CN109034816A - User information verification method, device, computer equipment and storage medium - Google Patents
User information verification method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109034816A CN109034816A CN201810585016.1A CN201810585016A CN109034816A CN 109034816 A CN109034816 A CN 109034816A CN 201810585016 A CN201810585016 A CN 201810585016A CN 109034816 A CN109034816 A CN 109034816A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- target
- verifying
- user information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of user information verification method, device, computer equipment and storage medium, which includes: to obtain user information checking request, and user information checking request includes target user's mark and target service type;It is identified based on target user and obtains user authentication information;The benchmark verifying field of the user information checking request is obtained based on the target service type, wherein the benchmark verifying field is at least two;User authentication information is inquired based on benchmark verifying field;If each benchmark verifying field all inquires the verify data to match in the user authentication information, the user information checking request is responded.The method increase user information verification efficiencies.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of user information verification methods, device, computer equipment
And storage medium.
Background technique
Currently, when user handles the higher business of security requirement in an enterprise or platform, usually require into
The verifying of row user information, and also need further to be authenticated and realized the process of verifying for user part message, example
Such as, ID card information and bank card information.However, to user ID card information and bank card information authenticate when,
It needs that third-party platform is entrusted to be authenticated, and needs to pay corresponding expense to third-party platform.Although this authentication
Formula can guarantee the authenticity of user information, but verify link needs and take some time, and verification efficiency is lower.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of user that user information verification efficiency can be improved
Information Authentication method, apparatus, computer equipment and storage medium.
A kind of user information verification method, comprising:
User information checking request is obtained, user information checking request includes target user's mark and target service type;
It is identified based on target user and obtains user authentication information;
The benchmark verifying field of the user information checking request is obtained based on the target service type, wherein described
Benchmark verifying field is at least two;
User authentication information is inquired based on benchmark verifying field;
If each benchmark verifying field all inquires the verify data to match in the user authentication information,
Respond the user information checking request.
A kind of user information verifying device, comprising:
First obtains module, and for obtaining user information checking request, user information checking request includes target user's mark
Know and target service type;
Second obtains module, obtains user authentication information for identifying based on target user;
Third obtains module, and the benchmark for obtaining the user information checking request based on the target service type is tested
Demonstrate,prove field, wherein the benchmark verifying field is at least two;
Enquiry module, for inquiring user authentication information based on benchmark verifying field;
First respond module, if all inquiring phase in the user authentication information for each benchmark verifying field
Matched verify data then responds the user information checking request.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing
The computer program run on device, the processor realize above-mentioned user information verification method when executing the computer program
Step.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter
The step of calculation machine program realizes above-mentioned user information verification method when being executed by processor.
Above-mentioned user information verification method, device, computer equipment and storage medium, server are getting user's checking
After request, is identified based on the target user in user's checking request and obtain user authentication information, and by being based on target industry
The benchmark verifying field that service type obtains inquires user authentication information, if each benchmark verifying field is all in user authentication information
The verify data to match is inquired, then responds user information checking request.It through the above steps can be to avoid to doing
When managing other business, pass through the user information of verifying, carried out repeated authentication, improves the efficiency of user information verifying.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of user information verification method in one embodiment of the invention;
Fig. 2 is a flow chart of user information verification method in one embodiment of the invention;
Fig. 3 is the flow chart verified in user information verification method to login in one embodiment of the invention;
Fig. 4 is the process integrated in user information verification method to user authentication information in one embodiment of the invention
Figure;
Fig. 5 is the implementation flow chart of step S22 in user information verification method in one embodiment of the invention;
Fig. 6 is one verified in user information verification method to unmatched verify data in one embodiment of the invention
Flow chart;
Fig. 7 is a flow chart of user information verification method in one embodiment of the invention;
Fig. 8 is a functional block diagram of user information verifying device in one embodiment of the invention;
Fig. 9 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
User information verification method provided by the present application, can be applicable in the application environment such as Fig. 1, wherein client (meter
Calculate machine equipment) it is communicated by network with server-side.Client obtains user information checking request, and user information is verified
Request is sent to server.After server-side gets user information checking request, carried out based on user information checking request corresponding
Ground processing, and respond the user information checking request.Wherein, computer equipment can be, but not limited to various personal computers, pen
Remember this computer, smart phone, tablet computer and portable wearable device.Server-side can be either more with independent server
The server cluster of a server composition is realized.
In one embodiment, it as shown in Fig. 2, providing a kind of user information verification method, applies in Fig. 1 in this way
It is illustrated, includes the following steps: for server-side
S10: obtaining user information checking request, and user information checking request includes target user's mark and target service class
Type.
User information checking request refers to that user needs to handle corresponding business and trigger need to test identity information
The request of card.Target user is identified as the corresponding user identifier of user for carrying out user information verifying, and user identifier is suitable for area
The mark of point different user, for example, user identifier can be the ID card No. of user, or with the unique corresponding account of user
Number ID etc..Target service type refers to the corresponding type of target service that user needs to handle, wherein different types of target industry
The identity information that business needs to verify is different.
S20: it is identified based on target user and obtains user authentication information.
Since target user's mark has uniqueness, target user can be identified and be used as search field, retrieval should
The user authentication information of target user's mark.It is alternatively possible to obtain user in big data platform based on target user's mark
Verification information.
User authentication information is the subscriber identity information for having passed through verifying, and the user is when handling other business, it is possible to
It needs to verify subscriber identity information, and passes through the verify data that verifying just will form corresponding user later, which exists
The summation of verify data in different business is exactly its user authentication information.And in this step, it is obtained based on target user's mark
User authentication information is taken, is to be identified by target user, it is right in the business handled in the past to obtain target user mark
The user authentication information answered.Optionally, user authentication information may include name, identification card number, cell-phone number, the bank card of user
Number or at least one of finger print information etc..Wherein, cell-phone number, bank's card number and the corresponding verification information of finger print information can be one
It is either multinomial.
Such as: user is the first cell-phone number, Bank One Corp. by the user authentication information of verifying when handling a business
Card number and left hand thumbprint information, when handling another business by the user authentication information of verifying be the second cell-phone number,
Bank One Corp. card number and hand thumb finger print information.Therefore, the user's checking letter of the user obtained is identified based on target user
Breath is the first cell-phone number, the second cell-phone number, Bank One Corp. card number, left hand thumbprint information and hand thumb finger print information.
S30: the benchmark verifying field of user information checking request is obtained based on target service type, wherein benchmark verifying
Field is at least two.
Wherein, benchmark verifying field is to be verified in user information checking request in corresponding target service
The corresponding field of subscriber identity information.Specifically, benchmark verifying field be at least two, for example, to subscriber identity information into
When row verifying, can all be verified again on the basis of verifying the name of user at least one field (such as: bank card, identity card or
Person's cell-phone number).Therefore, benchmark verifying field is at least two.For different target service types, that is verified is interior
Difference can also be had by holding.For example, only may need to verify the name, identification card number and mobile phone of user for some general servicies
Number, and for more core business, it may be necessary to verify the name of user, identification card number, cell-phone number, bank's card number and refer to
Line information.Therefore by being based on target service type, the benchmark verifying field of the target service type is obtained.
For example, in the target service for handling the type, needing the name to user, body for a target service type
Part card number, phone number and bank's card number are verified, then obtain user information checking request based on the target service type
Benchmark verifying field is name, identification card number, phone number and bank's card number.
S40: user authentication information is inquired based on benchmark verifying field.
Specifically, it according to the benchmark verifying field of acquisition, is inquired in user authentication information needed for the target service type
The subscriber identity information verified.For example, if benchmark verifying field is name, identification card number, phone number and bank card
Number, then it is inquired in user authentication information based on said reference verifying field with the presence or absence of corresponding verify data.
S50: it if each benchmark verifying field all inquires the verify data to match in user authentication information, responds
User information checking request.
Specifically, each benchmark verifying field all inquires the verify data to match in user authentication information, refers to
There is verify data corresponding with benchmark verifying field in user authentication information.Even each benchmark verifying field can
In user authentication information, the verify data that successful query matches to the target service type then responds the user information and tests
Card request.Optionally, responding the user information checking request can be for by the user information checking request.
In the present embodiment, server is after getting user's checking request, based on the target in user's checking request
User identifier obtains user authentication information, and the inquiry user of the benchmark verifying field by being obtained based on target service type is tested
It demonstrate,proves information and responds user if each benchmark verifying field all inquires the verify data to match in user authentication information
Information verification request.Through the above steps can to avoid to passed through when handling other business the user information of verifying into
Row repeated authentication improves the efficiency of user information verifying.
In one embodiment, as shown in figure 3, before step S10, which further includes walking as follows
It is rapid:
S11: obtaining landing request information, and landing request information includes target user's mark and target user's password.
In embodiments of the present invention, landing request information refers to that client is getting user in the input letter of login interface
By processing after breath, and it is sent to the information in server-side.Landing request information includes target user's mark and target user
Password.After target user mark and target user's password composition landing request information, client is by the landing request information
It is sent to server-side, server-side obtains the landing request information.
Optionally, target user's mark and target user's password are also possible to client in the login for getting user's input
It is encrypted after information.It can guarantee safety of the landing request information in data transmission procedure by encryption
Property.
S12: target user's password is verified based on target user's mark.
Specifically, user can input or select Account Logon information according to certain prompt information when registration, wherein
Account Logon information include user original user mark and log-in password, server-side after obtaining account log-on message,
Account log-on message is stored in registration table.And target user's password is verified based on target user's mark
Process specifically: server-side is based on target user's mark and finds corresponding original user mark in registration table, and will
The original user identifies corresponding log-in password and target user's password is compared, if the two is identical, is proved to be successful.
Optionally, server-side encrypts the log-in password in account log-on message according to preset mode, obtains
After encrypting registration password, then it is stored in registration table.At this point, the landing request information that client is sent to server-side is also
By encryption.It should be noted that the mode encrypted to log-in password and the side to landing request information encryption
Formula is identical.Therefore, the target user of the same user is identified, if the login password of input is identical as log-in password, plus
The target user's password and encrypting registration password obtained after close is also identical.
Further, server-side is after obtaining landing request information, based on target user's mark in registration table
The encrypting registration password for inquiring target user mark, if the encrypting registration password and the target user in landing request information are close
Code is identical, then target user's password authentification success.
S13: if target user's password authentification success, sends type of service list.
In target user's password authentification success, then user logins successfully.After user logins successfully, then obtain in the platform
Existing business, and generate existing traffic table, be sent to client, for selection by the user.Optionally, having traffic table includes
There are business and corresponding type of service.
S14: obtaining target service type, generates user information verifying based on target user's mark and target service type and asks
It asks.
Specifically, user selects a target service in the display interface of client, and client is by the target service pair
The type of service answered identifies generation user information based on the target service type and target user and tests as target service type
Card request.Then the user information checking request is sent to server-side by client, and server-side gets user information verifying
Request.
In the present embodiment, user can be identified by the same target user and target user's password is in different platforms
Register is carried out, the operation of repeated registration account is eliminated, while also because only one account of the same user identifier is believed
Breath, and reduce the table capacity of server registration record sheet, save memory space.Further, it is verified in user information
The verifying for carrying out log-on message to user before, ensure that the safety of user information verifying.Moreover, by client to
The log-on message at family is encrypted, then is transferred to server-side and is carried out login authentication, can be improved the safety of the account information of user
Property, it is effectively prevented from and the risk of password leakage occurs during data transmission.
In one embodiment, as shown in figure 4, before step S20 and after step slo, the user information authentication
Method further includes following steps:
S21: the user authentication data table of each interface is obtained.
User authentication data table is the table for storing verify data when user handles different business, and uses the use
The original user mark at family distinguishes the user authentication data table of each user.Wherein, it is set when original user is identified as user's registration
The register account number set, user uniquely distinguish the mark of different user, for example, identification card number or account ID etc..
Specifically, corresponding interface is set in different business, for carrying out the interaction of data.Getting user letter
After ceasing checking request, by obtaining the user authentication data table of each interface, in order to the subsequent integration for carrying out verify data table.
It is alternatively possible to data extraction module be added in each interface, for extracting user authentication information tables of data.It can
Selection of land can extract user authentication data table, and be sent to service by data extraction module from the database of each interface
End.Server-side gets the user authentication data table of each interface.Specifically, it as unit of being identified by original user, extracts
User authentication data table of the same original user mark in each interface.
Preferably, it is also provided with data trigger, there are data to change in the database for working as either interface
When, record data modification information.When the change for increasing, deleting or modifying occurs for the user authentication data table for detecting either interface
When more, using data trigger by the user authentication data table after change, big data platform is sent to by data extraction module,
Big data platform, which updates, replaces original user authentication data table.
S22: it is identified based on same original user, integrates user authentication data table, obtain user authentication information.
Specifically, it is identified based on same original user, in user authentication data table, the duplicate verify data of content is carried out
Merge or screening, as unit of identifying by original user, forms the user authentication information of each original user mark.
It is alternatively possible to receive the user authentication data table sent by data extraction module, and will by big data platform
These user authentication data tables are arranged, and re-send to server-side later, to improve Data Integration efficiency.
In the present embodiment, by obtaining the user authentication data table in each interface, by being based on same original user
Mark, integrates the user authentication data table of each interface, so that the user authentication data of same original user mark is all
In same table.When inquiring corresponding verify data in user information verifying, acquisition pair on each interface is not needed
The user authentication data table answered, saves query time, improves search efficiency.
In one embodiment, it as shown in figure 5, in step S22, i.e., is identified based on same original user, integrates user's checking
Tables of data obtains user authentication information, specifically comprises the following steps:
S221: being identified based on same original user, corresponding user authentication data obtained in user authentication data table, is used
Family verify data includes original user mark, verifying content and verifying date.
Wherein, original user mark is the user identifier of different user in user authentication data table.Verifying content is the original
The subscriber identity information that beginning user identifier passes through verifying.The verifying date refers to that the verifying content passes through the date of verifying.
S222: if obtaining identical test there are the user authentication data of identical verifying content in same original user mark
The verifying date in the user authentication data of content is demonstrate,proved, as the target verification date.
Specifically, after the verifying content for getting same original user mark, inquiry is with the presence or absence of in identical verifying
Hold, for example, the first phone number of same original user mark, had verified that in first interface and second interface, then should
Original user identifies in corresponding user authentication data, can there is the user's checking number that two verifying contents are the first phone number
According to.Identical verifying content if it exists then obtains the identical verifying content corresponding verifying date, as target verification day respectively
Phase.
S223: being ranked up the target verification date, obtains newest target verification date and newest mesh after sequence
Mark verifying date corresponding verifying content, and non-current target verification date corresponding user authentication data is deleted.
In the present embodiment, which refers to and gets the date of the user information checking request
The immediate target verification date.
Specifically, after getting the target verification date, to the target verification date, according to the time order and function on target verification date
It is ranked up.After being ranked up to the target verification date, only obtains the newest target verification date and the newest target is tested
Date corresponding verifying content is demonstrate,proved, and non-current target verification date corresponding user authentication data is deleted.
Such as: user carried out verifying to name, identification card number and the first cell-phone number in first interface and second interface,
And user, in the name of first interface, the target verification date of identification card number and the first cell-phone number is on March 15th, 2017, and is used
Family is on May 8th, 2017 on the target verification date of the name of second interface, identification card number and the first cell-phone number, then user exists
The verifying date of the name of second interface, identification card number and the first cell-phone number is the newest target verification date, and user is first
The target verification date of the name of interface, identification card number and the first cell-phone number is the non-current target verification date.It can incite somebody to action at this time
The verifying content obtained from first interface is that the user authentication data of name, identification card number and the first cell-phone number is deleted.
S224: summarize same original user and identify corresponding user authentication data, obtain user authentication information.
Further, same original with this after being integrated to the identical verifying content that same original user identifies
Other verifying contents of user identifier are integrated, and the user authentication information of original user mark is obtained.
In order to better understand the technical solution of the present embodiment, below by one specifically example illustrate that integrating user tests
Tables of data process is demonstrate,proved, details are as follows:
For example, verify data of the Zhang San in the user authentication data table of first interface be name, it is identification card number, first-hand
The verifying date of machine number, Bank One Corp. card number and hand thumb fingerprint and every verifying content;Use of the Zhang San in second interface
Verify data in the verify data table of family is name, identification card number, the second cell-phone number and secondary bank card number and every verifying
The verifying date of content.
Wherein, the name and identification card number of Zhang San is identical verifying content, therefore judges the name and identity card of Zhang San
Number respectively in the time order and function of first interface and the verifying date of second interface, pass through the operation of step S223 and step S224
Afterwards, the user authentication information for obtaining Zhang San is name, identification card number, the first cell-phone number, the second cell-phone number, Bank One Corp. of Zhang San
The verifying date of card number, secondary bank card number and hand thumb fingerprint and every verifying content.
In the present embodiment, by being merged according to the target verification date to identical verifying content, and to user's checking
Tables of data is integrated, and guarantees the succinct of user authentication information, improves the efficiency of subsequent query.
In one embodiment, as shown in fig. 6, after the step s 40, which further includes walking as follows
It is rapid:
S41: at least one benchmark verifying field is inquired in user authentication information less than the verifying number to match if it exists
According to then using corresponding benchmark verifying field as target verification field.
Optionally, there are at least one benchmark verifying fields is inquired in user authentication information less than the verifying number to match
According to referring at least one benchmark verifying field, cannot be inquired from user authentication information and get corresponding verifying
Data.For example, if benchmark verifying field is name and finger print information, and in user authentication information and finger print information is not present, then
Inquiry is less than the verify data to match with finger print information in user authentication information.
Preferably, in user authentication information, the benchmark verifying field that the verify data to match has not been obtained further includes
There is the verify data corresponding with benchmark verifying field in the user authentication information, but the timeliness of verify data is unsatisfactory for
The target service types entail.It, can be according in type of service setting verifying when the verifying content to user is verified
The timeliness of appearance.Wherein, timeliness refers to that from the verifying date to the date for obtaining target service type, the verifying date refers in the verifying
Hold the date by verifying.Specifically, the timeliness of verify data is unsatisfactory for the target service types entail, can refer to the verifying
The corresponding timeliness of data is more than the requirement of the timeliness to verify data of the target service type.
Such as: target service type requires the timeliness of verify data to be in half a year, if the verifying in user authentication information
The data corresponding verifying date then determines the timeliness of the verify data to the date for obtaining target service type more than six months
It is unsatisfactory for the requirement of the target service type, i.e. verify data and benchmark verifying field is unmatched.
Therefore, if it exists in user authentication information, the benchmark verifying field of the verify data to match has not been obtained, then
The benchmark verifying field of the verify data to match will have not been obtained as target verification field, to prompt user to target verification
Field is verified.
S42: target verification field validation request is sent based on target verification field.
Specifically, target verification field validation request is sent to client, to prompt user to the target verification field
Corresponding verifying content is verified.Preferably, target verification field validation request includes target verification field.
S43: obtaining target verification field validation and request corresponding target verification information, if target verification Information Authentication is logical
It crosses, then responds user information checking request.
Further, the verifying content that user includes into client feedback target verification field validation request, client
The verifying content is obtained, is sent to server-side as target verification information.Server-side tests the target for receiving client transmission
Card information is simultaneously verified, if being verified, responds user information checking request.
In the present embodiment, the benchmark authenticator of the verify data to match has not been obtained in user authentication information if it exists
Section, then corresponding benchmark verifying field is verified, ensure that user information verifying timeliness, meanwhile, only verify with
In the verification information of family, the benchmark verifying field of the verify data to match has not been obtained, is conducive to improve user information verifying
Efficiency.
In one embodiment, as shown in fig. 7, in step S43, that is, user information checking request is responded.It specifically includes as follows
Step:
S431: business safety grade is obtained based on target service type.
Specifically, business safety grade refers to the difference due to target service type, the business of target service type
Security level is also different.Such as: the setting of business safety grade can be carried out according to the price for traffic of target service type, if
The price for traffic is higher, then corresponding target service type is also higher.According to different business safety grades, different brackets is sent
Subscriber authentication request.
S432: it is identified based on business safety grade and target user and sends corresponding subscriber authentication request.
Further, it can include but is not limited in subscriber authentication request: OTP (dynamic password, One-time
Password), recognition of face or short-message verification etc., specific verification mode can be determined by business safety grade, not done herein
Limitation.According to different business security level, the subscriber authentication request of different modes is sent.Preferably, business safety grade
Higher, the mode of corresponding subscriber authentication request is stringenter.For example, can only lead to for common business safety grade
Short-message verification is crossed, for advanced business safety grade, can be verified by recognition of face.Alternatively it is also possible to
Using a variety of verification modes in conjunction with being verified, for example, subscriber authentication request can be recognition of face and short-message verification
In conjunction with mode.
S433: obtaining user identity check information, if user identity check information is verified, user information verifying is asked
It asks and is verified.
Identity verifying information refers to the verification information that user carries out according to subscriber authentication request.Client is being got
After identity verifying information, identity verifying information is sent to server-side.After server-side obtains the user identity check information,
It is verified.If user identity check information is verified, user information checking request is verified.
Preferably, server-side is identified, to user identity after getting user identity check information based on the target user
Check information is verified.It is alternatively possible to by user identity check information and the pre-stored subscriber identity information of server-side
It is compared.If comparison result is matching, user identity check information is verified, and the verifying of user information checking request is logical
It crosses.
In the present embodiment, the business safety grade based on target service type carries out authentication to user, it is ensured that is
User carries out transacting business and provides the operation of laissezpasser to verify data, improves the safety of user information, reduces
The risk of leakage of information.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
In one embodiment, a kind of user information verifying device is provided, which verifies device and above-described embodiment
Middle user information verification method corresponds.As shown in figure 8, user information verifying device includes first obtaining module 81, the
Two obtain module 82, third obtains module 83, enquiry module 84 and the first respond module 85.Each functional module is described in detail such as
Under:
First obtains module 81, and for obtaining user information checking request, user information checking request includes target user
Mark and target service type;
Second obtains module 82, obtains user authentication information for identifying based on target user;
Third obtains module 83, and the benchmark for being obtained the user information checking request based on target service type is verified
Field, wherein benchmark verifying field is at least two;
Enquiry module 84, for inquiring user authentication information based on benchmark verifying field;
First respond module 85 matches if all inquiring in user authentication information for each benchmark verifying field
Verify data then responds user information checking request.
Preferably, which verifies device further include:
It logs in and obtains module 811, for obtaining landing request information, landing request information includes target user's mark and mesh
Mark user password;
Authentication module 812, for being verified based on target user's mark to target user's password;
Sending module 813, if sending type of service list for target user's password authentification success;
Generation module 814 is requested, it is raw based on target user's mark and target service type for obtaining target service type
At user information checking request.
Preferably, which verifies device further include:
Interface obtains module 821, for obtaining the user authentication data table of each interface;
Module 822 is integrated, for being identified based on same original user, user authentication data table is integrated, obtains user's checking
Information.
Preferably, the integration module 822 further include:
Verify data acquisition submodule 8221 is obtained in user authentication data table for being identified based on same original user
Corresponding user authentication data is taken, user authentication data includes original user mark, verifying content and verifying date;
Date acquisition submodule 8222 is verified, if for there are the users of identical verifying content in same original user mark
Verify data then obtains the verifying date in the user authentication data of identical verifying content, as the target verification date;
It verifies date arrangement submodule 8223 and obtains newest mesh after sequence for being ranked up to the target verification date
Mark verifying date verifying content corresponding with newest target verification date, and the non-current target verification date is corresponding
User authentication data is deleted;
Verification information arranges submodule 8224, identifies corresponding user authentication data for summarizing same original user, obtains
To user authentication information.
Preferably, which verifies device further include:
Target verification field generation module 841, at least one described benchmark verifying field if it exists in the user
Inquiry is less than the verify data to match in verification information, then using corresponding benchmark verifying field as target verification field;
Sending module 842, for sending target verification field validation request based on target verification field;
Second respond module 843 requests corresponding target verification information for obtaining target verification field validation, if target
Verification information is verified, then responds user information checking request.
Preferably, which includes:
Security level acquisition submodule 8431, for obtaining business safety grade based on target service type;
Authentication submodule 8432 sends corresponding user's body for identifying based on business safety grade and target user
Part checking request;
Submodule 8433 is verified, for obtaining user identity check information, if user identity check information is verified,
User information checking request is verified.
Specific about user information verifying device limits the limit that may refer to above for user information verification method
Fixed, details are not described herein.Modules in above-mentioned user information verifying device can fully or partially through software, hardware and its
Combination is to realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with
It is stored in the memory in computer equipment in a software form, in order to which processor calls the above modules of execution corresponding
Operation.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 9.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for storing user authentication information.The network interface of the computer equipment is used to pass through with external terminal
Network connection communication.To realize a kind of user information verification method when the computer program is executed by processor.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor perform the steps of when executing computer program
User information checking request is obtained, user information checking request includes target user's mark and target service type;
It is identified based on target user and obtains user authentication information;
The benchmark verifying field of user information checking request is obtained based on target service type, wherein benchmark verifying field
It is at least two;
User authentication information is inquired based on benchmark verifying field;
If each benchmark verifying field all inquires the verify data to match in user authentication information, user is responded
Information verification request.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor
User information checking request is obtained, user information checking request includes target user's mark and target service type;
It is identified based on target user and obtains user authentication information;
The benchmark verifying field of user information checking request is obtained based on target service type, wherein benchmark verifying field
It is at least two;
User authentication information is inquired based on benchmark verifying field;
If each benchmark verifying field all inquires the verify data to match in user authentication information, user is responded
Information verification request.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that, it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of user information verification method, which is characterized in that the user information verification method includes:
User information checking request is obtained, the user information checking request includes target user's mark and target service type;
It is identified based on the target user and obtains user authentication information;
The benchmark verifying field of the user information checking request is obtained based on the target service type, wherein the benchmark
Verifying field is at least two;
The user authentication information is inquired based on the benchmark verifying field;
If each benchmark verifying field all inquires the verify data to match in the user authentication information, respond
The user information checking request.
2. user information verification method as described in claim 1, which is characterized in that in the acquisition user information checking request
The step of before, the user information verification method further include:
Landing request information is obtained, the landing request information includes target user's mark and target user's password;
Target user's password is verified based on target user mark;
If target user's password authentification success, sends type of service list;
The target service type is obtained, user's letter is generated based on target user mark and the target service type
Cease checking request.
3. user information verification method as described in claim 1, which is characterized in that identified described based on the target user
After before the step of obtaining user authentication information and the acquisition user information checking request the step of, the user information
Verification method further include:
Obtain the user authentication data table of each interface;
It is identified based on same original user, integrates the user authentication data table, obtain the user authentication information.
4. user information verification method as claimed in claim 3, which is characterized in that it is described to be identified based on same original user,
The user authentication data table is integrated, the user authentication information is obtained, comprising:
It is identified based on the same original user, corresponding user authentication data, institute is obtained in the user authentication data table
It states user authentication data and includes original user mark, verifying content and verifying date;
If obtaining identical verifying there are the user authentication data of identical verifying content in the same original user mark
The verifying date in the user authentication data of content, as the target verification date;
The target verification date is ranked up, newest target verification date and the newest target verification date after sequence are obtained
Corresponding verifying content, and non-current target verification date corresponding user authentication data is deleted;
Summarize the same original user and identify the corresponding user authentication data, obtains the user authentication information.
5. user information verification method as described in claim 1, which is characterized in that inquired based on the benchmark verifying field
After the step of user authentication information, the user information verification method further include:
At least one described benchmark verifying field is inquired in the user authentication information less than the verifying number to match if it exists
According to then using the corresponding benchmark verifying field as target verification field;
Target verification field validation request is sent based on the target verification field;
It obtains the target verification field validation and requests corresponding target verification information, if the target verification Information Authentication is logical
It crosses, then responds the user information checking request.
6. user information verification method as claimed in claim 5, which is characterized in that the response user information verifying is asked
It asks, comprising:
Business safety grade is obtained based on the target service type;
It is identified based on the business safety grade and the target user and sends corresponding subscriber authentication request;
User identity check information is obtained to test if the user identity check information is verified by the user information
Demonstrate,prove requests verification.
7. a kind of user information verifies device characterized by comprising
First obtains module, and for obtaining user information checking request, the user information checking request includes target user's mark
Know and target service type;
Second obtains module, obtains user authentication information for identifying based on the target user;
Third obtains module, for obtaining the benchmark authenticator of the user information checking request based on the target service type
Section, wherein the benchmark verifying field is at least two;
Enquiry module, for inquiring user authentication information based on the benchmark verifying field;
First respond module matches if all inquiring in the user authentication information for each benchmark verifying field
Verify data, then respond the user information checking request.
8. user information as claimed in claim 7 verifies device, which is characterized in that the user information verifying further include:
It logs in and obtains module, for obtaining landing request information, the landing request information includes target user's mark and target
User password;
Authentication module, for being verified based on target user mark to target user's password;
Sending module, if sending type of service list for target user's password authentification success;
Generation module is requested, for obtaining target service type, is generated based on target user mark and target service type
User information checking request.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to
The step of any one of 6 user information verification method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In realizing the user information verification method as described in any one of claim 1 to 6 when the computer program is executed by processor
Step.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810585016.1A CN109034816A (en) | 2018-06-08 | 2018-06-08 | User information verification method, device, computer equipment and storage medium |
PCT/CN2018/094343 WO2019232868A1 (en) | 2018-06-08 | 2018-07-03 | User information authentication method and apparatus, and computer device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810585016.1A CN109034816A (en) | 2018-06-08 | 2018-06-08 | User information verification method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109034816A true CN109034816A (en) | 2018-12-18 |
Family
ID=64612290
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810585016.1A Pending CN109034816A (en) | 2018-06-08 | 2018-06-08 | User information verification method, device, computer equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109034816A (en) |
WO (1) | WO2019232868A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109858210A (en) * | 2019-01-07 | 2019-06-07 | 平安科技(深圳)有限公司 | Information Authentication method, apparatus, computer equipment and storage medium |
CN110009386A (en) * | 2019-01-28 | 2019-07-12 | 平安科技(深圳)有限公司 | User classification method, device, computer equipment and storage medium |
CN110505198A (en) * | 2019-07-05 | 2019-11-26 | 中国平安财产保险股份有限公司 | A kind of checking request method, apparatus, computer equipment and storage medium |
CN111143395A (en) * | 2019-11-28 | 2020-05-12 | 招银云创(深圳)信息技术有限公司 | Identity authentication method, identity authentication device, computer equipment and storage medium |
CN111212075A (en) * | 2020-01-02 | 2020-05-29 | 腾讯云计算(北京)有限责任公司 | Service request processing method and device, electronic equipment and computer storage medium |
CN111541703A (en) * | 2020-04-27 | 2020-08-14 | 平安银行股份有限公司 | Terminal equipment authentication method and device, computer equipment and storage medium |
CN111709803A (en) * | 2020-06-12 | 2020-09-25 | 北京思特奇信息技术股份有限公司 | Method and system for preventing unauthorized business handling |
CN113343220A (en) * | 2021-06-02 | 2021-09-03 | 中国工商银行股份有限公司 | Login authentication method, device, equipment and medium of application program |
WO2021196935A1 (en) * | 2020-04-01 | 2021-10-07 | 深圳壹账通智能科技有限公司 | Data checking method and apparatus, electronic device, and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106034123A (en) * | 2015-03-17 | 2016-10-19 | 中国移动通信集团湖北有限公司 | Authentication method, application system server and client |
CN106888446A (en) * | 2015-12-15 | 2017-06-23 | 中国电信股份有限公司 | For the methods, devices and systems of checking information recipient's property right identity |
CN107018119A (en) * | 2016-08-30 | 2017-08-04 | 阿里巴巴集团控股有限公司 | Authentication system, method and platform |
WO2018058544A1 (en) * | 2016-09-30 | 2018-04-05 | 华为技术有限公司 | Service authentication method, system, and related devices |
CN107993058A (en) * | 2016-10-27 | 2018-05-04 | 阿里巴巴集团控股有限公司 | A kind of Information Authentication method and system and server |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9317673B2 (en) * | 2014-02-07 | 2016-04-19 | Bank Of America Corporation | Providing authentication using previously-validated authentication credentials |
CN105450582B (en) * | 2014-06-24 | 2019-10-18 | 华为技术有限公司 | Method for processing business, terminal, server and system |
CN104219050B (en) * | 2014-08-08 | 2015-11-11 | 腾讯科技(深圳)有限公司 | Voice print verification method, server, client and system |
-
2018
- 2018-06-08 CN CN201810585016.1A patent/CN109034816A/en active Pending
- 2018-07-03 WO PCT/CN2018/094343 patent/WO2019232868A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106034123A (en) * | 2015-03-17 | 2016-10-19 | 中国移动通信集团湖北有限公司 | Authentication method, application system server and client |
CN106888446A (en) * | 2015-12-15 | 2017-06-23 | 中国电信股份有限公司 | For the methods, devices and systems of checking information recipient's property right identity |
CN107018119A (en) * | 2016-08-30 | 2017-08-04 | 阿里巴巴集团控股有限公司 | Authentication system, method and platform |
WO2018058544A1 (en) * | 2016-09-30 | 2018-04-05 | 华为技术有限公司 | Service authentication method, system, and related devices |
CN107993058A (en) * | 2016-10-27 | 2018-05-04 | 阿里巴巴集团控股有限公司 | A kind of Information Authentication method and system and server |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109858210A (en) * | 2019-01-07 | 2019-06-07 | 平安科技(深圳)有限公司 | Information Authentication method, apparatus, computer equipment and storage medium |
CN110009386A (en) * | 2019-01-28 | 2019-07-12 | 平安科技(深圳)有限公司 | User classification method, device, computer equipment and storage medium |
CN110009386B (en) * | 2019-01-28 | 2024-02-13 | 平安科技(深圳)有限公司 | User classification method, device, computer equipment and storage medium |
CN110505198A (en) * | 2019-07-05 | 2019-11-26 | 中国平安财产保险股份有限公司 | A kind of checking request method, apparatus, computer equipment and storage medium |
CN111143395A (en) * | 2019-11-28 | 2020-05-12 | 招银云创(深圳)信息技术有限公司 | Identity authentication method, identity authentication device, computer equipment and storage medium |
CN111143395B (en) * | 2019-11-28 | 2024-04-09 | 招银云创信息技术有限公司 | Identity verification method, device, computer equipment and storage medium |
CN111212075A (en) * | 2020-01-02 | 2020-05-29 | 腾讯云计算(北京)有限责任公司 | Service request processing method and device, electronic equipment and computer storage medium |
WO2021196935A1 (en) * | 2020-04-01 | 2021-10-07 | 深圳壹账通智能科技有限公司 | Data checking method and apparatus, electronic device, and storage medium |
CN111541703B (en) * | 2020-04-27 | 2023-04-07 | 平安银行股份有限公司 | Terminal equipment authentication method and device, computer equipment and storage medium |
CN111541703A (en) * | 2020-04-27 | 2020-08-14 | 平安银行股份有限公司 | Terminal equipment authentication method and device, computer equipment and storage medium |
CN111709803B (en) * | 2020-06-12 | 2023-09-05 | 北京思特奇信息技术股份有限公司 | Method and system for preventing unauthorized business handling |
CN111709803A (en) * | 2020-06-12 | 2020-09-25 | 北京思特奇信息技术股份有限公司 | Method and system for preventing unauthorized business handling |
CN113343220A (en) * | 2021-06-02 | 2021-09-03 | 中国工商银行股份有限公司 | Login authentication method, device, equipment and medium of application program |
Also Published As
Publication number | Publication date |
---|---|
WO2019232868A1 (en) | 2019-12-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109034816A (en) | User information verification method, device, computer equipment and storage medium | |
CN107241317B (en) | Method for identifying identity by biological characteristics, user terminal equipment and identity authentication server | |
US5841970A (en) | Authentication method for networks | |
US8661520B2 (en) | Systems and methods for identification and authentication of a user | |
US20080120507A1 (en) | Methods and systems for authentication of a user | |
CN107423333A (en) | A kind of real name identification method and device | |
CN105357196A (en) | Network login method and system | |
CN107231234A (en) | A kind of identity registration method and device | |
CN105791259A (en) | Method for protecting personal information | |
WO2012040869A1 (en) | User account recovery | |
CN108769186A (en) | service authority control method and device | |
US20180039988A1 (en) | Methods for controlling access to a financial account | |
CN105827571A (en) | UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment | |
CN109831310A (en) | A kind of auth method, system and relevant apparatus | |
CN105099983A (en) | Authorization method, authority setting method and devices | |
CN108512660B (en) | Virtual card verification method | |
CN105162774A (en) | Virtual machine login method and device used for terminal | |
CN109829321B (en) | Method, device, equipment and storage medium for authenticating identity | |
CN109325873B (en) | Self-service business processing method, device, computer equipment and storage medium | |
CN114238883A (en) | Identity authentication method, device, equipment and storage medium | |
JP2007272600A (en) | Personal authentication method, system and program associated with environment authentication | |
CN112507390A (en) | Block chain-based electronic license information acquisition method and equipment | |
CN109933974A (en) | Cryptographic initialization method, apparatus, computer equipment and storage medium | |
EP3217593A1 (en) | Two-factor authentication method for increasing the security of transactions between a user and a transaction point or system | |
JP6279643B2 (en) | Login management system, login management method, and login management program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |