CN107104922B - Method and device for authority management and resource control - Google Patents

Method and device for authority management and resource control Download PDF

Info

Publication number
CN107104922B
CN107104922B CN201610096550.7A CN201610096550A CN107104922B CN 107104922 B CN107104922 B CN 107104922B CN 201610096550 A CN201610096550 A CN 201610096550A CN 107104922 B CN107104922 B CN 107104922B
Authority
CN
China
Prior art keywords
information
credential
user
credential information
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610096550.7A
Other languages
Chinese (zh)
Other versions
CN107104922A (en
Inventor
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610096550.7A priority Critical patent/CN107104922B/en
Publication of CN107104922A publication Critical patent/CN107104922A/en
Application granted granted Critical
Publication of CN107104922B publication Critical patent/CN107104922B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The method receives a credential generation request sent by a user through an account, provides basic information for the user, collects multimedia information input by the user according to the basic information, generates credential information according to the multimedia information, establishes a corresponding relation between the control authority of the account and the credential information, and stores the corresponding relation. By the method, the user can directly use the credential information to control the account number of the user, the account number is not controlled through the terminal equipment and the authorization equipment of the user on the premise of not revealing the account number information, and the safety risk of controlling the account number is effectively reduced.

Description

Method and device for authority management and resource control
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for rights management and resource control.
Background
With the continuous development of society, resources, such as e-book resources, provided by the server for the user are more and more.
Currently, in the process of using resources, a user needs to register a corresponding account and control resources in the account, for example, resource transfer is performed on the resources in the account.
In the prior art, in order to ensure the security of resources in an account of a user, when the user transfers the resources in the account, the user may log in the account on the terminal device of the user and transfer the resources in the account, but if the user cannot use the terminal device of the user (e.g., the user does not carry the terminal device of the user or the network is not secure) when transferring the resources in the account, the user may also transfer the resources in the account through a third-party authorized device (e.g., a third-party authorized fingerprint identification encryption device, hereinafter referred to as an authorization device) corresponding to the account, e.g., the user establishes the association between a fingerprint and the account of the user in advance, and then may press the fingerprint on the third-party authorized fingerprint identification encryption device to transfer the resources in the account.
However, in practical applications, if a user needs to control resources in an account (e.g., transfer resources), the user cannot use its terminal device (e.g., the user does not carry its terminal device or the network is not secure), cannot use an authorization device, and can only use terminal devices of other users, the account information of the user is likely to be leaked.
Disclosure of Invention
The embodiment of the application provides a method and a device for authority management and resource control, which are used for solving the problem that in the prior art, when a user cannot use own terminal equipment and authorization equipment, the account cannot be controlled on the premise of not revealing own account information.
The method for managing the authority provided by the embodiment of the application comprises the following steps:
receiving a credential generation request sent by a user through an account;
providing basic information to the user;
collecting multimedia information input by the user according to the basic information;
generating credential information according to the multimedia information;
and establishing a corresponding relation between the control authority of the account and the credential information, and storing the corresponding relation.
The resource control method provided by the embodiment of the application comprises the following steps:
receiving a credential use request sent by a user, wherein the credential use request carries multimedia information input by the user;
converting the multimedia information into basic information;
according to the basic information, confirming credential information corresponding to the basic information in each pre-stored credential information;
verifying the credential use request according to the credential information;
and when the verification is passed, performing resource control on the account according to the control authority of the account corresponding to the credential information.
The method for managing the authority provided by the embodiment of the application comprises the following steps:
receiving a credential generation request sent by a user through an account;
providing basic information to the user;
collecting multimedia information input by the user according to the basic information;
generating credential information according to the multimedia information;
and establishing a corresponding relation between the payment authority of the account and the credential information, and storing the corresponding relation.
The resource control method provided by the embodiment of the application comprises the following steps:
receiving a payment request sent by a user, wherein the payment request carries multimedia information input by the user;
converting the multimedia information into basic information;
according to the basic information, confirming credential information corresponding to the basic information in each pre-stored credential information;
verifying the payment request according to the credential information;
and when the authentication is passed, the account is used for payment according to the payment authority of the account corresponding to the credential information.
The device of authority management that this application embodiment provided, the device includes:
the receiving module is used for receiving a credential generation request sent by a user through an account;
a providing module for providing basic information to the user;
the acquisition module is used for acquiring multimedia information input by the user according to the basic information;
the generating module is used for generating credential information according to the multimedia information;
and the corresponding relation establishing module is used for establishing the corresponding relation between the control authority of the account and the credential information and storing the corresponding relation.
An apparatus for controlling resources provided in an embodiment of the present application, the apparatus includes:
the receiving module is used for receiving a credential use request sent by a user, wherein the credential use request carries multimedia information input by the user;
the conversion module is used for converting the multimedia information into basic information;
the determining module is used for determining the credential information corresponding to the basic information in the prestored credential information according to the basic information;
the verification module is used for verifying the credential use request according to the credential information;
and the control module is used for controlling resources of the account according to the control authority of the account corresponding to the credential information when the authentication passes.
The device of authority management that this application embodiment provided, the device includes:
the receiving module is used for receiving a credential generation request sent by a user through an account;
a providing module for providing basic information to the user;
the acquisition module is used for acquiring multimedia information input by the user according to the basic information;
the generating module is used for generating credential information according to the multimedia information;
and the corresponding relation establishing module is used for establishing the corresponding relation between the payment authority of the account and the credential information and storing the corresponding relation.
An apparatus for controlling resources provided in an embodiment of the present application, the apparatus includes:
the system comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a payment request sent by a user, and the payment request carries multimedia information input by the user;
the conversion module is used for converting the multimedia information into basic information;
the determining module is used for determining the credential information corresponding to the basic information in the prestored credential information according to the basic information;
the verification module is used for verifying the payment request according to the credential information;
and the control module is used for carrying out payment by using the account according to the payment authority of the account corresponding to the credential information when the authentication is passed.
The embodiment of the application provides a method and a device for authority management and resource control, wherein the method receives a credential generation request sent by a user through an account, provides basic information for the user, collects multimedia information input by the user according to the basic information, generates credential information according to the multimedia information, establishes a corresponding relation between the control authority of the account and the credential information, and stores the corresponding relation. By the method, the user can directly use the credential information to control the account number of the user, the account number is not controlled through the terminal equipment and the authorization equipment of the user on the premise of not revealing the account number information, and the safety risk of controlling the account number is effectively reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a first process of rights management provided by an embodiment of the present application;
fig. 2 is a first resource control process provided in an embodiment of the present application;
fig. 3 is a process of a second rights management provided by an embodiment of the present application;
fig. 4 is a second resource control process provided in the embodiment of the present application;
fig. 5 is a schematic structural diagram of a first rights management apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a first resource control apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a second rights management apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a second resource control apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a process of rights management provided in an embodiment of the present application, which specifically includes the following steps:
s101: and receiving a credential generation request sent by a user through an account.
In the application, when the user cannot use the terminal device of the user and cannot use the authorization device, the terminal devices of other users can be used, but because the user directly logs in the account number of the user on the terminal devices of other users and performs resource control through the account number, the information of the account number of the user is likely to be directly leaked, and therefore, in the application, the problem can be solved through a mode of establishing the evidence.
In the whole credential establishment process, the credential generation request sent by the user through the account is received first, and the whole reception process can be completed by the terminal or the server, where the account is an account for which the user needs to use resources, and the credential generation request is mainly used to trigger the terminal or the server to execute the credential establishment operation, where the resources in the account may be resources of an electronic book or other electronic resources, and the description is given below by taking the server as an example.
S102: providing basic information to the user.
S103: and collecting multimedia information input by the user according to the basic information.
In the embodiment of the application, after receiving a credential generation request sent by a user through an account, a server may provide basic information to the user, where the basic information includes text information, video information, voice information, and other types of information, and subsequently, the server may collect multimedia information input by the user according to the basic information, where the multimedia information may be video information or voice information.
In practical application, compared with video information, voice information is more accurate and faster in subsequent recognition, and recognition cost is lower, so that the voice information can be preferentially adopted as multimedia information in the application.
For example, after receiving a credential generation request sent by user a, the server assumes that the basic information provided to user a is the text type information: you are me and collect voice information (i.e., multimedia information) input by the user a according to "you are me".
S104: and generating credential information according to the multimedia information.
In the embodiment of the application, after the terminal collects the multimedia information, the terminal can generate the credential information according to the multimedia information, and the credential information is mainly used for subsequently controlling the resources of the user account.
In the application, when subsequently using the credential information to control the resource of the user account, it is mainly verified whether the currently collected multimedia information of the user is consistent with the multimedia information contained in the credential information, and in order to further improve the security of the user account, in the application, an interface for inputting a password may be displayed to the user on the basis of collecting the multimedia information, so as to prompt the user to input the password, and after receiving the password input by the user, the terminal generates the credential information according to the multimedia information and the password.
S105: and establishing a corresponding relation between the control authority of the account and the credential information, and storing the corresponding relation.
In the present application, since the resources of the user account are subsequently controlled by the credential information, it is necessary to establish a corresponding relationship between the credential information and the control authority, and it is also necessary to know which account is to be controlled according to the credential information, and therefore, it is also necessary to establish a corresponding relationship between the credential information and the account, and store the two established corresponding relationships in a corresponding data storage region (e.g., a database).
By the method, the user can directly use the credential information to control the account number of the user, the account number is not controlled through the terminal equipment and the authorization equipment of the user on the premise of not revealing the account number information, and the safety risk of controlling the account number is effectively reduced.
In view of the practical application, in order to meet personalized requirements of different users on credential information, and to further improve the security of controlling an account by using the credential information, in the present application, before establishing a corresponding relationship between a control authority of the account and the credential information, a terminal may receive setting information sent by the user for the credential information, and set the credential information according to the setting information, where the setting information includes: the use period of the credential information (e.g., before 2016, 2, 1), the geographic range of use of the credential information (e.g., the credential information can only be used in beijing area), the credit limit of the resource of the credential information use account (e.g., the credit limit is 50 yuan), and the use object of the credential information (e.g., the credit limit can only be used by friends).
It should be noted that the credit of the resource of the credential information using account is divided into two cases, the first case is: as long as the resource amount of the resource of the account used by the current user credential information is lower than the limit of the resource of the account used in the credential information, the resource of the account can be used through the credential information; the second case is: as long as the resource amount of the resource of the account currently used by the user through the credential information is not equal to the amount of the resource of the account used in the credential information, the resource of the account cannot be used through the credential information.
After the terminal stores the established correspondence between the credential information and the control authority and the correspondence between the account number and the control authority in the data storage region, in order to facilitate resource control on the user account number by using the credential information, the credential information can be accurately found, and therefore, in the present application, an identifier of the credential information needs to be established, specifically, the basic information mentioned in step S102 may be used as the identifier of the credential information, the credential information and the identifier (that is, the basic information) thereof are stored, and the credential information and the control authority of the account number corresponding to the credential information are stored.
In the present application, the execution of steps S101 to S105 may also be completed by the terminal, where the terminal first receives a credential generation request sent by the user through an account, provides basic information to the user, collects multimedia information input by the user according to the basic information, generates credential information according to the multimedia information, establishes a corresponding relationship between the control authority of the account and the credential information, and sends the corresponding relationship between the control authority of the account and the credential information to the server for storage.
The above is a method for authority management provided in this embodiment of the application, credential information may be established by the above method, and subsequently, when a user needs to use resources in an account, resources in the user account may be controlled by the credential information, where the whole resource control process is shown in fig. 2.
Fig. 2 is a process of resource control provided in the embodiment of the present application, which specifically includes the following steps:
s201: a credential use request sent by a user is received.
In this application, when a user needs to use the credentials established in steps S101 to S106 to control resources in an account, the user may directly use a terminal device of another user, and send a credential payment request to a server through the terminal device, and the server makes a corresponding response after receiving the credential use request sent by the user, where the credential use request carries multimedia information input by the user, and is mainly used to use the credentials to control the account.
For example, after receiving a credential use request sent by a user using a terminal device of another user, the server needs to determine which credential information the user needs to use to control the account, that is, the server needs to know which identifier (i.e., basic information) of the credential information is, in this application, before receiving the credential use request sent by the user, the server needs to prompt the user to read by memory, provide the content of the basic information (e.g., the basic information is text information) to the user when establishing the credential information, and collect the voice information read by the user.
S202: and converting the multimedia information into basic information.
S203: and according to the basic information, determining the credential information corresponding to the basic information in the pre-stored credential information.
When the corresponding relationship between the credential information and the control authority and the corresponding relationship between the credential information and the account are stored, the basic information in step S102 is used as the identifier of the credential information, and in order to accurately find out which credential information the user currently needs to use to control the account, in this application, the server needs to convert the voice information carried in the credential use request into the basic information.
Subsequently, the server determines credential information corresponding to the basic information from the pre-stored credential information according to the converted basic information (i.e., the identifier of the credential information).
S204: and verifying the credential use request according to the credential information.
In practical applications, there is a high possibility that other users remember the basic information of the user that is read before establishing credential information in advance, that is, the voice information carried in the credential use request currently received by the server may be read by other users and is not a real user of the credential information, and therefore, in order to ensure the security of the credential information, the server needs to verify the credential use request after determining the credential information corresponding to the basic information.
Since the credential request carries the voice message, the present application provides a way to validate the credential request, specifically, the server extracts the standard multimedia message (i.e. the standard voice message) contained in the credential information, uses the multimedia message carried in the credential request as the multimedia message to be validated, compares the multimedia message to be validated with the standard multimedia message, determines the similarity between the multimedia message to be validated and the standard multimedia message, determines that the validation of the credential request is passed when the similarity is greater than a predetermined threshold, determines that the validation of the credential request is failed when the similarity is not greater than the predetermined threshold, and prompts the user to read again and validate again if the number of times the user reads does not exceed the predetermined threshold, wherein the standard multimedia message is created credential information, multimedia information used by the credential information is generated.
S205: and when the verification is passed, performing resource control on the account according to the control authority of the account corresponding to the credential information.
In the application, when the server passes the verification, resource control is performed on the account according to the control authority of the account corresponding to the credential information, if the control authority of the account corresponding to the credential information is a resource transfer authority, the server transfers resources in the account according to the resource transfer authority of the account corresponding to the credential information, and of course, after the user logs in the terminal device, the terminal device prompts the user to read by memory, and before the content of basic information (for example, the basic information is text information) provided for the user when the credential information is established, the user is prompted to set the resource amount of the transferred resources and the transferred object.
When the authentication fails, the control authority of the account corresponding to the credential information can be directly refused, resource control is carried out on the account, and the credential information can be frozen if necessary.
By the method, the user can directly use the credential information to control the account number of the user, the account number is not controlled through the terminal equipment and the authorization equipment of the user on the premise of not revealing the account number information, and the safety risk of controlling the account number is effectively reduced.
In practical applications, there may be a case where a user performs information setting on credential information before establishing a corresponding relationship between a control authority of an account and the credential information, and therefore, before performing resource control on the account according to the control authority of the account corresponding to the credential information, the server needs to verify the information set by the user.
In the present application, the following is given of the information that is relatively common among the information set by the user: the method includes the steps that a server determines whether the current time falls within the use time limit corresponding to credential information or not, and determines that the current geographic position of a user falls within the use geographic range corresponding to the credential information before resource control is performed on the account according to the control authority of the account corresponding to the credential information, and the resource amount of the resource currently used by the user does not exceed the limit corresponding to the credential information The number of uses.
In addition, for only verifying the voice information carried in the credential use request, the security may be still lower, and in order to further improve the security of the credential information, the present application further provides a verification method, specifically, after verifying whether the similarity between the voice message carried in the credential use request and the standard voice information included in the credential information does not exceed a preset threshold, the server also needs to receive a password sent by the user, and determines whether the received password is consistent with the password corresponding to the credential information, if the password is consistent, the verification is passed, and according to the control authority of the account corresponding to the credential information, resource control is performed on the account; if the password is inconsistent with the account number, the user can be prompted to re-input the password, and when the password input times exceed the preset times, the control authority of the account number corresponding to the credential information is refused, and the credential information is frozen.
In practical application, there may be a case where after a user inputs a password on a terminal device, an illegal person directly intercepts a request carrying the password and sends the request carrying the password to a server through another terminal device, so that, after receiving the password sent by the user, the server can confirm whether a device used by the user to send the password is consistent with a device used by the user to send a credential use request according to Media Access Control (MAC) carried in the request carrying the password and an Internet Protocol (IP), if so, continue to verify the password of the user, and if not, directly send a prompt message to the device used by the user to send the credential use request, prompt the user that the current credential information is used to Control the account with an environmental risk, and propose to cancel the credential use request, the credential information is directly frozen if necessary.
It should be noted that, each interaction performed between the terminal device and the server is performed in a manner of signing and verifying a signature, so that it is ensured that information is not tampered during transmission, and security of resource control on an account using credential information is further improved.
In the present application, the multimedia information may also be image information, and in the process of authority management, when the server provides basic information (e.g., information of text type) to the user, the server may prompt the user to clearly write the basic information on the white paper, and subsequently, when the server collects the multimedia information input by the user according to the basic information, the server may directly shoot the basic information on the white paper through the terminal to generate the image information, and generate the credential information according to the image information.
Subsequently, in the resource control process, before receiving a credential use request sent by a user, a server needs to prompt the user to clearly write down the credential on a plain paper by memorizing, content of basic information (for example, the basic information is text information) provided for the user when the credential information is established, and the basic information on the plain paper is photographed by a terminal, so as to generate image information, and the image information is carried in the credential use request, subsequently, when the server converts multimedia information into the basic information, the basic information in the image information carried in the credential use request can be identified in an image identification mode, subsequently, credential information corresponding to the basic information is determined in each pre-stored credential information according to the identified basic information, the credential use request is verified according to the credential information, when the verification passes, and performing resource control on the account according to the control authority of the account corresponding to the credential information.
In order to describe the method for authority management and resource control more clearly and in detail, the method for resource control provided by the application is described in detail in a payment scene in which the control authority is used as the payment authority and the credential use request is used as the payment request.
Fig. 3 is a process of rights management provided in an embodiment of the present application, which specifically includes the following steps:
s301: and receiving a credential generation request sent by a user through an account.
In the process of establishing a payment credential provided in the present application, the server first receives a credential generation request sent by a user through an account, and executes step S302.
For example, the user a needs to establish a payment credential, and therefore, after the user a logs in a payment account on its own mobile phone (i.e., a terminal device), the user a clicks a credential establishment button, that is, the server receives a credential generation request sent by the user through the payment account, and performs step S302.
S302: providing basic information to the user.
Continuing the above example, after receiving a credential generation request sent by the user a through the payment account, the server provides the user a with the basic information, assuming that the type of the basic information is text information, and the content of the basic information is as follows: i you are.
S303: and collecting multimedia information input by the user according to the basic information.
S304: and generating credential information according to the multimedia information.
In the present application, the server needs to prompt and receive the password used by the user input credential in addition to collecting the multimedia information input by the user according to the basic information.
Continuing with the above example, assume that the server only collects voice information, and therefore, user a speaks the text information provided by the server: the server collects voice information read aloud by the user A, prompts the user A to input a password after the collection is finished, the user inputs the password into a password frame according to the prompt, and the server directly generates credential information according to the collected voice information of the user A and the received password.
S305: and establishing a corresponding relation between the payment authority of the account and the credential information, and storing the corresponding relation.
In this application embodiment, after the terminal generates the credential information according to the collected multimedia information of the user and the password input by the user, the terminal may perform corresponding setting on information in the generated credential information, specifically, the server may receive setting information sent by the user for the generated credential information, and set the generated credential information according to the setting information, where the setting information includes: at least one of the using time limit of the credential information, the using geographic range of the credential information, the payment amount of the account number used by the credential information, and the payment object of the credential information.
It should be noted that the amount of the payment amount of the credential information using the account is divided into two cases, the first case is: as long as the amount of the payment amount of the account used by the user for the current credential information is lower than the amount of the payment amount of the account used in the credential information, the payment amount of the account can be used through the credential information; the second case is: as long as the amount of the payment amount of the account used by the user for the current credential information is not equal to the amount of the payment amount of the account used in the credential information, the payment amount of the account cannot be used through the credential information.
Subsequently, the server establishes a corresponding relationship between the payment authority and the credential information after the information setting is completed, and meanwhile, a corresponding relationship between the credential information after the information setting is completed and the account needs to be established and stored.
Continuing with the above example, after the server generates credential information, assume that the user a sets the information in the generated credential information as follows:
setting the using period of the credential information to be 2016, 1 month and 20 days to 2016, 2 months and 15 days, setting the using geographic range of the credential information to be Beijing, setting the payment amount limit of the account number of the credential information to be 500 yuan, and setting the using object of the credential information to be any object.
After the user A finishes setting the information, the server establishes the corresponding relationship between the payment authority and the credential information after finishing setting the information, and meanwhile, the corresponding relationship between the credential information after finishing setting the information and the account needs to be established and stored.
By the method, the user can directly pay by using the account through the credential information, so that the account is not used for payment through own terminal equipment and authorization equipment on the premise of not revealing the account information, and the safety risk of payment by using the account is effectively reduced.
In addition, in the present application, an identifier of the credential information needs to be established, specifically, the basic information mentioned in step S102 may be used as the identifier of the credential information, the credential information and the identifier thereof (that is, the basic information) are stored, the credential information and the payment authority of the account corresponding to the credential information are stored, and the terminal may find the credential information to be used through the identifier of the credential information.
The above is a method for authority management provided in this embodiment of the application, credential information may be established by the above method, and subsequently, when a user needs to use an account to make a payment, the user can use the payment amount in the user account to make a payment through the credential information, and the whole resource control process is as shown in fig. 4.
Fig. 4 shows a process of resource control according to an embodiment of the present application, which specifically includes the following steps:
s401: and receiving a payment request sent by a user.
In practical application, a user needs to pay through a payment application installed on a terminal device in the process of actual shopping, but if the user does not currently carry the terminal device (such as a mobile phone) of the user at the moment and a merchant does not have an authorization device, the user can use the terminal device (such as a mobile phone) of the merchant to pay through the payment amount in an account according to the credential information.
In the whole process of payment by using the credential information, when the user uses the terminal device of the merchant, the payment amount can be preset and the payment object can be set.
Subsequently, in the process of establishing credential information by the user directly by means of memory reading in advance, the terminal carries the collected read multimedia information of the user in the payment request and sends the request to the server, and for convenience of explaining the implementation scheme of the application, the following description takes the multimedia information input by the user as voice information as an example.
For example, in an actual shopping process, since the user a does not currently carry his/her mobile phone and the merchant does not have an authorization device, the user a prepares to pay by using the credential information established in steps S301 to S305 through the merchant' S mobile phone.
The user A sets the payment amount of 50 yuan on a payment application in a mobile phone of a merchant, sets the merchant as a payment object, prompts the user A to read basic information (namely, you and my others) corresponding to the credential information in the examples from the step S301 to the step S305 by memory, collects voice information read by the user A, and sends a payment request carrying the voice information to a server.
S402: converting the multimedia information into basic information;
continuing to use the above example, after receiving a payment request sent by a user, the server converts voice information carried in the payment request into basic information in a voice recognition mode, that is, converts the voice information into text information: you are me.
S403: according to the basic information, confirming credential information corresponding to the basic information in each pre-stored credential information;
continuing with the above example, the server determines, from the basic information "you-me-he" (i.e., the identification of the credential information), the credential information corresponding to the basic information among the pre-stored credential information.
S404: verifying the payment request according to the credential information;
s405: and when the authentication is passed, the account is used for payment according to the payment authority of the account corresponding to the credential information.
Continuing to use the above example, after the server determines the credential information, the server directly extracts the standard voice information from the credential information, takes the voice information carried in the payment request as the voice information to be verified, compares the voice information to be verified with the standard voice information, determines the similarity between the voice information to be verified and the standard voice information, and if the similarity is smaller than a preset threshold and the number of reading times does not exceed the preset threshold, the server may prompt the user a to read again, and perform verification again
Assuming that the similarity is greater than a preset threshold, and verifying the information set in the credential information is started, that is, setting the lifetime of the credential information to be 2016, 1, 20, to 2016, 2, 15, setting the geographic range of use of the credential information to be beijing, setting the amount of payment of the account number of use of the credential information to be 500 yuan (assuming that the first case mentioned in step S305 is taken as an example here), prompting the user a to input a password for payment if any object of use of the credential information passes verification.
Subsequently, after receiving the password sent by the user A, the server firstly confirms whether the equipment used by the user A for sending the password is consistent with the equipment used by the user A for sending the credential using request, if not, the server directly sends prompt information to the equipment used by the user A for sending the credential using request, prompts the user A that the current credential using information has environmental risk on account control, and proposes to cancel the credential using request.
If the equipment is consistent, the password input by the user A is continuously verified, if the password input by the user A is inconsistent with the password contained in the credential information, the user A can be prompted to input the password again, if the password input times exceed the preset times, the payment authority of the account corresponding to the credential information is refused, the credential information is frozen, and if the password input by the user A is consistent with the password contained in the credential information, the account of the user A is used for completing the payment of the shopping and prompting the user to pay successfully.
By the method, the user can directly pay by using the account through the credential information, so that the account is not used for payment through own terminal equipment and authorization equipment on the premise of not revealing the account information, and the safety risk of payment by using the account is effectively reduced.
Based on the same idea, the present embodiment provides four devices, that is, a first device for rights management, as shown in fig. 5, a first device for rights management, as shown in fig. 6, a second device for rights management, as shown in fig. 7, and a second device for resources control, as shown in fig. 8.
Fig. 5 is a schematic structural diagram of a first rights management apparatus according to an embodiment of the present application, where the apparatus includes:
a receiving module 501, configured to receive a credential generation request sent by a user through an account;
a providing module 502 for providing basic information to the user;
an acquisition module 503, configured to acquire multimedia information input by the user according to the basic information;
a generating module 504, configured to generate credential information according to the multimedia information;
a corresponding relationship establishing module 505, configured to establish a corresponding relationship between the control authority of the account and the credential information, and store the corresponding relationship.
The device further comprises:
a password generating module 506, configured to receive a password input by the user before the generating module 504 generates credential information according to the multimedia information, where the generating module 504 is specifically configured to generate credential information according to the multimedia information and the password.
The device further comprises:
an information setting module 507, configured to receive setting information sent by the user for the credential information before the corresponding relationship between the control authority of the account and the credential information is established by the corresponding relationship establishing module 505, and set the credential information according to the setting information, where the setting information includes: at least one of the service life of the credential information, the geographic range of use of the credential information, the amount of resources of the account used by the credential information, and the object of use of the credential information.
The correspondence establishing module 505 is specifically configured to use the basic information as an identifier of the credential information, store the credential information and the identifier thereof, and store the credential information and the control authority of the account corresponding to the credential information.
The multimedia information includes voice information.
Fig. 6 is a schematic structural diagram of a first resource control apparatus according to an embodiment of the present application, where the apparatus includes:
a receiving module 601, configured to receive a credential use request sent by a user, where the credential use request carries multimedia information input by the user;
a conversion module 602, configured to convert the multimedia information into basic information;
a determining module 603, configured to determine, according to the basic information, credential information corresponding to the basic information from pre-stored credential information;
a verification module 604, configured to verify the credential use request according to the credential information;
and the control module 605 is configured to, when the authentication passes, perform resource control on the account according to the control authority of the account corresponding to the credential information.
The multimedia information is voice information;
the conversion module 602 is specifically configured to convert the multimedia information into basic information in a voice recognition manner.
The verification module 604 is specifically configured to extract standard multimedia information included in the credential information, use multimedia information carried in the credential use request as to-be-verified multimedia information, compare the to-be-verified multimedia information with the standard multimedia information, determine a similarity between the to-be-verified multimedia information and the standard multimedia information, determine that the credential use request is verified when the similarity is greater than a set threshold, and determine that the credential use request is not verified when the similarity is not greater than the set threshold.
The device further comprises:
setting an information verification module 606, configured to determine that the current time falls within the service life corresponding to the credential information, and determine that the current geographic position of the user falls within the geographic usage range corresponding to the credential information before the control module 605 performs resource control on the account according to the control permission of the account corresponding to the credential information, and determine that the resource amount of the resource currently used by the user does not exceed the amount corresponding to the credential information, and determine that a usage object of the credential information currently used by the user is consistent with the usage object corresponding to the credential information.
The device further comprises:
a password verification module 607, configured to receive the password sent by the user before the control module 605 performs resource control on the account according to the control authority of the account corresponding to the credential information, and determine that the received password is consistent with the password corresponding to the credential information.
The device further comprises:
a device verification module 608, configured to determine that a device used by the user to send a password is consistent with a device used by the user to send the credential use request before the control module 605 performs resource control on the account according to the control permission of the account corresponding to the credential information.
Fig. 7 is a schematic structural diagram of a second rights management device according to an embodiment of the present application, where the device includes:
a receiving module 701, configured to receive a credential generation request sent by a user through an account;
a providing module 702 for providing basic information to the user;
an acquisition module 703, configured to acquire multimedia information input by the user according to the basic information;
a generating module 704, configured to generate credential information according to the multimedia information;
the corresponding relationship establishing module 705 is configured to establish a corresponding relationship between the payment authority of the account and the credential information, and store the corresponding relationship.
The device further comprises:
an information setting module 706, configured to receive setting information sent by the user for the credential information before the corresponding relationship establishing module 705 establishes a corresponding relationship between the payment authority of the account and the credential information, and set the credential information according to the setting information, where the setting information includes: at least one of the service life of the credential information, the geographic range of use of the credential information, the payment amount of the account number used by the credential information, and the payment object of the credential information.
The correspondence establishing module 705 is specifically configured to use the basic information as an identifier of the credential information, store the credential information and the identifier thereof, and store the credential information and the payment authority of the account corresponding to the credential information.
Fig. 8 is a schematic structural diagram of a second resource control apparatus according to an embodiment of the present application, where the apparatus includes:
a receiving module 801, configured to receive a payment request sent by a user, where the payment request carries multimedia information input by the user;
a conversion module 802, configured to convert the multimedia information into basic information;
a determining module 803, configured to determine credential information corresponding to the basic information in pre-stored credential information according to the basic information;
a verification module 804, configured to verify the payment request according to the credential information;
and the control module 805 is configured to use the account to pay according to the payment authority of the account corresponding to the credential information when the authentication passes.
The device further comprises:
setting information verification module 806, configured to determine that the current time falls within the service life corresponding to the credential information before the control module 805 uses the account to pay according to the payment authority of the account corresponding to the credential information, and determine that the current geographic position of the user falls within the use geographic range corresponding to the credential information, and determine that the amount of the payment amount currently paid by the user is not more than the payment amount corresponding to the credential information, and determine that the payment object currently used by the user is consistent with the payment object corresponding to the credential information.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (26)

1. A method of rights management, the method comprising:
receiving a credential generation request sent by a user through an account;
providing basic information to the user;
collecting multimedia information input by the user according to the basic information, wherein the multimedia information is video information or voice information;
generating credential information according to the multimedia information;
establishing a corresponding relation between the control authority of the account and the credential information, and storing the control authority and the credential information;
and taking the basic information as the identification of the credential information, and storing the credential information and the identification thereof, so that the credential information corresponding to the basic information can be determined in each pre-stored credential information according to the basic information.
2. The method of claim 1, wherein prior to generating credential information from the multimedia information, the method further comprises:
receiving a password input by the user;
generating credential information according to the multimedia information, specifically comprising:
and generating credential information according to the multimedia information and the password.
3. The method of claim 1, wherein before establishing the correspondence between the control authority of the account and the credential information, the method further comprises:
receiving setting information sent by the user aiming at the credential information;
setting the credential information according to the setting information;
wherein the setting information includes: at least one of the service life of the credential information, the geographic range of use of the credential information, the amount of resources of the account used by the credential information, and the object of use of the credential information.
4. A method of resource control, the method comprising:
receiving a credential use request sent by a user, wherein the credential use request carries multimedia information input by the user, and the multimedia information is video information or voice information;
converting the multimedia information into basic information;
determining credential information corresponding to the basic information in prestored credential information according to the basic information by taking the basic information as an identifier;
verifying the credential use request according to the credential information;
and when the verification is passed, performing resource control on the account according to the control authority of the account corresponding to the credential information.
5. The method of claim 4, wherein the multimedia information is voice information;
converting the multimedia information into basic information, specifically comprising:
and converting the multimedia information into basic information in a voice recognition mode.
6. The method of claim 4, wherein verifying the credential use request based on the credential information comprises:
extracting standard multimedia information contained in the credential information;
the multimedia information carried in the credential use request is used as the multimedia information to be verified;
comparing the multimedia information to be verified with the standard multimedia information, and determining the similarity of the multimedia information to be verified and the standard multimedia information;
when the similarity is larger than a set threshold value, determining that the credential use request passes verification;
when the similarity is not greater than a set threshold, determining that the credential use request validation fails.
7. The method of claim 4, wherein before performing resource control on the account according to the control authority of the account corresponding to the credential information, the method further comprises:
and determining that the current time falls into the service life corresponding to the credential information, determining that the current geographic position of the user falls into the service geographic range corresponding to the credential information, determining that the resource amount of the current resource used by the user is not more than the amount corresponding to the credential information, and determining that the user currently uses the use object of the credential information is consistent with the use object corresponding to the credential information.
8. The method of claim 4, wherein before performing resource control on the account according to the control authority of the account corresponding to the credential information, the method further comprises:
receiving a password sent by the user;
and determining that the received password is consistent with the password corresponding to the credential information.
9. The method of claim 8, wherein before performing resource control on the account according to the control authority of the account corresponding to the credential information, the method further comprises:
determining that the device used by the user to send the password is consistent with the device used by the user to send the credential use request.
10. A method of rights management, the method comprising:
receiving a credential generation request sent by a user through an account;
providing basic information to the user;
collecting multimedia information input by the user according to the basic information, wherein the multimedia information is video information or voice information;
generating credential information according to the multimedia information;
establishing a corresponding relation between the payment authority of the account and the credential information, and storing the corresponding relation;
and taking the basic information as the identification of the credential information, and storing the credential information and the identification thereof, so that the credential information corresponding to the basic information can be determined in each pre-stored credential information according to the basic information.
11. The method of claim 10, wherein prior to establishing the correspondence between the payment rights of the account and the credential information, the method further comprises:
receiving setting information sent by the user aiming at the credential information;
setting the credential information according to the setting information;
wherein the setting information includes: at least one of the service life of the credential information, the geographic range of use of the credential information, the payment amount of the account number used by the credential information, and the payment object of the credential information.
12. A method of resource control, the method comprising:
receiving a payment request sent by a user, wherein the payment request carries multimedia information input by the user, and the multimedia information is video information or voice information;
converting the multimedia information into basic information;
determining credential information corresponding to the basic information in prestored credential information according to the basic information by taking the basic information as an identifier;
verifying the payment request according to the credential information;
and when the authentication is passed, the account is used for payment according to the payment authority of the account corresponding to the credential information.
13. The method of claim 12, wherein before the account is used for payment according to the payment authority of the account corresponding to the credential information, the method further comprises:
confirm that the present moment falls into in the life time that credential information corresponds, just, confirm the user's present geographical position falls into the use geographical range that credential information corresponds, just, confirm that the amount of money of the payment amount that the user carries out payment at present does not exceed the payment amount that credential information corresponds, just, confirm that the user uses at present credential information's payment object with the payment object that credential information corresponds is unanimous.
14. An apparatus for rights management, the apparatus comprising:
the receiving module is used for receiving a credential generation request sent by a user through an account;
a providing module for providing basic information to the user;
the acquisition module is used for acquiring multimedia information input by the user according to the basic information, wherein the multimedia information is video information or voice information;
the generating module is used for generating credential information according to the multimedia information;
the corresponding relation establishing module is used for establishing the corresponding relation between the control authority of the account and the credential information and storing the corresponding relation; and taking the basic information as the identification of the credential information, and storing the credential information and the identification thereof, so that the credential information corresponding to the basic information can be determined in each pre-stored credential information according to the basic information.
15. The apparatus of claim 14, wherein the apparatus further comprises:
the password generating module is configured to receive a password input by the user before the generating module generates credential information according to the multimedia information, and the generating module is specifically configured to generate credential information according to the multimedia information and the password.
16. The apparatus of claim 14, wherein the apparatus further comprises:
an information setting module, configured to receive setting information sent by the user for the credential information before the corresponding relationship establishing module establishes the corresponding relationship between the control authority of the account and the credential information, and set the credential information according to the setting information, where the setting information includes: at least one of the service life of the credential information, the geographic range of use of the credential information, the amount of resources of the account used by the credential information, and the object of use of the credential information.
17. An apparatus for resource control, the apparatus comprising:
the receiving module is used for receiving a credential use request sent by a user, wherein the credential use request carries multimedia information input by the user, and the multimedia information is video information or voice information;
the conversion module is used for converting the multimedia information into basic information;
the determining module is used for determining credential information corresponding to the basic information in each pre-stored credential information according to the basic information by taking the basic information as an identifier;
the verification module is used for verifying the credential use request according to the credential information;
and the control module is used for controlling resources of the account according to the control authority of the account corresponding to the credential information when the authentication passes.
18. The apparatus of claim 17, wherein the multimedia information is voice information;
the conversion module is specifically configured to convert the multimedia information into basic information in a voice recognition manner.
19. The apparatus of claim 17, wherein the validation module is specifically configured to extract standard multimedia information included in the credential information, use multimedia information carried in the credential use request as to-be-validated multimedia information, compare the to-be-validated multimedia information with the standard multimedia information, determine a similarity between the to-be-validated multimedia information and the standard multimedia information, determine that the credential use request is validated when the similarity is greater than a set threshold, and determine that the credential use request is not validated when the similarity is not greater than the set threshold.
20. The apparatus of claim 17, wherein the apparatus further comprises:
and the setting information verification module is used for determining that the current time falls into the service life corresponding to the credential information before the control module performs resource control according to the control authority of the account corresponding to the credential information, determining that the current geographic position of the user falls into the use geographic range corresponding to the credential information, determining that the resource amount of the current resource used by the user is not more than the amount corresponding to the credential information, and determining that the user currently uses the use object of the credential information is consistent with the use object corresponding to the credential information.
21. The apparatus of claim 17, wherein the apparatus further comprises:
and the password verification module is used for receiving the password sent by the user and determining that the received password is consistent with the password corresponding to the credential information before the control module controls the resource of the account according to the control authority of the account corresponding to the credential information.
22. The apparatus of claim 21, wherein the apparatus further comprises:
and the device verification module is used for determining that the device used by the user for sending the password is consistent with the device used by the user for sending the credential use request before the control module performs resource control on the account according to the control permission of the account corresponding to the credential information.
23. An apparatus for rights management, the apparatus comprising:
the receiving module is used for receiving a credential generation request sent by a user through an account;
a providing module for providing basic information to the user;
the acquisition module is used for acquiring multimedia information input by the user according to the basic information, wherein the multimedia information is video information or voice information;
the generating module is used for generating credential information according to the multimedia information;
the corresponding relation establishing module is used for establishing the corresponding relation between the payment authority of the account and the credential information and storing the corresponding relation; and taking the basic information as the identification of the credential information, and storing the credential information and the identification thereof, so that the credential information corresponding to the basic information can be determined in each pre-stored credential information according to the basic information.
24. The apparatus of claim 23, wherein the apparatus further comprises:
an information setting module, configured to receive setting information sent by the user for the credential information before the corresponding relationship establishing module establishes the corresponding relationship between the payment authority of the account and the credential information, and set the credential information according to the setting information, where the setting information includes: at least one of the service life of the credential information, the geographic range of use of the credential information, the payment amount of the account number used by the credential information, and the payment object of the credential information.
25. An apparatus for resource control, the apparatus comprising:
the system comprises a receiving module, a payment processing module and a payment processing module, wherein the receiving module is used for receiving a payment request sent by a user, the payment request carries multimedia information input by the user, and the multimedia information is video information or voice information;
the conversion module is used for converting the multimedia information into basic information;
the determining module is used for determining credential information corresponding to the basic information in each pre-stored credential information according to the basic information by taking the basic information as an identifier;
the verification module is used for verifying the payment request according to the credential information;
and the control module is used for carrying out payment by using the account according to the payment authority of the account corresponding to the credential information when the authentication is passed.
26. The apparatus of claim 25, wherein the apparatus further comprises:
the setting information verification module is used for determining that the current time falls into the service life corresponding to the credential information before the account is used for payment according to the payment authority of the account corresponding to the credential information by the control module, determining that the current geographic position of the user falls into the use geographic range corresponding to the credential information, determining that the amount of the payment amount currently paid by the user is not more than the payment amount corresponding to the credential information, and determining that the payment object of the credential information currently used by the user is consistent with the payment object corresponding to the credential information.
CN201610096550.7A 2016-02-22 2016-02-22 Method and device for authority management and resource control Active CN107104922B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610096550.7A CN107104922B (en) 2016-02-22 2016-02-22 Method and device for authority management and resource control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610096550.7A CN107104922B (en) 2016-02-22 2016-02-22 Method and device for authority management and resource control

Publications (2)

Publication Number Publication Date
CN107104922A CN107104922A (en) 2017-08-29
CN107104922B true CN107104922B (en) 2020-07-03

Family

ID=59658730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610096550.7A Active CN107104922B (en) 2016-02-22 2016-02-22 Method and device for authority management and resource control

Country Status (1)

Country Link
CN (1) CN107104922B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579984B (en) * 2019-09-30 2024-03-15 广州艾美网络科技有限公司 Multimedia information authentication method, system, computer device and storage medium
CN114401128A (en) * 2021-12-31 2022-04-26 上海天诚比集科技有限公司 token leakage checking method and device and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102916815A (en) * 2012-11-07 2013-02-06 华为终端有限公司 Method and device for checking identity of user
CN103532716A (en) * 2013-10-10 2014-01-22 中国联合网络通信集团有限公司 Electronic certificate realizing method, certificate management platform and voice authentication center
CN104022879A (en) * 2014-05-29 2014-09-03 金蝶软件(中国)有限公司 Voice security verification method and apparatus
CN104104664A (en) * 2013-04-11 2014-10-15 腾讯科技(深圳)有限公司 Method, server, client and system for verifying verification code
CN104168270A (en) * 2014-07-31 2014-11-26 腾讯科技(深圳)有限公司 Identity verifying method, server, client side and system
CN104219050A (en) * 2014-08-08 2014-12-17 腾讯科技(深圳)有限公司 Voiceprint verification method and system, voiceprint verification server and voiceprint verification client side
CN104219195A (en) * 2013-05-29 2014-12-17 腾讯科技(深圳)有限公司 Identity verifying method, device and system
CN104598791A (en) * 2014-11-29 2015-05-06 深圳市金立通信设备有限公司 Voice unlocking method
CN104821934A (en) * 2015-03-20 2015-08-05 百度在线网络技术(北京)有限公司 Artificial intelligence based voice print login method and device
CN104834847A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Identity verification method and device
CN105141619A (en) * 2015-09-15 2015-12-09 北京云知声信息技术有限公司 Account login method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7571100B2 (en) * 2002-12-03 2009-08-04 Speechworks International, Inc. Speech recognition and speaker verification using distributed speech processing

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102916815A (en) * 2012-11-07 2013-02-06 华为终端有限公司 Method and device for checking identity of user
CN104104664A (en) * 2013-04-11 2014-10-15 腾讯科技(深圳)有限公司 Method, server, client and system for verifying verification code
CN104219195A (en) * 2013-05-29 2014-12-17 腾讯科技(深圳)有限公司 Identity verifying method, device and system
CN103532716A (en) * 2013-10-10 2014-01-22 中国联合网络通信集团有限公司 Electronic certificate realizing method, certificate management platform and voice authentication center
CN104834847A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Identity verification method and device
CN104022879A (en) * 2014-05-29 2014-09-03 金蝶软件(中国)有限公司 Voice security verification method and apparatus
CN104168270A (en) * 2014-07-31 2014-11-26 腾讯科技(深圳)有限公司 Identity verifying method, server, client side and system
CN104219050A (en) * 2014-08-08 2014-12-17 腾讯科技(深圳)有限公司 Voiceprint verification method and system, voiceprint verification server and voiceprint verification client side
CN104598791A (en) * 2014-11-29 2015-05-06 深圳市金立通信设备有限公司 Voice unlocking method
CN104821934A (en) * 2015-03-20 2015-08-05 百度在线网络技术(北京)有限公司 Artificial intelligence based voice print login method and device
CN105141619A (en) * 2015-09-15 2015-12-09 北京云知声信息技术有限公司 Account login method and device

Also Published As

Publication number Publication date
CN107104922A (en) 2017-08-29

Similar Documents

Publication Publication Date Title
EP3591931B1 (en) Authentication method, and authentication data processing method and device based on blockchain
CN111541656B (en) Identity authentication method and system based on converged media cloud platform
CN110768968B (en) Authorization method, device, equipment and system based on verifiable statement
EP2929479B1 (en) Method and apparatus of account login
CN113114624B (en) Identity authentication method and device based on biological characteristics
EP3439230A1 (en) Method and device for registering biometric identity and authenticating biometric identity
CN107231234B (en) Identity registration method and device
CN107196901B (en) Identity registration and authentication method and device
CN107204957B (en) Account binding and service processing method and device
KR102372571B1 (en) Mobile payment methods, devices and systems
CN108965250B (en) Digital certificate installation method and system
CN105868970B (en) authentication method and electronic equipment
CN106897586B (en) Application Programming Interface (API) authority management method and device
CN112769735B (en) Resource access method, device and system
CN104184713A (en) Terminal identification method, machine identification code registration method, and corresponding system and equipment
US11218464B2 (en) Information registration and authentication method and device
CN110545274A (en) Method, device and system for UMA service based on people and evidence integration
CN107645474B (en) Method and device for logging in open platform
CN107104922B (en) Method and device for authority management and resource control
CN107679383B (en) Identity verification method and device based on geographic position and touch area
WO2018209623A1 (en) Systems, devices, and methods for performing verification of communications received from one or more computing devices
CN106533685B (en) Identity authentication method, device and system
GB2520938A (en) Mobile device location
KR101705293B1 (en) Authentication System and method without secretary Password
CN113259340B (en) Block chain data processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1242069

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201013

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201013

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right