CN109034816A - User information verification method, device, computer equipment and storage medium - Google Patents

User information verification method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109034816A
CN109034816A CN201810585016.1A CN201810585016A CN109034816A CN 109034816 A CN109034816 A CN 109034816A CN 201810585016 A CN201810585016 A CN 201810585016A CN 109034816 A CN109034816 A CN 109034816A
Authority
CN
China
Prior art keywords
user
information
target
verifying
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810585016.1A
Other languages
Chinese (zh)
Inventor
李云利
李辉
洪宇明
石宇
张文君
孙雄
张小敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810585016.1A priority Critical patent/CN109034816A/en
Priority to PCT/CN2018/094343 priority patent/WO2019232868A1/en
Publication of CN109034816A publication Critical patent/CN109034816A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of user information verification method, device, computer equipment and storage medium, which includes: to obtain user information checking request, and user information checking request includes target user's mark and target service type;It is identified based on target user and obtains user authentication information;The benchmark verifying field of the user information checking request is obtained based on the target service type, wherein the benchmark verifying field is at least two;User authentication information is inquired based on benchmark verifying field;If each benchmark verifying field all inquires the verify data to match in the user authentication information, the user information checking request is responded.The method increase user information verification efficiencies.

Description

User information verification method, device, computer equipment and storage medium
Technical field
The present invention relates to field of computer technology more particularly to a kind of user information verification methods, device, computer equipment And storage medium.
Background technique
Currently, when user handles the higher business of security requirement in an enterprise or platform, usually require into The verifying of row user information, and also need further to be authenticated and realized the process of verifying for user part message, example Such as, ID card information and bank card information.However, to user ID card information and bank card information authenticate when, It needs that third-party platform is entrusted to be authenticated, and needs to pay corresponding expense to third-party platform.Although this authentication Formula can guarantee the authenticity of user information, but verify link needs and take some time, and verification efficiency is lower.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of user that user information verification efficiency can be improved Information Authentication method, apparatus, computer equipment and storage medium.
A kind of user information verification method, comprising:
User information checking request is obtained, user information checking request includes target user's mark and target service type;
It is identified based on target user and obtains user authentication information;
The benchmark verifying field of the user information checking request is obtained based on the target service type, wherein described Benchmark verifying field is at least two;
User authentication information is inquired based on benchmark verifying field;
If each benchmark verifying field all inquires the verify data to match in the user authentication information, Respond the user information checking request.
A kind of user information verifying device, comprising:
First obtains module, and for obtaining user information checking request, user information checking request includes target user's mark Know and target service type;
Second obtains module, obtains user authentication information for identifying based on target user;
Third obtains module, and the benchmark for obtaining the user information checking request based on the target service type is tested Demonstrate,prove field, wherein the benchmark verifying field is at least two;
Enquiry module, for inquiring user authentication information based on benchmark verifying field;
First respond module, if all inquiring phase in the user authentication information for each benchmark verifying field Matched verify data then responds the user information checking request.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing The computer program run on device, the processor realize above-mentioned user information verification method when executing the computer program Step.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter The step of calculation machine program realizes above-mentioned user information verification method when being executed by processor.
Above-mentioned user information verification method, device, computer equipment and storage medium, server are getting user's checking After request, is identified based on the target user in user's checking request and obtain user authentication information, and by being based on target industry The benchmark verifying field that service type obtains inquires user authentication information, if each benchmark verifying field is all in user authentication information The verify data to match is inquired, then responds user information checking request.It through the above steps can be to avoid to doing When managing other business, pass through the user information of verifying, carried out repeated authentication, improves the efficiency of user information verifying.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of user information verification method in one embodiment of the invention;
Fig. 2 is a flow chart of user information verification method in one embodiment of the invention;
Fig. 3 is the flow chart verified in user information verification method to login in one embodiment of the invention;
Fig. 4 is the process integrated in user information verification method to user authentication information in one embodiment of the invention Figure;
Fig. 5 is the implementation flow chart of step S22 in user information verification method in one embodiment of the invention;
Fig. 6 is one verified in user information verification method to unmatched verify data in one embodiment of the invention Flow chart;
Fig. 7 is a flow chart of user information verification method in one embodiment of the invention;
Fig. 8 is a functional block diagram of user information verifying device in one embodiment of the invention;
Fig. 9 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
User information verification method provided by the present application, can be applicable in the application environment such as Fig. 1, wherein client (meter Calculate machine equipment) it is communicated by network with server-side.Client obtains user information checking request, and user information is verified Request is sent to server.After server-side gets user information checking request, carried out based on user information checking request corresponding Ground processing, and respond the user information checking request.Wherein, computer equipment can be, but not limited to various personal computers, pen Remember this computer, smart phone, tablet computer and portable wearable device.Server-side can be either more with independent server The server cluster of a server composition is realized.
In one embodiment, it as shown in Fig. 2, providing a kind of user information verification method, applies in Fig. 1 in this way It is illustrated, includes the following steps: for server-side
S10: obtaining user information checking request, and user information checking request includes target user's mark and target service class Type.
User information checking request refers to that user needs to handle corresponding business and trigger need to test identity information The request of card.Target user is identified as the corresponding user identifier of user for carrying out user information verifying, and user identifier is suitable for area The mark of point different user, for example, user identifier can be the ID card No. of user, or with the unique corresponding account of user Number ID etc..Target service type refers to the corresponding type of target service that user needs to handle, wherein different types of target industry The identity information that business needs to verify is different.
S20: it is identified based on target user and obtains user authentication information.
Since target user's mark has uniqueness, target user can be identified and be used as search field, retrieval should The user authentication information of target user's mark.It is alternatively possible to obtain user in big data platform based on target user's mark Verification information.
User authentication information is the subscriber identity information for having passed through verifying, and the user is when handling other business, it is possible to It needs to verify subscriber identity information, and passes through the verify data that verifying just will form corresponding user later, which exists The summation of verify data in different business is exactly its user authentication information.And in this step, it is obtained based on target user's mark User authentication information is taken, is to be identified by target user, it is right in the business handled in the past to obtain target user mark The user authentication information answered.Optionally, user authentication information may include name, identification card number, cell-phone number, the bank card of user Number or at least one of finger print information etc..Wherein, cell-phone number, bank's card number and the corresponding verification information of finger print information can be one It is either multinomial.
Such as: user is the first cell-phone number, Bank One Corp. by the user authentication information of verifying when handling a business Card number and left hand thumbprint information, when handling another business by the user authentication information of verifying be the second cell-phone number, Bank One Corp. card number and hand thumb finger print information.Therefore, the user's checking letter of the user obtained is identified based on target user Breath is the first cell-phone number, the second cell-phone number, Bank One Corp. card number, left hand thumbprint information and hand thumb finger print information.
S30: the benchmark verifying field of user information checking request is obtained based on target service type, wherein benchmark verifying Field is at least two.
Wherein, benchmark verifying field is to be verified in user information checking request in corresponding target service The corresponding field of subscriber identity information.Specifically, benchmark verifying field be at least two, for example, to subscriber identity information into When row verifying, can all be verified again on the basis of verifying the name of user at least one field (such as: bank card, identity card or Person's cell-phone number).Therefore, benchmark verifying field is at least two.For different target service types, that is verified is interior Difference can also be had by holding.For example, only may need to verify the name, identification card number and mobile phone of user for some general servicies Number, and for more core business, it may be necessary to verify the name of user, identification card number, cell-phone number, bank's card number and refer to Line information.Therefore by being based on target service type, the benchmark verifying field of the target service type is obtained.
For example, in the target service for handling the type, needing the name to user, body for a target service type Part card number, phone number and bank's card number are verified, then obtain user information checking request based on the target service type Benchmark verifying field is name, identification card number, phone number and bank's card number.
S40: user authentication information is inquired based on benchmark verifying field.
Specifically, it according to the benchmark verifying field of acquisition, is inquired in user authentication information needed for the target service type The subscriber identity information verified.For example, if benchmark verifying field is name, identification card number, phone number and bank card Number, then it is inquired in user authentication information based on said reference verifying field with the presence or absence of corresponding verify data.
S50: it if each benchmark verifying field all inquires the verify data to match in user authentication information, responds User information checking request.
Specifically, each benchmark verifying field all inquires the verify data to match in user authentication information, refers to There is verify data corresponding with benchmark verifying field in user authentication information.Even each benchmark verifying field can In user authentication information, the verify data that successful query matches to the target service type then responds the user information and tests Card request.Optionally, responding the user information checking request can be for by the user information checking request.
In the present embodiment, server is after getting user's checking request, based on the target in user's checking request User identifier obtains user authentication information, and the inquiry user of the benchmark verifying field by being obtained based on target service type is tested It demonstrate,proves information and responds user if each benchmark verifying field all inquires the verify data to match in user authentication information Information verification request.Through the above steps can to avoid to passed through when handling other business the user information of verifying into Row repeated authentication improves the efficiency of user information verifying.
In one embodiment, as shown in figure 3, before step S10, which further includes walking as follows It is rapid:
S11: obtaining landing request information, and landing request information includes target user's mark and target user's password.
In embodiments of the present invention, landing request information refers to that client is getting user in the input letter of login interface By processing after breath, and it is sent to the information in server-side.Landing request information includes target user's mark and target user Password.After target user mark and target user's password composition landing request information, client is by the landing request information It is sent to server-side, server-side obtains the landing request information.
Optionally, target user's mark and target user's password are also possible to client in the login for getting user's input It is encrypted after information.It can guarantee safety of the landing request information in data transmission procedure by encryption Property.
S12: target user's password is verified based on target user's mark.
Specifically, user can input or select Account Logon information according to certain prompt information when registration, wherein Account Logon information include user original user mark and log-in password, server-side after obtaining account log-on message, Account log-on message is stored in registration table.And target user's password is verified based on target user's mark Process specifically: server-side is based on target user's mark and finds corresponding original user mark in registration table, and will The original user identifies corresponding log-in password and target user's password is compared, if the two is identical, is proved to be successful.
Optionally, server-side encrypts the log-in password in account log-on message according to preset mode, obtains After encrypting registration password, then it is stored in registration table.At this point, the landing request information that client is sent to server-side is also By encryption.It should be noted that the mode encrypted to log-in password and the side to landing request information encryption Formula is identical.Therefore, the target user of the same user is identified, if the login password of input is identical as log-in password, plus The target user's password and encrypting registration password obtained after close is also identical.
Further, server-side is after obtaining landing request information, based on target user's mark in registration table The encrypting registration password for inquiring target user mark, if the encrypting registration password and the target user in landing request information are close Code is identical, then target user's password authentification success.
S13: if target user's password authentification success, sends type of service list.
In target user's password authentification success, then user logins successfully.After user logins successfully, then obtain in the platform Existing business, and generate existing traffic table, be sent to client, for selection by the user.Optionally, having traffic table includes There are business and corresponding type of service.
S14: obtaining target service type, generates user information verifying based on target user's mark and target service type and asks It asks.
Specifically, user selects a target service in the display interface of client, and client is by the target service pair The type of service answered identifies generation user information based on the target service type and target user and tests as target service type Card request.Then the user information checking request is sent to server-side by client, and server-side gets user information verifying Request.
In the present embodiment, user can be identified by the same target user and target user's password is in different platforms Register is carried out, the operation of repeated registration account is eliminated, while also because only one account of the same user identifier is believed Breath, and reduce the table capacity of server registration record sheet, save memory space.Further, it is verified in user information The verifying for carrying out log-on message to user before, ensure that the safety of user information verifying.Moreover, by client to The log-on message at family is encrypted, then is transferred to server-side and is carried out login authentication, can be improved the safety of the account information of user Property, it is effectively prevented from and the risk of password leakage occurs during data transmission.
In one embodiment, as shown in figure 4, before step S20 and after step slo, the user information authentication Method further includes following steps:
S21: the user authentication data table of each interface is obtained.
User authentication data table is the table for storing verify data when user handles different business, and uses the use The original user mark at family distinguishes the user authentication data table of each user.Wherein, it is set when original user is identified as user's registration The register account number set, user uniquely distinguish the mark of different user, for example, identification card number or account ID etc..
Specifically, corresponding interface is set in different business, for carrying out the interaction of data.Getting user letter After ceasing checking request, by obtaining the user authentication data table of each interface, in order to the subsequent integration for carrying out verify data table.
It is alternatively possible to data extraction module be added in each interface, for extracting user authentication information tables of data.It can Selection of land can extract user authentication data table, and be sent to service by data extraction module from the database of each interface End.Server-side gets the user authentication data table of each interface.Specifically, it as unit of being identified by original user, extracts User authentication data table of the same original user mark in each interface.
Preferably, it is also provided with data trigger, there are data to change in the database for working as either interface When, record data modification information.When the change for increasing, deleting or modifying occurs for the user authentication data table for detecting either interface When more, using data trigger by the user authentication data table after change, big data platform is sent to by data extraction module, Big data platform, which updates, replaces original user authentication data table.
S22: it is identified based on same original user, integrates user authentication data table, obtain user authentication information.
Specifically, it is identified based on same original user, in user authentication data table, the duplicate verify data of content is carried out Merge or screening, as unit of identifying by original user, forms the user authentication information of each original user mark.
It is alternatively possible to receive the user authentication data table sent by data extraction module, and will by big data platform These user authentication data tables are arranged, and re-send to server-side later, to improve Data Integration efficiency.
In the present embodiment, by obtaining the user authentication data table in each interface, by being based on same original user Mark, integrates the user authentication data table of each interface, so that the user authentication data of same original user mark is all In same table.When inquiring corresponding verify data in user information verifying, acquisition pair on each interface is not needed The user authentication data table answered, saves query time, improves search efficiency.
In one embodiment, it as shown in figure 5, in step S22, i.e., is identified based on same original user, integrates user's checking Tables of data obtains user authentication information, specifically comprises the following steps:
S221: being identified based on same original user, corresponding user authentication data obtained in user authentication data table, is used Family verify data includes original user mark, verifying content and verifying date.
Wherein, original user mark is the user identifier of different user in user authentication data table.Verifying content is the original The subscriber identity information that beginning user identifier passes through verifying.The verifying date refers to that the verifying content passes through the date of verifying.
S222: if obtaining identical test there are the user authentication data of identical verifying content in same original user mark The verifying date in the user authentication data of content is demonstrate,proved, as the target verification date.
Specifically, after the verifying content for getting same original user mark, inquiry is with the presence or absence of in identical verifying Hold, for example, the first phone number of same original user mark, had verified that in first interface and second interface, then should Original user identifies in corresponding user authentication data, can there is the user's checking number that two verifying contents are the first phone number According to.Identical verifying content if it exists then obtains the identical verifying content corresponding verifying date, as target verification day respectively Phase.
S223: being ranked up the target verification date, obtains newest target verification date and newest mesh after sequence Mark verifying date corresponding verifying content, and non-current target verification date corresponding user authentication data is deleted.
In the present embodiment, which refers to and gets the date of the user information checking request The immediate target verification date.
Specifically, after getting the target verification date, to the target verification date, according to the time order and function on target verification date It is ranked up.After being ranked up to the target verification date, only obtains the newest target verification date and the newest target is tested Date corresponding verifying content is demonstrate,proved, and non-current target verification date corresponding user authentication data is deleted.
Such as: user carried out verifying to name, identification card number and the first cell-phone number in first interface and second interface, And user, in the name of first interface, the target verification date of identification card number and the first cell-phone number is on March 15th, 2017, and is used Family is on May 8th, 2017 on the target verification date of the name of second interface, identification card number and the first cell-phone number, then user exists The verifying date of the name of second interface, identification card number and the first cell-phone number is the newest target verification date, and user is first The target verification date of the name of interface, identification card number and the first cell-phone number is the non-current target verification date.It can incite somebody to action at this time The verifying content obtained from first interface is that the user authentication data of name, identification card number and the first cell-phone number is deleted.
S224: summarize same original user and identify corresponding user authentication data, obtain user authentication information.
Further, same original with this after being integrated to the identical verifying content that same original user identifies Other verifying contents of user identifier are integrated, and the user authentication information of original user mark is obtained.
In order to better understand the technical solution of the present embodiment, below by one specifically example illustrate that integrating user tests Tables of data process is demonstrate,proved, details are as follows:
For example, verify data of the Zhang San in the user authentication data table of first interface be name, it is identification card number, first-hand The verifying date of machine number, Bank One Corp. card number and hand thumb fingerprint and every verifying content;Use of the Zhang San in second interface Verify data in the verify data table of family is name, identification card number, the second cell-phone number and secondary bank card number and every verifying The verifying date of content.
Wherein, the name and identification card number of Zhang San is identical verifying content, therefore judges the name and identity card of Zhang San Number respectively in the time order and function of first interface and the verifying date of second interface, pass through the operation of step S223 and step S224 Afterwards, the user authentication information for obtaining Zhang San is name, identification card number, the first cell-phone number, the second cell-phone number, Bank One Corp. of Zhang San The verifying date of card number, secondary bank card number and hand thumb fingerprint and every verifying content.
In the present embodiment, by being merged according to the target verification date to identical verifying content, and to user's checking Tables of data is integrated, and guarantees the succinct of user authentication information, improves the efficiency of subsequent query.
In one embodiment, as shown in fig. 6, after the step s 40, which further includes walking as follows It is rapid:
S41: at least one benchmark verifying field is inquired in user authentication information less than the verifying number to match if it exists According to then using corresponding benchmark verifying field as target verification field.
Optionally, there are at least one benchmark verifying fields is inquired in user authentication information less than the verifying number to match According to referring at least one benchmark verifying field, cannot be inquired from user authentication information and get corresponding verifying Data.For example, if benchmark verifying field is name and finger print information, and in user authentication information and finger print information is not present, then Inquiry is less than the verify data to match with finger print information in user authentication information.
Preferably, in user authentication information, the benchmark verifying field that the verify data to match has not been obtained further includes There is the verify data corresponding with benchmark verifying field in the user authentication information, but the timeliness of verify data is unsatisfactory for The target service types entail.It, can be according in type of service setting verifying when the verifying content to user is verified The timeliness of appearance.Wherein, timeliness refers to that from the verifying date to the date for obtaining target service type, the verifying date refers in the verifying Hold the date by verifying.Specifically, the timeliness of verify data is unsatisfactory for the target service types entail, can refer to the verifying The corresponding timeliness of data is more than the requirement of the timeliness to verify data of the target service type.
Such as: target service type requires the timeliness of verify data to be in half a year, if the verifying in user authentication information The data corresponding verifying date then determines the timeliness of the verify data to the date for obtaining target service type more than six months It is unsatisfactory for the requirement of the target service type, i.e. verify data and benchmark verifying field is unmatched.
Therefore, if it exists in user authentication information, the benchmark verifying field of the verify data to match has not been obtained, then The benchmark verifying field of the verify data to match will have not been obtained as target verification field, to prompt user to target verification Field is verified.
S42: target verification field validation request is sent based on target verification field.
Specifically, target verification field validation request is sent to client, to prompt user to the target verification field Corresponding verifying content is verified.Preferably, target verification field validation request includes target verification field.
S43: obtaining target verification field validation and request corresponding target verification information, if target verification Information Authentication is logical It crosses, then responds user information checking request.
Further, the verifying content that user includes into client feedback target verification field validation request, client The verifying content is obtained, is sent to server-side as target verification information.Server-side tests the target for receiving client transmission Card information is simultaneously verified, if being verified, responds user information checking request.
In the present embodiment, the benchmark authenticator of the verify data to match has not been obtained in user authentication information if it exists Section, then corresponding benchmark verifying field is verified, ensure that user information verifying timeliness, meanwhile, only verify with In the verification information of family, the benchmark verifying field of the verify data to match has not been obtained, is conducive to improve user information verifying Efficiency.
In one embodiment, as shown in fig. 7, in step S43, that is, user information checking request is responded.It specifically includes as follows Step:
S431: business safety grade is obtained based on target service type.
Specifically, business safety grade refers to the difference due to target service type, the business of target service type Security level is also different.Such as: the setting of business safety grade can be carried out according to the price for traffic of target service type, if The price for traffic is higher, then corresponding target service type is also higher.According to different business safety grades, different brackets is sent Subscriber authentication request.
S432: it is identified based on business safety grade and target user and sends corresponding subscriber authentication request.
Further, it can include but is not limited in subscriber authentication request: OTP (dynamic password, One-time Password), recognition of face or short-message verification etc., specific verification mode can be determined by business safety grade, not done herein Limitation.According to different business security level, the subscriber authentication request of different modes is sent.Preferably, business safety grade Higher, the mode of corresponding subscriber authentication request is stringenter.For example, can only lead to for common business safety grade Short-message verification is crossed, for advanced business safety grade, can be verified by recognition of face.Alternatively it is also possible to Using a variety of verification modes in conjunction with being verified, for example, subscriber authentication request can be recognition of face and short-message verification In conjunction with mode.
S433: obtaining user identity check information, if user identity check information is verified, user information verifying is asked It asks and is verified.
Identity verifying information refers to the verification information that user carries out according to subscriber authentication request.Client is being got After identity verifying information, identity verifying information is sent to server-side.After server-side obtains the user identity check information, It is verified.If user identity check information is verified, user information checking request is verified.
Preferably, server-side is identified, to user identity after getting user identity check information based on the target user Check information is verified.It is alternatively possible to by user identity check information and the pre-stored subscriber identity information of server-side It is compared.If comparison result is matching, user identity check information is verified, and the verifying of user information checking request is logical It crosses.
In the present embodiment, the business safety grade based on target service type carries out authentication to user, it is ensured that is User carries out transacting business and provides the operation of laissezpasser to verify data, improves the safety of user information, reduces The risk of leakage of information.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
In one embodiment, a kind of user information verifying device is provided, which verifies device and above-described embodiment Middle user information verification method corresponds.As shown in figure 8, user information verifying device includes first obtaining module 81, the Two obtain module 82, third obtains module 83, enquiry module 84 and the first respond module 85.Each functional module is described in detail such as Under:
First obtains module 81, and for obtaining user information checking request, user information checking request includes target user Mark and target service type;
Second obtains module 82, obtains user authentication information for identifying based on target user;
Third obtains module 83, and the benchmark for being obtained the user information checking request based on target service type is verified Field, wherein benchmark verifying field is at least two;
Enquiry module 84, for inquiring user authentication information based on benchmark verifying field;
First respond module 85 matches if all inquiring in user authentication information for each benchmark verifying field Verify data then responds user information checking request.
Preferably, which verifies device further include:
It logs in and obtains module 811, for obtaining landing request information, landing request information includes target user's mark and mesh Mark user password;
Authentication module 812, for being verified based on target user's mark to target user's password;
Sending module 813, if sending type of service list for target user's password authentification success;
Generation module 814 is requested, it is raw based on target user's mark and target service type for obtaining target service type At user information checking request.
Preferably, which verifies device further include:
Interface obtains module 821, for obtaining the user authentication data table of each interface;
Module 822 is integrated, for being identified based on same original user, user authentication data table is integrated, obtains user's checking Information.
Preferably, the integration module 822 further include:
Verify data acquisition submodule 8221 is obtained in user authentication data table for being identified based on same original user Corresponding user authentication data is taken, user authentication data includes original user mark, verifying content and verifying date;
Date acquisition submodule 8222 is verified, if for there are the users of identical verifying content in same original user mark Verify data then obtains the verifying date in the user authentication data of identical verifying content, as the target verification date;
It verifies date arrangement submodule 8223 and obtains newest mesh after sequence for being ranked up to the target verification date Mark verifying date verifying content corresponding with newest target verification date, and the non-current target verification date is corresponding User authentication data is deleted;
Verification information arranges submodule 8224, identifies corresponding user authentication data for summarizing same original user, obtains To user authentication information.
Preferably, which verifies device further include:
Target verification field generation module 841, at least one described benchmark verifying field if it exists in the user Inquiry is less than the verify data to match in verification information, then using corresponding benchmark verifying field as target verification field;
Sending module 842, for sending target verification field validation request based on target verification field;
Second respond module 843 requests corresponding target verification information for obtaining target verification field validation, if target Verification information is verified, then responds user information checking request.
Preferably, which includes:
Security level acquisition submodule 8431, for obtaining business safety grade based on target service type;
Authentication submodule 8432 sends corresponding user's body for identifying based on business safety grade and target user Part checking request;
Submodule 8433 is verified, for obtaining user identity check information, if user identity check information is verified, User information checking request is verified.
Specific about user information verifying device limits the limit that may refer to above for user information verification method Fixed, details are not described herein.Modules in above-mentioned user information verifying device can fully or partially through software, hardware and its Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 9.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing user authentication information.The network interface of the computer equipment is used to pass through with external terminal Network connection communication.To realize a kind of user information verification method when the computer program is executed by processor.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor perform the steps of when executing computer program
User information checking request is obtained, user information checking request includes target user's mark and target service type;
It is identified based on target user and obtains user authentication information;
The benchmark verifying field of user information checking request is obtained based on target service type, wherein benchmark verifying field It is at least two;
User authentication information is inquired based on benchmark verifying field;
If each benchmark verifying field all inquires the verify data to match in user authentication information, user is responded Information verification request.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
User information checking request is obtained, user information checking request includes target user's mark and target service type;
It is identified based on target user and obtains user authentication information;
The benchmark verifying field of user information checking request is obtained based on target service type, wherein benchmark verifying field It is at least two;
User authentication information is inquired based on benchmark verifying field;
If each benchmark verifying field all inquires the verify data to match in user authentication information, user is responded Information verification request.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that, it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of user information verification method, which is characterized in that the user information verification method includes:
User information checking request is obtained, the user information checking request includes target user's mark and target service type;
It is identified based on the target user and obtains user authentication information;
The benchmark verifying field of the user information checking request is obtained based on the target service type, wherein the benchmark Verifying field is at least two;
The user authentication information is inquired based on the benchmark verifying field;
If each benchmark verifying field all inquires the verify data to match in the user authentication information, respond The user information checking request.
2. user information verification method as described in claim 1, which is characterized in that in the acquisition user information checking request The step of before, the user information verification method further include:
Landing request information is obtained, the landing request information includes target user's mark and target user's password;
Target user's password is verified based on target user mark;
If target user's password authentification success, sends type of service list;
The target service type is obtained, user's letter is generated based on target user mark and the target service type Cease checking request.
3. user information verification method as described in claim 1, which is characterized in that identified described based on the target user After before the step of obtaining user authentication information and the acquisition user information checking request the step of, the user information Verification method further include:
Obtain the user authentication data table of each interface;
It is identified based on same original user, integrates the user authentication data table, obtain the user authentication information.
4. user information verification method as claimed in claim 3, which is characterized in that it is described to be identified based on same original user, The user authentication data table is integrated, the user authentication information is obtained, comprising:
It is identified based on the same original user, corresponding user authentication data, institute is obtained in the user authentication data table It states user authentication data and includes original user mark, verifying content and verifying date;
If obtaining identical verifying there are the user authentication data of identical verifying content in the same original user mark The verifying date in the user authentication data of content, as the target verification date;
The target verification date is ranked up, newest target verification date and the newest target verification date after sequence are obtained Corresponding verifying content, and non-current target verification date corresponding user authentication data is deleted;
Summarize the same original user and identify the corresponding user authentication data, obtains the user authentication information.
5. user information verification method as described in claim 1, which is characterized in that inquired based on the benchmark verifying field After the step of user authentication information, the user information verification method further include:
At least one described benchmark verifying field is inquired in the user authentication information less than the verifying number to match if it exists According to then using the corresponding benchmark verifying field as target verification field;
Target verification field validation request is sent based on the target verification field;
It obtains the target verification field validation and requests corresponding target verification information, if the target verification Information Authentication is logical It crosses, then responds the user information checking request.
6. user information verification method as claimed in claim 5, which is characterized in that the response user information verifying is asked It asks, comprising:
Business safety grade is obtained based on the target service type;
It is identified based on the business safety grade and the target user and sends corresponding subscriber authentication request;
User identity check information is obtained to test if the user identity check information is verified by the user information Demonstrate,prove requests verification.
7. a kind of user information verifies device characterized by comprising
First obtains module, and for obtaining user information checking request, the user information checking request includes target user's mark Know and target service type;
Second obtains module, obtains user authentication information for identifying based on the target user;
Third obtains module, for obtaining the benchmark authenticator of the user information checking request based on the target service type Section, wherein the benchmark verifying field is at least two;
Enquiry module, for inquiring user authentication information based on the benchmark verifying field;
First respond module matches if all inquiring in the user authentication information for each benchmark verifying field Verify data, then respond the user information checking request.
8. user information as claimed in claim 7 verifies device, which is characterized in that the user information verifying further include:
It logs in and obtains module, for obtaining landing request information, the landing request information includes target user's mark and target User password;
Authentication module, for being verified based on target user mark to target user's password;
Sending module, if sending type of service list for target user's password authentification success;
Generation module is requested, for obtaining target service type, is generated based on target user mark and target service type User information checking request.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to The step of any one of 6 user information verification method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In realizing the user information verification method as described in any one of claim 1 to 6 when the computer program is executed by processor Step.
CN201810585016.1A 2018-06-08 2018-06-08 User information verification method, device, computer equipment and storage medium Pending CN109034816A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810585016.1A CN109034816A (en) 2018-06-08 2018-06-08 User information verification method, device, computer equipment and storage medium
PCT/CN2018/094343 WO2019232868A1 (en) 2018-06-08 2018-07-03 User information authentication method and apparatus, and computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810585016.1A CN109034816A (en) 2018-06-08 2018-06-08 User information verification method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109034816A true CN109034816A (en) 2018-12-18

Family

ID=64612290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810585016.1A Pending CN109034816A (en) 2018-06-08 2018-06-08 User information verification method, device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109034816A (en)
WO (1) WO2019232868A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858210A (en) * 2019-01-07 2019-06-07 平安科技(深圳)有限公司 Information Authentication method, apparatus, computer equipment and storage medium
CN110009386A (en) * 2019-01-28 2019-07-12 平安科技(深圳)有限公司 User classification method, device, computer equipment and storage medium
CN110505198A (en) * 2019-07-05 2019-11-26 中国平安财产保险股份有限公司 A kind of checking request method, apparatus, computer equipment and storage medium
CN111143395A (en) * 2019-11-28 2020-05-12 招银云创(深圳)信息技术有限公司 Identity authentication method, identity authentication device, computer equipment and storage medium
CN111212075A (en) * 2020-01-02 2020-05-29 腾讯云计算(北京)有限责任公司 Service request processing method and device, electronic equipment and computer storage medium
CN111541703A (en) * 2020-04-27 2020-08-14 平安银行股份有限公司 Terminal equipment authentication method and device, computer equipment and storage medium
CN111709803A (en) * 2020-06-12 2020-09-25 北京思特奇信息技术股份有限公司 Method and system for preventing unauthorized business handling
CN113343220A (en) * 2021-06-02 2021-09-03 中国工商银行股份有限公司 Login authentication method, device, equipment and medium of application program
WO2021196935A1 (en) * 2020-04-01 2021-10-07 深圳壹账通智能科技有限公司 Data checking method and apparatus, electronic device, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106034123A (en) * 2015-03-17 2016-10-19 中国移动通信集团湖北有限公司 Authentication method, application system server and client
CN106888446A (en) * 2015-12-15 2017-06-23 中国电信股份有限公司 For the methods, devices and systems of checking information recipient's property right identity
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
WO2018058544A1 (en) * 2016-09-30 2018-04-05 华为技术有限公司 Service authentication method, system, and related devices
CN107993058A (en) * 2016-10-27 2018-05-04 阿里巴巴集团控股有限公司 A kind of Information Authentication method and system and server

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9317673B2 (en) * 2014-02-07 2016-04-19 Bank Of America Corporation Providing authentication using previously-validated authentication credentials
CN105450582B (en) * 2014-06-24 2019-10-18 华为技术有限公司 Method for processing business, terminal, server and system
CN104219050B (en) * 2014-08-08 2015-11-11 腾讯科技(深圳)有限公司 Voice print verification method, server, client and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106034123A (en) * 2015-03-17 2016-10-19 中国移动通信集团湖北有限公司 Authentication method, application system server and client
CN106888446A (en) * 2015-12-15 2017-06-23 中国电信股份有限公司 For the methods, devices and systems of checking information recipient's property right identity
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
WO2018058544A1 (en) * 2016-09-30 2018-04-05 华为技术有限公司 Service authentication method, system, and related devices
CN107993058A (en) * 2016-10-27 2018-05-04 阿里巴巴集团控股有限公司 A kind of Information Authentication method and system and server

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858210A (en) * 2019-01-07 2019-06-07 平安科技(深圳)有限公司 Information Authentication method, apparatus, computer equipment and storage medium
CN110009386A (en) * 2019-01-28 2019-07-12 平安科技(深圳)有限公司 User classification method, device, computer equipment and storage medium
CN110009386B (en) * 2019-01-28 2024-02-13 平安科技(深圳)有限公司 User classification method, device, computer equipment and storage medium
CN110505198A (en) * 2019-07-05 2019-11-26 中国平安财产保险股份有限公司 A kind of checking request method, apparatus, computer equipment and storage medium
CN111143395A (en) * 2019-11-28 2020-05-12 招银云创(深圳)信息技术有限公司 Identity authentication method, identity authentication device, computer equipment and storage medium
CN111143395B (en) * 2019-11-28 2024-04-09 招银云创信息技术有限公司 Identity verification method, device, computer equipment and storage medium
CN111212075A (en) * 2020-01-02 2020-05-29 腾讯云计算(北京)有限责任公司 Service request processing method and device, electronic equipment and computer storage medium
WO2021196935A1 (en) * 2020-04-01 2021-10-07 深圳壹账通智能科技有限公司 Data checking method and apparatus, electronic device, and storage medium
CN111541703B (en) * 2020-04-27 2023-04-07 平安银行股份有限公司 Terminal equipment authentication method and device, computer equipment and storage medium
CN111541703A (en) * 2020-04-27 2020-08-14 平安银行股份有限公司 Terminal equipment authentication method and device, computer equipment and storage medium
CN111709803B (en) * 2020-06-12 2023-09-05 北京思特奇信息技术股份有限公司 Method and system for preventing unauthorized business handling
CN111709803A (en) * 2020-06-12 2020-09-25 北京思特奇信息技术股份有限公司 Method and system for preventing unauthorized business handling
CN113343220A (en) * 2021-06-02 2021-09-03 中国工商银行股份有限公司 Login authentication method, device, equipment and medium of application program

Also Published As

Publication number Publication date
WO2019232868A1 (en) 2019-12-12

Similar Documents

Publication Publication Date Title
CN109034816A (en) User information verification method, device, computer equipment and storage medium
CN107241317B (en) Method for identifying identity by biological characteristics, user terminal equipment and identity authentication server
US5841970A (en) Authentication method for networks
US8661520B2 (en) Systems and methods for identification and authentication of a user
US20080120507A1 (en) Methods and systems for authentication of a user
CN107423333A (en) A kind of real name identification method and device
CN105357196A (en) Network login method and system
CN107231234A (en) A kind of identity registration method and device
CN105791259A (en) Method for protecting personal information
WO2012040869A1 (en) User account recovery
CN108769186A (en) service authority control method and device
US20180039988A1 (en) Methods for controlling access to a financial account
CN105827571A (en) UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
CN109831310A (en) A kind of auth method, system and relevant apparatus
CN105099983A (en) Authorization method, authority setting method and devices
CN108512660B (en) Virtual card verification method
CN105162774A (en) Virtual machine login method and device used for terminal
CN109829321B (en) Method, device, equipment and storage medium for authenticating identity
CN109325873B (en) Self-service business processing method, device, computer equipment and storage medium
CN114238883A (en) Identity authentication method, device, equipment and storage medium
JP2007272600A (en) Personal authentication method, system and program associated with environment authentication
CN112507390A (en) Block chain-based electronic license information acquisition method and equipment
CN109933974A (en) Cryptographic initialization method, apparatus, computer equipment and storage medium
EP3217593A1 (en) Two-factor authentication method for increasing the security of transactions between a user and a transaction point or system
JP6279643B2 (en) Login management system, login management method, and login management program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination