condition; wherein the verification information is: assisting authentication of a user sent based on an authentication assistance request, the authentication assistance request comprising: identity information and a verification purpose of a user to be verified;
wherein the verification question comprises a question that only the verification assisting user and the to-be-verified user know correct answers, and the verification passing condition comprises that the to-be-verified user answers at least a plurality of verification questions which are specified by the verification assisting user and must be answered correctly;
the verification assisting user comprises the steps that after a verification request of a user to be verified is received, the user to be verified is selected from social users of the user to be verified and meets the selection requirement of at least one dimension of credibility and social closeness;
wherein, the verification request is initiated when a network is used for activity and verification is needed before the activity;
outputting the verification information received from the verification platform, wherein the outputting the verification information received from the verification platform comprises: outputting the verification questions received from the verification platform;
forming verification feedback based on the verification information and user indication;
sending the feedback to the verification platform; wherein the verification feedback is used for the verification platform to determine whether verification is passed.
10. The method of claim 9,
the method further comprises the following steps:
and sending the information of the verification assisting user to a verification platform.
11. An authentication method applied to a client, the method comprising:
receiving an authentication assistance request sent by an authentication platform to assist a user to be authenticated in authentication, wherein the authentication assistance request comprises: the identity information and the verification purpose of the user to be verified;
the verification assisting user is selected from social users of the user to be verified after receiving a verification request of the user to be verified, and meets the selection requirement of at least one dimension of credibility and social closeness;
wherein, the verification request is initiated when a network is used for activity and verification is needed before the activity;
forming authentication information in response to the authentication assistance request based on a user indication; the verification information is used for the verification platform to verify a user to be verified, wherein the verification information at least comprises: verifying the question, the verification answer and the verification passing condition;
wherein the verification question comprises a question that only the verification assisting user and the to-be-verified user know correct answers, and the verification passing condition comprises that the to-be-verified user answers at least a plurality of verification questions which are specified by the verification assisting user and must be answered correctly;
and sending the verification information to the verification platform.
12. The method of claim 11,
the method further comprises the following steps:
receiving verification feedback forwarded by the verification platform;
outputting verification feedback;
determining a verification evaluation for the verification feedback based on a user indication;
sending the verification evaluation to the verification platform.
13. A verification platform, comprising:
a selection unit for:
receiving an authentication request of a user to be authenticated, wherein the authentication request is initiated when a network is used for performing activities and authentication is required before the activities;
selecting social users meeting the selection requirement of at least one dimension of the credibility and the social closeness from the social users of the users to be verified to serve as verification assisting users;
a first sending unit, configured to send an authentication assistance request to the authentication assistance user, where the authentication assistance request includes: the identity information and the verification purpose of the user to be verified;
a first receiving unit, configured to receive authentication information returned by the authentication assisting user based on the authentication assisting request, where the authentication information at least includes: verifying the question, the verification answer and the verification passing condition;
wherein the verification question comprises a question that only the verification assisting user and the to-be-verified user know correct answers, and the verification passing condition comprises that the to-be-verified user answers at least a plurality of verification questions which are specified by the verification assisting user and must be answered correctly;
a second sending unit, configured to send at least part of the authentication information to a user to be authenticated, where the sending of at least part of the authentication information to the user to be authenticated includes: sending the verification problem to the user to be verified;
a second receiving unit configured to receive authentication feedback formed by the authenticated user based on the authentication information;
an authentication unit to determine whether authentication is passed based on the authentication feedback.
14. The validation platform of claim 13,
the verification unit is specifically used for verifying the verification feedback and the verification answer to form a verification result; and if the verification result meets the verification passing condition, determining that the verification passes.
15. The validation platform of claim 13,
the verification platform is specifically configured to send the verification feedback to the verification assisting user; receiving verification evaluation given by the assistant verification user based on the verification feedback; determining whether the authentication is passed based on the authentication evaluation.
16. The verification platform of claim 13, wherein the selection unit comprises:
the extraction module is used for extracting the social attributes and/or the user attributes of the social users in the social relations of the users to be verified based on the selection requirements;
and the selection module is used for selecting the social users meeting the selection requirements as the verification assisting users based on the social attributes and/or the user attributes.
17. The validation platform of claim 16,
the selection module is specifically configured to select, based on the social attributes and/or the user attributes, a social user that meets the selection requirement as an alternative user; sending the alternative user to the user to be verified; receiving a selection indication formed by the user to be verified based on the alternative user; determining the verification assisting user based on the selection indication.
18. The validation platform of claim 16,
the selection module is specifically used for endowing the social attributes and/or the user attributes with scoring values according to the selection requirements; determining the scoring weight of the social attribute and/or the user attribute; determining a function value representing verification reliability based on the score value and the score weight value; determining the verification assisting user based on the function value.
19. A client, the client comprising:
a third receiving unit, configured to receive at least part of authentication information formed by the authentication assisting user from the authentication platform, where the at least part of the authentication information includes: verifying the question, the verification answer and the verification passing condition; wherein the verification information is: assisting authentication of a user sent based on an authentication assistance request, the authentication assistance request comprising: identity information and a verification purpose of a user to be verified;
wherein the verification question comprises a question that only the verification assisting user and the to-be-verified user know correct answers, and the verification passing condition comprises that the to-be-verified user answers at least a plurality of verification questions which are specified by the verification assisting user and must be answered correctly;
the verification assisting user is selected from social users of the user to be verified after receiving a verification request of the user to be verified, and meets the selection requirement of at least one dimension of credibility and social closeness;
wherein, the verification request is initiated when a network is used for activity and verification is needed before the activity;
an output unit, configured to output the verification information received from the verification platform, wherein the output unit is specifically configured to output the verification question received from the verification platform;
a forming unit, configured to form an authentication feedback based on the authentication information and a user instruction;
a third sending unit, configured to send the feedback to the verification platform; wherein the verification feedback is used for the verification platform to determine whether verification is passed.
20. A client, the client comprising:
a fourth receiving unit, configured to receive an authentication assistance request sent by an authentication platform to assist a user to be authenticated in authentication, where the authentication assistance request includes: the identity information and the verification purpose of the user to be verified;
the verification assisting user is selected from social users of the user to be verified after receiving a verification request of the user to be verified, and meets the selection requirement of at least one dimension of credibility and social closeness; wherein, the verification request is initiated when a network is used for activity and verification is needed before the activity;
a response unit for forming authentication information responding to the authentication assistance request based on a user indication; the verification information is used for the verification platform to verify a user to be verified, wherein the verification information at least comprises: verifying the question, the verification answer and the verification passing condition;
wherein the verification question comprises a question that only the verification assisting user and the to-be-verified user know correct answers, and the verification passing condition comprises that the to-be-verified user answers at least a plurality of verification questions which are specified by the verification assisting user and must be answered correctly;
and the fourth sending unit is used for sending the verification information to the verification platform.
21. A computer-readable storage medium having stored thereon computer-executable instructions; the computer executable instructions, when executed by a processor, are capable of implementing the authentication method of any one of claims 1 to 8, 9 to 10 or 11 to 12.
22. A verification platform, comprising:
a memory for storing executable instructions;
a processor for implementing the authentication method of any one of claims 1 to 12 when executing executable instructions stored in the memory.
CN201510570808.8A 2015-09-09 2015-09-09 Verification method, verification platform and client Active CN106534041B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510570808.8A CN106534041B (en) 2015-09-09 2015-09-09 Verification method, verification platform and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510570808.8A CN106534041B (en) 2015-09-09 2015-09-09 Verification method, verification platform and client

Publications (2)

Publication Number Publication Date
CN106534041A CN106534041A (en) 2017-03-22
CN106534041B true CN106534041B (en) 2020-08-07

Family

ID=58345655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510570808.8A Active CN106534041B (en) 2015-09-09 2015-09-09 Verification method, verification platform and client

Country Status (1)

Country Link
CN (1) CN106534041B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108494944B (en) * 2018-01-31 2021-01-22 珠海市魅族科技有限公司 Terminal device and control method
CN111711622B (en) * 2020-06-09 2023-04-07 腾讯科技(深圳)有限公司 Account registration control method and device and computer equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640668A (en) * 2008-07-29 2010-02-03 华为技术有限公司 Method, system and device for authenticating user identity
CN101047503B (en) * 2006-03-30 2010-04-14 腾讯科技(深圳)有限公司 Method and system for fetching cipher
CN102035846A (en) * 2010-12-22 2011-04-27 北京航空航天大学 Social network user identity authentication method based on relation statement
CN102130854A (en) * 2011-04-28 2011-07-20 苏州阔地网络科技有限公司 Method and system for displaying buddy list with buddy states
CN103095650A (en) * 2011-10-31 2013-05-08 广东电子工业研究院有限公司 Cloud service identity authentication method suitable for thin client terminal
CN104883367A (en) * 2015-05-20 2015-09-02 吴振祎 Method for auxiliary verification login, system, and application client

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100325057A1 (en) * 2009-06-17 2010-12-23 Microsoft Corporation Leveraging social capital on a website
US9230077B2 (en) * 2013-03-15 2016-01-05 International Business Machines Corporation Alias-based social media identity verification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047503B (en) * 2006-03-30 2010-04-14 腾讯科技(深圳)有限公司 Method and system for fetching cipher
CN101640668A (en) * 2008-07-29 2010-02-03 华为技术有限公司 Method, system and device for authenticating user identity
CN102035846A (en) * 2010-12-22 2011-04-27 北京航空航天大学 Social network user identity authentication method based on relation statement
CN102130854A (en) * 2011-04-28 2011-07-20 苏州阔地网络科技有限公司 Method and system for displaying buddy list with buddy states
CN103095650A (en) * 2011-10-31 2013-05-08 广东电子工业研究院有限公司 Cloud service identity authentication method suitable for thin client terminal
CN104883367A (en) * 2015-05-20 2015-09-02 吴振祎 Method for auxiliary verification login, system, and application client

Also Published As

Publication number Publication date
CN106534041A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
US9235695B2 (en) Alias-based social media identity verification
CN106797371B (en) Method and system for user authentication
TWI554955B (en) Identity authentication methods and information systems
US8910251B2 (en) Using social information for authenticating a user session
US8555355B2 (en) Mobile pin pad
WO2021036014A1 (en) Federated learning credit management method, apparatus and device, and readable storage medium
US20150294313A1 (en) Systems, apparatus and methods for improved authentication
US9009793B2 (en) Dynamic pin dual factor authentication using mobile device
CN104077689A (en) Information verification method, relevant device and system
US11539526B2 (en) Method and apparatus for managing user authentication in a blockchain network
US20150006399A1 (en) Social Media Based Identity Verification
US10448247B2 (en) Method and apparatus for information verification
CN104205721A (en) A context-aware adaptive authentication method and apparatus
US11676118B2 (en) Methods and systems for conducting multi-user interactions on a device using biometric authentication
CN103971239A (en) Verification method and device
US10079687B2 (en) System and method for password recovery using fuzzy logic
US20240007476A1 (en) Multi-factor authentication using confidant verification of user identity
CN104967553A (en) Message interaction method, related device and communication system
CN110598383A (en) Method and device for removing account permission limitation
CN106534041B (en) Verification method, verification platform and client
CN103684796A (en) SMI (subscriber identity module) card and personal identity authentication method
CN103685216A (en) Information processing apparatus, information processing system, information processing method, program and client terminal
KR101475422B1 (en) Internet Security Method and System using One Time IDentification
CN113362049A (en) Virtual resource transfer method, device, medium and electronic equipment
KR20150018039A (en) Apparatus and method for auhentication using an image

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant