CN109067551A - A kind of real name identification method, computer readable storage medium and terminal device - Google Patents
A kind of real name identification method, computer readable storage medium and terminal device Download PDFInfo
- Publication number
- CN109067551A CN109067551A CN201811122156.1A CN201811122156A CN109067551A CN 109067551 A CN109067551 A CN 109067551A CN 201811122156 A CN201811122156 A CN 201811122156A CN 109067551 A CN109067551 A CN 109067551A
- Authority
- CN
- China
- Prior art keywords
- real
- cryptographic hash
- name authentication
- name
- identity information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000012512 characterization method Methods 0.000 claims abstract description 26
- 238000012545 processing Methods 0.000 claims description 13
- 230000005540 biological transmission Effects 0.000 claims description 7
- 235000013399 edible fruits Nutrition 0.000 claims description 2
- 230000006870 function Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 5
- 238000013459 approach Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 230000009466 transformation Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000010252 digital analysis Methods 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 241000545442 Radix Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of real name identification methods, comprising: obtains the real-name authentication request that user sends, real-name authentication request includes the first identity information for being mixed with the first specific identifier;Hash operation is carried out to the first identity information, obtains cryptographic Hash to be certified;It detects and whether there is certification cryptographic Hash identical with cryptographic Hash to be certified in presetting database;If there is certification cryptographic Hash identical with cryptographic Hash to be certified in presetting database, the first authentication result that characterization real-name authentication passes through is sent;If certification cryptographic Hash identical with cryptographic Hash to be certified is not present in presetting database; then send the second authentication result of characterization real-name authentication failure; so that user is when carrying out real-name authentication; it does not need to upload its true identity information; the disclosure risk for reducing user real identification information improves the protection to individual subscriber privacy.The present invention also provides a kind of computer readable storage medium and terminal devices.
Description
Technical field
The present invention relates to technical field of network security more particularly to a kind of real name identification methods, computer-readable storage medium
Matter and terminal device.
Background technique
When user needs to open bank account, stock account or needs Website login, pay invoice, each business platform is equal
It needs to carry out real-name authentication to user, to verify authenticity, the legitimacy of user identity.The real-name authentication of current each business platform
Independently of each other, and it is required to the true identity information of user's upload, such as when user needs to apply bank account, needing will be true
Identity information be uploaded to banking system, it is audited by banking system, is authenticated;And when user needs to apply stock account
When, it also needs that true identity information is uploaded to security operation system again, it is audited again by security operation system,
Certification, i.e., in different business platforms, user needs to carry out multiple authentication, increases the real-name authentication time, and reduce
The using experience degree of user, and after user carries out real-name authentication in each business platform, it protects in each business platform
There is the true identity information of user, increases the risk of subscriber identity information leakage, be unfavorable for the protection of individual subscriber privacy.
To sum up, how to reduce the real-name authentication time, reduce the disclosure risk of subscriber identity information as those skilled in the art
Member's urgent problem to be solved.
Summary of the invention
The embodiment of the invention provides a kind of real name identification method, computer readable storage medium and terminal devices, can
Authenticated time needed for reducing multiple real-name authentication, and can reduce the disclosure risk of subscriber identity information, to improve to user
The protection of individual privacy.
The embodiment of the present invention in a first aspect, providing a kind of real name identification method, comprising:
Obtain the real-name authentication request that user sends, real-name authentication request includes be mixed with the first specific identifier the
One identity information;
Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database, it is real to send characterization
The first authentication result that name certification passes through;
If sending characterization there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database
Second authentication result of real-name authentication failure.
The second aspect of the embodiment of the present invention, provides a kind of computer readable storage medium, described computer-readable to deposit
Storage media is stored with computer-readable instruction, and such as aforementioned first aspect is realized when the computer-readable instruction is executed by processor
The step of real name identification method.
The third aspect of the embodiment of the present invention, provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer-readable instruction that can run on the processor, the processor executes the computer can
Following steps are realized when reading instruction:
Obtain the real-name authentication request that user sends, real-name authentication request includes be mixed with the first specific identifier the
One identity information;
Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database, it is real to send characterization
The first authentication result that name certification passes through;
If sending characterization there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database
Second authentication result of real-name authentication failure.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
In the embodiment of the present invention, when user's request progress real-name authentication, and the body for being mixed with the first specific identifier has been uploaded
When part information, Hash operation can be carried out to the identity information and obtain cryptographic Hash to be certified, and by the cryptographic Hash to be certified and is preset
The certification cryptographic Hash saved in database is compared, to obtain real-name authentication as a result, user is made to carry out real-name authentication
When, it does not need to upload its true identity information, reduces the disclosure risk of user real identification information, improve to individual subscriber
The protection of privacy.In addition, the embodiment of the present invention carries out the ratio of real-name authentication by certification cryptographic Hash that presetting database provides
It is right, the authenticated time of multiple real-name authentication can be greatly reduced, real-name authentication efficiency is improved, promotes the using experience degree of user.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is a kind of one embodiment flow chart of real name identification method in the embodiment of the present invention;
Flow diagram of the Fig. 2 for real name identification method a kind of in the embodiment of the present invention under an application scenarios;
Fig. 3 is a kind of stream of real name identification method authentication storage cryptographic Hash under an application scenarios in the embodiment of the present invention
Journey schematic diagram;
Fig. 4 is a kind of one embodiment structure chart of real-name authentication device in the embodiment of the present invention;
Fig. 5 is a kind of schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of real name identification method, computer readable storage medium and terminal devices, are used for
Authenticated time needed for reducing multiple real-name authentication, and for reducing the disclosure risk of subscriber identity information, to improve to user
The protection of individual privacy.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below
Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field
Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention
Range.
Referring to Fig. 1, the embodiment of the invention provides a kind of real name identification method, the real name identification method, comprising:
Step S101, the real-name authentication request that user sends is obtained, the real-name authentication request includes being mixed with the first spy
Calibrate the first identity information known;
It is understood that in the embodiment of the present invention when user needs to carry out real-name authentication, then the user institute can be obtained
The real-name authentication of transmission is requested, wherein real-name authentication request may include the first identity letter for being mixed with the first specific identifier
Breath such as may include being mixed with the identification card number of special value, or may include being mixed with special value and specific character
Cell-phone number, or may include the Bank Account Number etc. for being mixed with special value or specific character.
Further, in the embodiment of the present invention, before obtaining the real-name authentication request that user sends, can also include:
Real-name authentication interface is preset, is asked with the real-name authentication sent by the real-name authentication interface captures user
It asks.
It should be noted that can be preset one in the embodiment of the present invention or more than one real-name authentication connect
Mouthful, each real-name authentication interface can be respectively connected to each application platform.When user triggers real-name authentication in each application platform,
Each application platform can then upload real-name authentication request by corresponding real-name authentication interface, that is, upload and be mixed with the first specific identifier
The first identity information to the real-name authentication system of the embodiment of the present invention, the real-name authentication system of the embodiment of the present invention receiving
After first identity information, real-name authentication process can be started, to carry out real-name authentication to first identity information, obtain real name
Authentication result, and the real-name authentication result is returned to by requested application platform by corresponding real-name authentication interface, to complete
Real-name authentication in the application platform.
Such as in a certain concrete application, real-name authentication interface A can be connected with the business platform of bank A, when user needs
Open up bank account in bank A, and when bank A needs user to carry out real-name authentication, user can be on the business platform of bank A
Real-name authentication is submitted to request A, to upload the first identity information A for being mixed with the first specific identifier, the business platform of bank A is being connect
It, then can be by real-name authentication interface A by real-name authentication request A the first identity information A that be included after receiving real-name authentication request A
It is sent to real-name authentication system, real-name authentication system can start real-name authentication process after receiving the first identity information A,
To carry out real-name authentication to the first identity information A, real-name authentication is obtained as a result, and obtained real-name authentication result is passed through reality
Name authentication interface A returns to the business platform of bank A, to complete real-name authentication of the user in bank A.
Step S102, Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It is understood that receiving the first identity information for being mixed with the first specific identifier in the embodiment of the present invention
Afterwards, Hash operation first can be carried out to first identity information, to obtain Kazakhstan to be certified corresponding with first identity information
Uncommon value.
Here, hash function according to the following formula carries out Hash to the first identity information received in the embodiment of the present invention
Operation:
HashKey=HASH (Identity);
Wherein, Identity is the first identity information, and HASH is hash function, and HashKey obtains to be certified for operation
Cryptographic Hash.
It should be noted that hash function HASH can be the hash function of digital analysis method in the embodiment of the present invention,
The hash function that can be radix transformation approach can also be the hash function of random number method, can also be character string numerical value certainly
The hash function of Hash method.
Wherein, digital analysis method refers to access according to the more uniform digit order numbers of value certain in element key as cryptographic Hash
Method can then be analyzed by each digit to keyword, lose and be unevenly distributed and when there are many digit of keyword
Even digit, and it is used as cryptographic Hash by remaining, so that keyword value interval is converted into one by analysis distribution situation
Lesser keyword value interval.
For example, in a certain concrete application, need to carry out Hash operation to 8 keywords as follows, to obtain pair
The cryptographic Hash answered:
K1=61317602, K2=61326875, K3=62739628, K4=61343634, K5=62706815, K6=
62774638, K7=61381262, K8=61394220
By analyzing above-mentioned 8 keywords it is found that the 1st, 2,3,6 value of keyword from left to right compares concentration, no
It is preferably used as cryptographic Hash, the remaining 4th, 5,7,8 value is more uniform, can choose two therein as cryptographic Hash, it is assumed that choose
Last two are used as cryptographic Hash, then the cryptographic Hash of this 8 keywords is respectively as follows: 2,75,28,34,15,38,62,20.
Radix transformation approach, which refers to, regards decimal number X as other systems, such as ten ternarys, turns according still further to ten trits
After changing decimal number into, the wherein several cryptographic Hash as X are extracted, radix transformation approach generally takes the number greater than original radix to make
For the radix of conversion, and two radixes should be coprime.
For example, needing to carry out Hash operation to 80127429, to obtain corresponding cryptographic Hash in a certain concrete application
When, then can have:
Hash (80127429)=(80127429) 13
=8*137+0*136+1*135+2*134+7*133+4*132+2*131+9
=(502432641) 10
If taking intermediate three as cryptographic Hash, Hash (80127429)=432 can be obtained.
Random number method refers to setting hash function are as follows: HASH (key)=Random (key), wherein Random is pseudorandom
Function.And character string numerical value Hash rule refers to the sum of II value of ASC of multiple characters of the specified digit of character string to N modulus
As cryptographic Hash.
Step S103, it detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
It is understood that being stored in presetting database corresponding to real-name authentication system in the embodiment of the present invention
Completed the identity information of real-name authentication and the certification cryptographic Hash corresponding to it, wherein the certification cryptographic Hash refers to body
After being mixed with the first specific identifier in part information and carry out above-mentioned Hash operation, obtained cryptographic Hash.Thus, when to mixing
Having the first identity information of first specific identifier to carry out Hash operation can pass through after obtaining corresponding cryptographic Hash to be certified
It detects with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified in presetting database, to carry out first identity information
Real-name authentication.
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in step S104, the described presetting database,
Send the first authentication result that characterization real-name authentication passes through;
If there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in step S105, the described presetting database,
Then send the second authentication result of characterization real-name authentication failure.
For above-mentioned steps S104 and step S105, it is to be understood that if find in the preset database with should be to
If authenticating the identical certification cryptographic Hash of cryptographic Hash, then it is logical characterization real-name authentication can be sent to corresponding application platform or user
The first authentication result crossed;And if in preset data library lookup certification cryptographic Hash identical less than with the cryptographic Hash to be certified
Words can then send the second authentication result of characterization real-name authentication failure to corresponding application platform or user.
For ease of understanding, according to Fig. 1 described embodiment, below with a practical application scene to the embodiment of the present invention
One of real name identification method be described:
Fig. 2 shows flow diagram of the real name identification method in the embodiment of the present invention under an application scenarios.Such as
Shown in Fig. 2, under the scene, the real name identification method, including step S201, step S202, step S203, step S204, step
Rapid S205, step S206, step S207, step S208 and step S209.
Wherein, the real-name authentication request that user sends step S201, is obtained, real-name authentication request includes being mixed with the
First identity information of one specific identifier is similar to above-mentioned steps S101;Step S202, first identity information is breathed out
Uncommon operation, it is similar to above-mentioned steps S102 to obtain cryptographic Hash to be certified;Step S203, detect presetting database in the presence or absence of with
The identical certification cryptographic Hash of the cryptographic Hash to be certified is similar to above-mentioned steps S103;If the presetting database in step S209
It is middle to there is certification cryptographic Hash identical with the cryptographic Hash to be certified, then send the first authentication result that characterization real-name authentication passes through
Part it is similar to above-mentioned steps S105, for simplicity, details are not described herein.
If there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in step S204, the described presetting database,
Then judge whether first identity information is to authenticate for the first time;
If step S205, described first identity information is to authenticate for the first time, the second identity information of user's transmission, institute are obtained
Stating the second identity information is the unmixed identity information for having first specific identifier;
Step S206, real-name authentication is carried out to second identity information, obtains real-name authentication result;
Step S207, judge whether the real-name authentication result is authentification failure;
If step S208, the described real-name authentication result is authentification failure, send characterization real-name authentication failure second is recognized
Demonstrate,prove result;
If step S209, the described real-name authentication result is that certification passes through, sends characterization real-name authentication passes through first and recognize
Demonstrate,prove result.
For above-mentioned steps S204, in the embodiment of the present invention, if in the presetting database there is no with it is described to be certified
If the identical certification cryptographic Hash of cryptographic Hash, then the first identity information authentification failure is not thought directly, and continuing judgement should
Whether the first identity information is certification for the first time in real-name authentication system, if judging, first identity information is not that the real name is recognized
If certification for the first time in card system, then it is believed that the first identity information authentification failure, and to corresponding application platform or
User sends the second authentication result of characterization real-name authentication failure;And if judging first identity information is the real-name authentication system
If certification for the first time in system, S205 is thened follow the steps.
It is understood that in the embodiment of the present invention, when the first identity information had carried out in real-name authentication system in fact
When name certification, real-name authentication system can then create certification mark corresponding with first identity information wherein, such as create
Flag1=1, thus, when certification corresponding with first identity information being not present in real-name authentication system identifying, i.e. real name
There is no flag1 or there are when flag1=0 in Verification System, then it is believed that first identity information is real-name authentication system
In certification for the first time.
For above-mentioned steps S205 to step S206, it is to be understood that when first identity information is the real-name authentication
When certification for the first time in system, real-name authentication system can then require user to input the second identity corresponding with first identity information
Information, wherein second identity information is the unmixed identity information for having above-mentioned first specific identifier, i.e. second identity information
For the true identity information of user, and real-name authentication is carried out to second identity information, to obtain real-name authentication result.
In the embodiment of the present invention, real-name authentication system carries out the authentication method of real-name authentication to second identity information, can
Think any authentication method in existing authentication method, for example, real-name authentication can be carried out by third party authentication server,
Will second identity information be sent to corresponding third party authentication server so that the third party authentication server to this
Two identity informations carry out real-name authentication, to obtain the real-name authentication of second identity information as a result, and by obtained real name
Authentication result returns to real-name authentication system.
For above-mentioned steps S207 to step S209, it is to be understood that in the embodiment of the present invention, when real-name authentication system
When obtained real-name authentication result is authentification failure, real-name authentication system can be sent to corresponding application platform or user
The second authentication result of real-name authentication failure is characterized, and when the obtained real-name authentication result of real-name authentication system is to authenticate successfully
When, real-name authentication system can send the first certification knot that characterization real-name authentication passes through to corresponding application platform or user
Fruit.
Further, as shown in figure 3, in the embodiment of the present invention, when determined the first identity information be real-name authentication system
Certification for the first time, and obtain the second identity information corresponding with first identity information, and carry out to the second identity information real
Name authenticates, and after having obtained the real-name authentication result of the second identity information, can also include:
If step S301, the described real-name authentication result is that certification passes through, the second specific identifier is obtained;
It should be noted that in the embodiment of the present invention, when the real-name authentication result of second identity information is that certification passes through
When, real-name authentication system then can further obtain the second specific identifier, wherein second specific identifier can be user's input
Any identification information can be such as the numerical value 12345 of user's input, naturally it is also possible to the mark being randomly generated for real-name authentication system
Know information, the character string a1b2c3d, etc. being randomly generated such as real name Verification System.
Step S302, second identity information and second specific identifier are mixed using default mixing rule
Processing, obtains mixed tiers e'tat information;
Here, real-name authentication system after getting second specific identifier, that is, can be used default mixing rule to this
Two identity informations and second specific identifier carry out mixed processing, to obtain mixed tiers e'tat information.
It should be noted that the default mixing rule can be the customized hybrid regulatory of user in the embodiment of the present invention
Then, i.e. user is when inputting second specific identifier, user also can customize input mix second identity information and this second
The mixing rule of specific identifier, such as mixing rule of " the second specific identifier of interval insertion in the second identity information ", or " will
Second specific identifier is inserted into the first place of the second identity information " mixing rule, or " the second specific identifier is inserted into
The mixing rule, etc. of the 5th of two identity informations ", real-name authentication system is in the second specific identifier for getting user's input
After corresponding mixing rule, can according to the corresponding mixing rule to second identity information and second specific identifier into
Row mixed processing, to obtain mixed tiers e'tat information.
Here, in the embodiment of the present invention, the default mixing rule can certainly be user from pre-set a variety of
Selected mixing rule in mixing rule, i.e., can be preset that there are many mixing rules in real-name authentication system, defeated in user
When entering the second specific identifier, user can therefrom choose it and want for mixing the mixed of second identity information and second specific identifier
Normally, real-name authentication system then can be according to the mixing rule selected by user come to second identity information and this is second specific
Mark carries out mixed processing, to obtain mixed tiers e'tat information.
Here it is to be understood that user is when inputting second specific identifier, if not inputting customized hybrid regulatory
Then, and if also not choosing corresponding mixing rule from real-name authentication system, real-name authentication system then can be directly according to default
Selection Strategy selects to mix the mixing rule of second identity information and second specific identifier, such as from pre-set a variety of
Mixing rule is randomly selected in mixing rule to mix second identity information and second specific identifier, such as is randomly choosed
The mixing rule of " the second specific identifier is inserted into the first place of the second identity information " come mix second identity information and this
Two specific identifiers;Or mixing rule is chosen according to the identity type of the second identity information, i.e., it is each in real-name authentication system
Mixing rule is provided with corresponding identity type, and " interval insertion second is special in the second identity information for such as the first mixing rule
Identity type corresponding to calibration knowledge " is identification card number, and the second specific identifier " is inserted into the second identity letter by the second mixing rule
Identity type corresponding to the first place of breath " is account No., and the second specific identifier " is inserted into the second identity by third mixing rule
Identity type corresponding to the 5th of information " is phone number, etc., thus, when real-name authentication system determines a certain second body
When part information is identity account, real-name authentication system can then choose " in second identity information be spaced corresponding with identification card number
Be inserted into the second specific identifier " mixing rule mix second identity information and corresponding second specific identifier;And work as real name
When Verification System determines that another second identity information is phone number, real-name authentication system can then be chosen corresponding with phone number
The mixing rule of " the second specific identifier is inserted into the 5th of the second identity information " mixes second identity information and correspondence
The second specific identifier.
Step S303, Hash operation is carried out to the tiers e'tat information, obtained corresponding with the tiers e'tat information
Authenticate cryptographic Hash;
Step S304, by the certification cryptographic Hash and the second identity information associated storage in the presetting database
In.
For above-mentioned steps S303 and step S304, it is to be understood that in the embodiment of the present invention, real-name authentication system exists
It, can be to using Kazakhstan above-mentioned after obtaining the tiers e'tat information of the second identity information and the second specific identifier after mixed processing
Uncommon function carries out Hash operation to the tiers e'tat information, to obtain certification cryptographic Hash corresponding with tiers e'tat information, and will
Obtained certification cryptographic Hash and the second identity information associated storage in the presetting database of real-name authentication system so that after
If continuous user continues the real-name authentication of the identity information, can only it be breathed out by comparing the certification saved in presetting database
Uncommon value quickly to obtain real-name authentication as a result, thus authenticated time needed for reducing the multiple real-name authentication of user, to improve real name
The authentication efficiency of certification promotes the using experience degree of user.
It preferably, can also include: output after obtaining mixed tiers e'tat information in the embodiment of the present invention
The tiers e'tat information, perhaps exports the default mixing rule and second specific identifier or output is described default
The mark of mixing corresponding to mixing rule and second specific identifier.
Here, real-name authentication system is mixed in the second identity information inputted to user with corresponding second specific identifier
Conjunction processing, after obtaining tiers e'tat information, can export obtained tiers e'tat information to user, so that user knows
Its mixed identity information of true identity information facilitates user subsequent when other application platform carries out real-name authentication, can be only
Real-name authentication is carried out by inputting the mixed identity information, so that the input of true identity information is avoided, it is true to reduce
The risk of leakage of real identity information improves the protection to individual subscriber privacy.
It is understood that being believed using default mixing rule the second identity that user inputs in the embodiment of the present invention
Breath carries out mixed processing with corresponding second specific identifier, and after obtaining tiers e'tat information, real-name authentication system can also be pre- by this
If mixing rule and corresponding second specific identifier, or this is preset into the mark of mixing corresponding to mixing rule and second spy
Calibration knows output to user, so that user can preset mixing corresponding to mixing rule or the default mixing rule by this
Mark and second specific identifier, obtain mixed tiers e'tat information.
In the embodiment of the present invention, when user's request progress real-name authentication, and the body for being mixed with the first specific identifier has been uploaded
When part information, Hash operation can be carried out to the identity information and obtain cryptographic Hash to be certified, and by the cryptographic Hash to be certified and is preset
The certification cryptographic Hash saved in database is compared, to obtain real-name authentication as a result, user is made to carry out real-name authentication
When, it does not need to upload its true identity information, reduces the disclosure risk of user real identification information, improve to individual subscriber
The protection of privacy.In addition, the embodiment of the present invention carries out the comparison of real-name authentication by cryptographic Hash that presetting database provides, it can
The authenticated time of multiple real-name authentication is greatly reduced, real-name authentication efficiency is improved, promotes the usage experience of user.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
A kind of real name identification method is essentially described above, a kind of real-name authentication device will be described in detail below.
Fig. 4 shows one embodiment structure chart of real-name authentication device in the embodiment of the present invention.As shown in figure 4, described
Real-name authentication device, comprising:
Certification request obtains module 401, for obtaining the real-name authentication request of user's transmission, the real-name authentication request packet
Include the first identity information for being mixed with the first specific identifier;
Hash operation module 402 obtains cryptographic Hash to be certified for carrying out Hash operation to first identity information;
Cryptographic Hash detection module 403, for detecting in presetting database with the presence or absence of identical as the cryptographic Hash to be certified
Certification cryptographic Hash;
First authentication result sending module 404, if for existing and the cryptographic Hash to be certified in the presetting database
Identical certification cryptographic Hash then sends the first authentication result that characterization real-name authentication passes through;
Second authentication result sending module 405, if for being not present and the Hash to be certified in the presetting database
It is worth identical certification cryptographic Hash, then sends the second authentication result of characterization real-name authentication failure.
Further, the real-name authentication device, comprising:
Authentication interface setup module, for presetting real-name authentication interface, to be obtained by the real-name authentication interface
The real-name authentication request that user sends.
Preferably, the second authentication result sending module 405, comprising:
Authentication determination unit for the first time, if for there is no identical with the cryptographic Hash to be certified in the presetting database
Cryptographic Hash is authenticated, then judges whether first identity information is to authenticate for the first time;
Second identity information acquiring unit obtains user's transmission if being to authenticate for the first time for first identity information
The second identity information, second identity information be the unmixed identity information for having first specific identifier;
Second identity information authentication unit obtains real-name authentication for carrying out real-name authentication to second identity information
As a result;
Second authentication result transmission unit, for sending characterization real name when the real-name authentication result is authentification failure
Second authentication result of authentification failure.
Optionally, the second identity information authentication unit is also used to for second identity information being sent to corresponding
Third party authentication server obtains so that the third party authentication server carries out real-name authentication to second identity information
To real-name authentication result.
Further, the real-name authentication device, further includes:
Specific identifier obtains module, if being that certification passes through for the real-name authentication result, obtains the second specific identifier;
Mixed processing module, for using default mixing rule to second identity information and second specific identifier
Mixed processing is carried out, mixed tiers e'tat information is obtained;
Certification cryptographic Hash obtains module, for carrying out Hash operation to the tiers e'tat information, obtains and the third
The corresponding certification cryptographic Hash of identity information;
Cryptographic Hash memory module is authenticated, is used for the certification cryptographic Hash and the second identity information associated storage in institute
It states in presetting database.
Preferably, the real-name authentication device, further includes:
Identity information output module, for exporting the tiers e'tat information, or the output default mixing rule and
Second specific identifier, or mixing mark and second specific identifier corresponding to the output default mixing rule.
Fig. 5 is a kind of schematic diagram of terminal device provided in an embodiment of the present invention.As shown in figure 5, the terminal of the embodiment
Equipment 5 includes: processor 50, memory 51 and is stored in the memory 51 and can run on the processor 50
Computer-readable instruction 52, such as real-name authentication program.The realization when processor 50 executes the computer-readable instruction 52
Step in above-mentioned each real name identification method embodiment, such as step S101 shown in FIG. 1 to step S105.Alternatively, described
Processor 50 realizes the function of each module/unit in above-mentioned each Installation practice, example when executing the computer-readable instruction 52
Module 401 as shown in Figure 4 to module 405 function.
Illustratively, the computer-readable instruction 52 can be divided into one or more module/units, one
Or multiple module/units are stored in the memory 51, and are executed by the processor 50, to complete the present invention.Institute
Stating one or more module/units can be the series of computation machine readable instruction section that can complete specific function, the instruction segment
For describing implementation procedure of the computer-readable instruction 52 in the terminal device 5.
The terminal device 5 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set
It is standby.The terminal device may include, but be not limited only to, processor 50, memory 51.It will be understood by those skilled in the art that Fig. 5
The only example of terminal device 5 does not constitute the restriction to terminal device 5, may include than illustrating more or fewer portions
Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net
Network access device, bus etc..
The processor 50 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 51 can be the internal storage unit of the terminal device 5, such as the hard disk or interior of terminal device 5
It deposits.The memory 51 is also possible to the External memory equipment of the terminal device 5, such as be equipped on the terminal device 5
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..Further, the memory 51 can also both include the storage inside list of the terminal device 5
Member also includes External memory equipment.The memory 51 is for storing the computer-readable instruction and terminal device institute
Other programs and data needed.The memory 51 can be also used for temporarily storing the number that has exported or will export
According to.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of real name identification method characterized by comprising
The real-name authentication request that user sends is obtained, the real-name authentication request includes the first body for being mixed with the first specific identifier
Part information;
Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database, sends characterization real name and recognize
Demonstrate,prove the first authentication result passed through;
If sending characterization real name there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database
Second authentication result of authentification failure.
2. real name identification method according to claim 1, which is characterized in that requested obtaining the real-name authentication that user sends
Before, comprising:
Real-name authentication interface is preset, with the real-name authentication request sent by the real-name authentication interface captures user.
3. real name identification method according to claim 1 or 2, which is characterized in that if in the presetting database
There is no certification cryptographic Hash identical with the cryptographic Hash to be certified, then send the second certification knot of characterization real-name authentication failure
Fruit, comprising:
If judging described first there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database
Whether identity information is to authenticate for the first time;
If first identity information is to authenticate for the first time, the second identity information of user's transmission, the second identity letter are obtained
Breath is the unmixed identity information for having first specific identifier;
Real-name authentication is carried out to second identity information, obtains real-name authentication result;
When the real-name authentication result is authentification failure, the second authentication result of characterization real-name authentication failure is sent.
4. real name identification method according to claim 3, which is characterized in that described to be carried out in fact to second identity information
Name certification, obtains real-name authentication result, comprising:
Second identity information is sent to corresponding third party authentication server, so that the third party authentication server
Real-name authentication is carried out to second identity information, obtains real-name authentication result.
5. real name identification method according to claim 3, which is characterized in that carrying out real name to second identity information
Certification, after obtaining real-name authentication result, further includes:
If the real-name authentication result is that certification passes through, the second specific identifier is obtained;
Mixed processing is carried out to second identity information and second specific identifier using default mixing rule, is mixed
Tiers e'tat information afterwards;
Hash operation is carried out to the tiers e'tat information, obtains certification cryptographic Hash corresponding with the tiers e'tat information;
By the certification cryptographic Hash and the second identity information associated storage in the presetting database.
6. real name identification method according to claim 5, which is characterized in that obtain mixed tiers e'tat information it
Afterwards, further includes:
The tiers e'tat information is exported,
Or the default mixing rule and second specific identifier are exported,
Or mixing mark and second specific identifier corresponding to the output default mixing rule.
7. a kind of computer readable storage medium, the computer-readable recording medium storage has computer-readable instruction, special
Sign is, the real-name authentication as described in any one of claims 1 to 6 is realized when the computer-readable instruction is executed by processor
The step of method.
8. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor
The computer-readable instruction of operation, which is characterized in that the processor realizes following step when executing the computer-readable instruction
It is rapid:
The real-name authentication request that user sends is obtained, the real-name authentication request includes the first body for being mixed with the first specific identifier
Part information;
Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database, sends characterization real name and recognize
Demonstrate,prove the first authentication result passed through;
If sending characterization real name there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database
Second authentication result of authentification failure.
9. terminal device according to claim 8, which is characterized in that request it obtaining the real-name authentication that user sends
Before, comprising:
Real-name authentication interface is preset, with the real-name authentication request sent by the real-name authentication interface captures user.
10. terminal device according to claim 8, which is characterized in that if in the presetting database there is no with
The identical certification cryptographic Hash of the cryptographic Hash to be certified then sends the second authentication result of characterization real-name authentication failure, comprising:
If judging described first there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database
Whether identity information is to authenticate for the first time;
If first identity information is to authenticate for the first time, the second identity information of user's transmission, the second identity letter are obtained
Breath is the unmixed identity information for having first specific identifier;
Real-name authentication is carried out to second identity information, obtains real-name authentication result;
When the real-name authentication result is authentification failure, the second authentication result of characterization real-name authentication failure is sent.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811122156.1A CN109067551A (en) | 2018-09-26 | 2018-09-26 | A kind of real name identification method, computer readable storage medium and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811122156.1A CN109067551A (en) | 2018-09-26 | 2018-09-26 | A kind of real name identification method, computer readable storage medium and terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109067551A true CN109067551A (en) | 2018-12-21 |
Family
ID=64765731
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811122156.1A Pending CN109067551A (en) | 2018-09-26 | 2018-09-26 | A kind of real name identification method, computer readable storage medium and terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109067551A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131240A (en) * | 2019-12-23 | 2020-05-08 | 杭州迪普科技股份有限公司 | Authentication information backup method and device, electronic equipment and storage medium |
CN114006763A (en) * | 2021-11-01 | 2022-02-01 | 许昌许继软件技术有限公司 | Rapid retrieval matching method and system based on rapid table |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100122082A1 (en) * | 2008-10-08 | 2010-05-13 | Leiwen Deng | User identity validation system and method |
CN103269270A (en) * | 2013-04-25 | 2013-08-28 | 安徽杨凌科技有限公司 | Real-name authentication safe login method and system based on cell phone number |
CN103929310A (en) * | 2014-04-25 | 2014-07-16 | 长沙市梦马软件有限公司 | Mobile phone client side password unified authentication method and system |
CN105791262A (en) * | 2015-12-30 | 2016-07-20 | 广东亿迅科技有限公司 | APP real name authentication secure login system and method based on mobile phone IMSI |
CN105868970A (en) * | 2016-03-25 | 2016-08-17 | 联想(北京)有限公司 | Authentication method and electronic device |
CN107273514A (en) * | 2017-06-21 | 2017-10-20 | 杭州云证网络科技有限公司 | A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system |
CN107423333A (en) * | 2017-04-21 | 2017-12-01 | 博大莱哲科技(北京)有限公司 | A kind of real name identification method and device |
CN108365949A (en) * | 2018-03-09 | 2018-08-03 | 北京阿尔山金融科技有限公司 | Client's system of real name approaches to IM, apparatus and system |
-
2018
- 2018-09-26 CN CN201811122156.1A patent/CN109067551A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100122082A1 (en) * | 2008-10-08 | 2010-05-13 | Leiwen Deng | User identity validation system and method |
CN103269270A (en) * | 2013-04-25 | 2013-08-28 | 安徽杨凌科技有限公司 | Real-name authentication safe login method and system based on cell phone number |
CN103929310A (en) * | 2014-04-25 | 2014-07-16 | 长沙市梦马软件有限公司 | Mobile phone client side password unified authentication method and system |
CN105791262A (en) * | 2015-12-30 | 2016-07-20 | 广东亿迅科技有限公司 | APP real name authentication secure login system and method based on mobile phone IMSI |
CN105868970A (en) * | 2016-03-25 | 2016-08-17 | 联想(北京)有限公司 | Authentication method and electronic device |
CN107423333A (en) * | 2017-04-21 | 2017-12-01 | 博大莱哲科技(北京)有限公司 | A kind of real name identification method and device |
CN107273514A (en) * | 2017-06-21 | 2017-10-20 | 杭州云证网络科技有限公司 | A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system |
CN108365949A (en) * | 2018-03-09 | 2018-08-03 | 北京阿尔山金融科技有限公司 | Client's system of real name approaches to IM, apparatus and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131240A (en) * | 2019-12-23 | 2020-05-08 | 杭州迪普科技股份有限公司 | Authentication information backup method and device, electronic equipment and storage medium |
CN114006763A (en) * | 2021-11-01 | 2022-02-01 | 许昌许继软件技术有限公司 | Rapid retrieval matching method and system based on rapid table |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109815657B (en) | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment | |
CN106453415B (en) | Block chain-based equipment authentication method, authentication server and user equipment | |
CN110310205B (en) | Block chain data monitoring method, device, equipment and medium | |
CN109672683B (en) | Binding method and binding device of Internet of things equipment and terminal equipment | |
CN112765268B (en) | Data privacy protection method, device and equipment based on block chain | |
US20030177366A1 (en) | Method and apparatus for dynamic personal identification number management | |
CN109688186A (en) | Data interactive method, device, equipment and readable storage medium storing program for executing | |
CN111191212B (en) | Block chain-based digital certificate processing method, device, equipment and storage medium | |
CN110138767B (en) | Transaction request processing method, device, equipment and storage medium | |
CN110661779B (en) | Block chain network-based electronic certificate management method, system, device and medium | |
CN112448956B (en) | Authority processing method and device of short message verification code and computer equipment | |
CN107358439A (en) | Using method of payment, device and terminal device | |
CN104469736B (en) | A kind of data processing method, server and terminal | |
CN109067551A (en) | A kind of real name identification method, computer readable storage medium and terminal device | |
CN113890739B (en) | Cross-blockchain authentication method and device, electronic equipment and medium | |
CN108833109A (en) | Identity identifying method, device and electronic equipment | |
CN106209751B (en) | Service-oriented interface authentication method based on the operating system certificate of authority | |
CN112487487A (en) | Authority management method, device, equipment and storage medium for member of block chain node | |
CN112163949A (en) | Intelligent contract generation method and device based on contract component imaging | |
CN107622396A (en) | Self-service dealing method, system and terminal device | |
CN112468497A (en) | Block chain terminal equipment authorization authentication method, device, equipment and storage medium | |
CN107844290B (en) | Software product design method and device based on data stream security threat analysis | |
CN113935008B (en) | User authentication method, device, electronic equipment and computer readable storage medium | |
CN109547404A (en) | The acquisition methods and server of data | |
CN109461222A (en) | Information access method of checking card, system and electronic equipment based on equipment of checking card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1262761 Country of ref document: HK |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181221 |
|
RJ01 | Rejection of invention patent application after publication |