Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special
Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step,
Operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
It is the implementation process schematic diagram of identity identifying method provided in an embodiment of the present invention referring to Fig. 1, this method can be applied
Real-name authentication during the network trading of multiple systems, the real-name authentication are to be inputted by particular organization according to user
Name and both identification card number inquiry judgings it is whether consistent, and obtain the process of verification result, for example, in the bill of lading, sign or put
Whether the operating process of the transaction systems such as money is possible to inquiry client identity true, can all carry out authentication, and different behaviour
The authentication for making system may carry out inquiry certification to the same identity.As shown, this method may include following
Step:
Step S101 receives user identity authentication request.
In the present embodiment, user identity authentication request includes the identification card number and address name of user's input;User exists
Network trading is carried out, such as carries out the network bill of lading or the processes such as make loans, needs to carry out the certification of user identity in different systems,
Entire transaction flow could be completed by the cooperation of multiple systems, i.e., can receive multiple user identity authentication request.
Classification storage can be carried out to identity information according to user identity authentication request, the more frequent body of number will be authenticated
Part information identity information less with certification number is stored respectively to different databases, according to the authentication of current slot
The storage location of frequency change of status information.
Step S102 inquires first database according to the ID authentication request.
In the present embodiment, the first database can be the level cache mechanism of authentication, can be Redis number
According to library, the memory storage for identity authorization system authenticates the more frequent identity information of number, can provide faster access
Speed;First database is also possible to flash memory database, such as mongodb database.
The first database stores effective identity data, and first database is provided with fixed storage time, such as can
Storage time is arranged as 7 days, identity data in first database 7 days effectively, after 7 days identity data auto-destruct or is deleted
It removes.Specific in practical application, a transaction from the bill of lading, air control, make loans, trade and complete basic need week age, it is same
The certification of identification card number concentrates on to occur frequently to authenticate in one week substantially, therefore the data frequently authenticated storage is counted to first
According to library, facilitate the quick response of identification authentication data.
Step S103 is looked into if valid data corresponding with the ID authentication request are not present in the first database
Ask the second database.
In the present embodiment, second database can be the second caching mechanism of authentication, can be mysql number
Hard-disc storage identity information according to library, for identity authorization system;Second database includes all data in the first data, if
The second database is then inquired in loss of data or failure in first database.Second database be also possible to oracle database or
Local file storage.
Since subscriber identity information irregular can change, such as name change or identity card expire and replace photo
Deng when inquiring the second database, the significant figure within 30 days can be inquired by 30 days validity periods of the second data lab setting
According to the second database can store more identity informations, and identity information data will not be lost after power-off.
The valid data include the name and identification card number information of user, can be requested by authentication determination user
Whether information name is consistent with identification card number.
Further, as shown in Fig. 2, after inquiring first database according to the ID authentication request, the method
Further include:
If there is valid data corresponding with the ID authentication request, return authentication result in the first database.
In the present embodiment, the valid data include name corresponding with ID authentication request or identification card number, certification
As a result the name and the consistent authentication result of identification card number that can be user identity authentication request, are also possible to inconsistent knot
Fruit;If authentication result unanimously if return to corresponding with user identity authentication request name and identification card number information.
Step S104 is returned if second database has valid data corresponding with the ID authentication request
Authentication result.
In the present embodiment, the valid data of the second database purchase include address name and identification card number, authentication result
Name including user identity authentication request is consistent or inconsistent with identification card number;If the consistent consistent result of return authentication is simultaneously shown
The name and identification card number for showing user's checking, return authentication is inconsistent as a result, not showing correct name if inconsistent
Or identification card number, avoid user information from leaking.
Further, if as shown in Fig. 2, existing in second database corresponding with the ID authentication request effective
Data, then before return authentication result, the method also includes:
If there are valid data corresponding with the ID authentication request in second database, by the valid data
It is stored in the first database.
In the present embodiment, completing a transaction flow needs multiple systems to carry out authentication, the same identification card number
It repeatedly can frequently be authenticated, when valid data corresponding with ID authentication request are not present in first database, in the second database
There are corresponding valid data, then store valid data corresponding with current ID authentication request to first database, so as to
It receives ID authentication request next time directly to inquire in first database, obtains corresponding verification result.
Wherein, the lookup of valid data is carried out in the second data block, the authentication result of acquisition is either consistent or different
It causes, as long as there is valid data corresponding with user identity authentication request, stores corresponding valid data to first database.
Further, if as shown in Fig. 2, having in the first database there is no corresponding with the ID authentication request
Data are imitated, then are inquired after the second database, the method also includes:
If valid data corresponding with the ID authentication request, checking real name certification is not present in second database
System;
If authentication result be it is inconsistent, receive authentication result.
In the present embodiment, inquiry certification conscientious to user identity, can inquire first database, if first database first
There is no valid data, then inquire the second database, if the data of the second database are expired, to third party's charge authentication
System carries out inquiry certification;If as a result address name and identification card number are inconsistent by certification, then receive third party's charge identity
The certification that Verification System is sent is inconsistent as a result, and will not show valid data.
Further, if as shown in Fig. 2, having in second database there is no corresponding with the ID authentication request
Imitate data, then after checking real name Verification System, the method also includes:
If authentication result be it is consistent, valid data are stored in second database and the first database, and connect
Receive authentication result.
In the present embodiment, if being consistent, the i.e. name of user in the charge authentication result of identity authorization system of third party
It is consistent with identification card number, then success is authenticated, and the valid data of certification are sent to first database and the progress of the second database
Storage, to carry out the inquiry certification of common identity card number in other transaction systems.Such as:Bill of lading system is to Zhang San/identity card
Numbers 4202211199502282010 progress thirds put the authentication of charge identity authorization system, and authenticate success, and described
Three/identification card number, 4202211199502282010 information can be stored to first database and the second lane database, if in 7 days,
Credit approval system is also required to authenticate Zhang San/identification card number 4202211199502282010, then directly in the first data
Library or and caching mechanism in inquire 4202211199502282010 valid data of Zhang San/identification card number;If more than 30ian
Afterwards, customer service system is also required to authenticate Zhang San/identification card number 4202211199502282010, then can be in the second database
It inquires corresponding valid data, but the validity period more than 30 days, the expired data of the second database are no longer valid data, identity
Verification System can inquire third party's charge identity authorization system again.
In addition, in order to which same subscriber identity information is repeatedly authenticated and reduced certification expense, it can also be by authentication result
Other subsequent operation systems are transferred to, subsequent operation system carries out subsequent authentication according to authentication result, is no longer third party
The authentication of charging system, such as:5 system ABCDE cooperations are needed to complete in a transaction, wherein ABCD system
It is required to do Zhang San's authentication, then sending all information of certification of Zhang San to after A system finishes the authentication of Zhang San
All information of the certification of Zhang San are also sent to C system by B system, B system, and C system is similarly all information of the certification of Zhang San
D system is sent to, to achieve the purpose that once to authenticate shared by multiple systems authentication result.
Through the embodiment of the present invention, it is looked by repeating the identity information of certification in first database or the second database
Certification is ask, the expense of authentication is reduced;The identity information of different authentication frequency is divided according to the frequency of identity information certification
Class storage, improves the response speed of database, reduces response delay, the working efficiency of the verification process of raising;It will certification
The different identity information of frequency is cached respectively to different databases, while improving service performance and response efficiency, is also dropped
The low requirement of server hardware.
It should be noted that those skilled in the art are in the technical scope disclosed by the present invention, can be readily apparent that other
Sequencing schemes should also will not repeat them here within protection scope of the present invention.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
It is that the schematic diagram of identification authentication system provided in an embodiment of the present invention is only shown for ease of description referring to Fig. 3
Part related to the embodiment of the present invention.
The identification authentication system includes:
Receiving unit 31, for receiving user identity authentication request;
First enquiry module 32, for inquiring first database according to the ID authentication request;
Second enquiry module 33, if there is no corresponding with the ID authentication request effective for the first database
Data then inquire the second database;
Second return module 34, if there is significant figure corresponding with the ID authentication request for second database
According to then return authentication result.
Further, described device further includes:
First return module, if there is significant figure corresponding with the ID authentication request for the first database
According to then return authentication result.
Further, described device further includes:
Third enquiry module, if significant figure corresponding with the ID authentication request is not present for second database
According to then checking real name Verification System;
Authentication result receiving module, for receiving authentication result.
Through this embodiment, it is requested according to user identity authentication, inquires first database, if there is no have first database
Data are imitated, then the second database are inquired, if the second database, there are valid data, return authentication is as a result, carry out net in user
Network is related to the authentication of multiple systems when trading, it is no longer necessary to which each system carries out a real-name authentication, by data
The inquiry in library, reduces the number of user identity real-name authentication, to reduce authentication expense, improves authentication
Response speed;According to the frequency of identity information certification by the identity information classification storage of different authentication frequency, database is improved
Response speed, reduce response delay, the working efficiency of the verification process of raising;The different identity information of frequency point will be authenticated
The requirement of server hardware Huan Cun not be also reduced while improving service performance and response efficiency to different databases.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different functions
Unit, module are completed, i.e., the internal structure of the mobile terminal is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional module in embodiment can integrate in one processing unit, be also possible to
Each unit physically exists alone, and can also be integrated in one unit with two or more units, above-mentioned integrated unit
Both it can take the form of hardware realization, can also realize in the form of software functional units.In addition, the tool of each functional module
Body title is also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Module in above-mentioned mobile terminal
Specific work process, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
Fig. 4 is the schematic diagram for the identity authentication terminal equipment that one embodiment of the invention provides.As shown in figure 4, the embodiment
Identity authentication terminal equipment 4 include:It processor 40, memory 41 and is stored in the memory 41 and can be at the place
The computer program 42 run on reason device 40.The processor 40 realizes above-mentioned each identity when executing the computer program 42
Step in authentication method embodiment, such as step 101 shown in FIG. 1 is to 104.Alternatively, the processor 60 executes the meter
The function of each module/unit in above-mentioned each Installation practice, such as the function of module 31 to 34 shown in Fig. 3 are realized when calculation machine program 62
Energy.
Illustratively, the computer program 32 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 42 in the identity authentication terminal equipment 4 is described.
The identity authentication terminal equipment 4 can be desktop PC, notebook, palm PC and cloud server etc.
Calculate equipment.The identity authentication terminal equipment may include, but be not limited only to, processor 40, memory 41.Those skilled in the art
Member is appreciated that Fig. 4 is only the example of identity authentication terminal equipment 4, does not constitute the limit to identity authentication terminal equipment 4
It is fixed, it may include perhaps combining certain components or different components, such as the body than illustrating more or fewer components
Part certification terminal device can also include input-output equipment, network access equipment, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 41 can be the internal storage unit of the identity authentication terminal equipment 4, such as authentication end
The hard disk or memory of end equipment 4.The memory 41 is also possible to the External memory equipment of the identity authentication terminal equipment 4,
Such as the plug-in type hard disk being equipped in the identity authentication terminal equipment 4, intelligent memory card (Smart Media Card, SMC),
Secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the memory 41 may be used also
With the internal storage unit both including the identity authentication terminal equipment 4 or including External memory equipment.The memory 41 is used
Other programs and data needed for storing the computer program and the identity authentication terminal equipment.The memory 41
It can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to restrict the invention.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device
Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
May include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that:It still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.