CN109067551A - A kind of real name identification method, computer readable storage medium and terminal device - Google Patents

A kind of real name identification method, computer readable storage medium and terminal device Download PDF

Info

Publication number
CN109067551A
CN109067551A CN201811122156.1A CN201811122156A CN109067551A CN 109067551 A CN109067551 A CN 109067551A CN 201811122156 A CN201811122156 A CN 201811122156A CN 109067551 A CN109067551 A CN 109067551A
Authority
CN
China
Prior art keywords
real
cryptographic hash
name authentication
name
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811122156.1A
Other languages
Chinese (zh)
Inventor
王江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201811122156.1A priority Critical patent/CN109067551A/en
Publication of CN109067551A publication Critical patent/CN109067551A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of real name identification methods, comprising: obtains the real-name authentication request that user sends, real-name authentication request includes the first identity information for being mixed with the first specific identifier;Hash operation is carried out to the first identity information, obtains cryptographic Hash to be certified;It detects and whether there is certification cryptographic Hash identical with cryptographic Hash to be certified in presetting database;If there is certification cryptographic Hash identical with cryptographic Hash to be certified in presetting database, the first authentication result that characterization real-name authentication passes through is sent;If certification cryptographic Hash identical with cryptographic Hash to be certified is not present in presetting database; then send the second authentication result of characterization real-name authentication failure; so that user is when carrying out real-name authentication; it does not need to upload its true identity information; the disclosure risk for reducing user real identification information improves the protection to individual subscriber privacy.The present invention also provides a kind of computer readable storage medium and terminal devices.

Description

A kind of real name identification method, computer readable storage medium and terminal device
Technical field
The present invention relates to technical field of network security more particularly to a kind of real name identification methods, computer-readable storage medium Matter and terminal device.
Background technique
When user needs to open bank account, stock account or needs Website login, pay invoice, each business platform is equal It needs to carry out real-name authentication to user, to verify authenticity, the legitimacy of user identity.The real-name authentication of current each business platform Independently of each other, and it is required to the true identity information of user's upload, such as when user needs to apply bank account, needing will be true Identity information be uploaded to banking system, it is audited by banking system, is authenticated;And when user needs to apply stock account When, it also needs that true identity information is uploaded to security operation system again, it is audited again by security operation system, Certification, i.e., in different business platforms, user needs to carry out multiple authentication, increases the real-name authentication time, and reduce The using experience degree of user, and after user carries out real-name authentication in each business platform, it protects in each business platform There is the true identity information of user, increases the risk of subscriber identity information leakage, be unfavorable for the protection of individual subscriber privacy.
To sum up, how to reduce the real-name authentication time, reduce the disclosure risk of subscriber identity information as those skilled in the art Member's urgent problem to be solved.
Summary of the invention
The embodiment of the invention provides a kind of real name identification method, computer readable storage medium and terminal devices, can Authenticated time needed for reducing multiple real-name authentication, and can reduce the disclosure risk of subscriber identity information, to improve to user The protection of individual privacy.
The embodiment of the present invention in a first aspect, providing a kind of real name identification method, comprising:
Obtain the real-name authentication request that user sends, real-name authentication request includes be mixed with the first specific identifier the One identity information;
Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database, it is real to send characterization The first authentication result that name certification passes through;
If sending characterization there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database Second authentication result of real-name authentication failure.
The second aspect of the embodiment of the present invention, provides a kind of computer readable storage medium, described computer-readable to deposit Storage media is stored with computer-readable instruction, and such as aforementioned first aspect is realized when the computer-readable instruction is executed by processor The step of real name identification method.
The third aspect of the embodiment of the present invention, provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer-readable instruction that can run on the processor, the processor executes the computer can Following steps are realized when reading instruction:
Obtain the real-name authentication request that user sends, real-name authentication request includes be mixed with the first specific identifier the One identity information;
Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database, it is real to send characterization The first authentication result that name certification passes through;
If sending characterization there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database Second authentication result of real-name authentication failure.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that
In the embodiment of the present invention, when user's request progress real-name authentication, and the body for being mixed with the first specific identifier has been uploaded When part information, Hash operation can be carried out to the identity information and obtain cryptographic Hash to be certified, and by the cryptographic Hash to be certified and is preset The certification cryptographic Hash saved in database is compared, to obtain real-name authentication as a result, user is made to carry out real-name authentication When, it does not need to upload its true identity information, reduces the disclosure risk of user real identification information, improve to individual subscriber The protection of privacy.In addition, the embodiment of the present invention carries out the ratio of real-name authentication by certification cryptographic Hash that presetting database provides It is right, the authenticated time of multiple real-name authentication can be greatly reduced, real-name authentication efficiency is improved, promotes the using experience degree of user.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of one embodiment flow chart of real name identification method in the embodiment of the present invention;
Flow diagram of the Fig. 2 for real name identification method a kind of in the embodiment of the present invention under an application scenarios;
Fig. 3 is a kind of stream of real name identification method authentication storage cryptographic Hash under an application scenarios in the embodiment of the present invention Journey schematic diagram;
Fig. 4 is a kind of one embodiment structure chart of real-name authentication device in the embodiment of the present invention;
Fig. 5 is a kind of schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the invention provides a kind of real name identification method, computer readable storage medium and terminal devices, are used for Authenticated time needed for reducing multiple real-name authentication, and for reducing the disclosure risk of subscriber identity information, to improve to user The protection of individual privacy.
In order to make the invention's purpose, features and advantages of the invention more obvious and easy to understand, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that disclosed below Embodiment be only a part of the embodiment of the present invention, and not all embodiment.Based on the embodiments of the present invention, this field Those of ordinary skill's all other embodiment obtained without making creative work, belongs to protection of the present invention Range.
Referring to Fig. 1, the embodiment of the invention provides a kind of real name identification method, the real name identification method, comprising:
Step S101, the real-name authentication request that user sends is obtained, the real-name authentication request includes being mixed with the first spy Calibrate the first identity information known;
It is understood that in the embodiment of the present invention when user needs to carry out real-name authentication, then the user institute can be obtained The real-name authentication of transmission is requested, wherein real-name authentication request may include the first identity letter for being mixed with the first specific identifier Breath such as may include being mixed with the identification card number of special value, or may include being mixed with special value and specific character Cell-phone number, or may include the Bank Account Number etc. for being mixed with special value or specific character.
Further, in the embodiment of the present invention, before obtaining the real-name authentication request that user sends, can also include:
Real-name authentication interface is preset, is asked with the real-name authentication sent by the real-name authentication interface captures user It asks.
It should be noted that can be preset one in the embodiment of the present invention or more than one real-name authentication connect Mouthful, each real-name authentication interface can be respectively connected to each application platform.When user triggers real-name authentication in each application platform, Each application platform can then upload real-name authentication request by corresponding real-name authentication interface, that is, upload and be mixed with the first specific identifier The first identity information to the real-name authentication system of the embodiment of the present invention, the real-name authentication system of the embodiment of the present invention receiving After first identity information, real-name authentication process can be started, to carry out real-name authentication to first identity information, obtain real name Authentication result, and the real-name authentication result is returned to by requested application platform by corresponding real-name authentication interface, to complete Real-name authentication in the application platform.
Such as in a certain concrete application, real-name authentication interface A can be connected with the business platform of bank A, when user needs Open up bank account in bank A, and when bank A needs user to carry out real-name authentication, user can be on the business platform of bank A Real-name authentication is submitted to request A, to upload the first identity information A for being mixed with the first specific identifier, the business platform of bank A is being connect It, then can be by real-name authentication interface A by real-name authentication request A the first identity information A that be included after receiving real-name authentication request A It is sent to real-name authentication system, real-name authentication system can start real-name authentication process after receiving the first identity information A, To carry out real-name authentication to the first identity information A, real-name authentication is obtained as a result, and obtained real-name authentication result is passed through reality Name authentication interface A returns to the business platform of bank A, to complete real-name authentication of the user in bank A.
Step S102, Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It is understood that receiving the first identity information for being mixed with the first specific identifier in the embodiment of the present invention Afterwards, Hash operation first can be carried out to first identity information, to obtain Kazakhstan to be certified corresponding with first identity information Uncommon value.
Here, hash function according to the following formula carries out Hash to the first identity information received in the embodiment of the present invention Operation:
HashKey=HASH (Identity);
Wherein, Identity is the first identity information, and HASH is hash function, and HashKey obtains to be certified for operation Cryptographic Hash.
It should be noted that hash function HASH can be the hash function of digital analysis method in the embodiment of the present invention, The hash function that can be radix transformation approach can also be the hash function of random number method, can also be character string numerical value certainly The hash function of Hash method.
Wherein, digital analysis method refers to access according to the more uniform digit order numbers of value certain in element key as cryptographic Hash Method can then be analyzed by each digit to keyword, lose and be unevenly distributed and when there are many digit of keyword Even digit, and it is used as cryptographic Hash by remaining, so that keyword value interval is converted into one by analysis distribution situation Lesser keyword value interval.
For example, in a certain concrete application, need to carry out Hash operation to 8 keywords as follows, to obtain pair The cryptographic Hash answered:
K1=61317602, K2=61326875, K3=62739628, K4=61343634, K5=62706815, K6= 62774638, K7=61381262, K8=61394220
By analyzing above-mentioned 8 keywords it is found that the 1st, 2,3,6 value of keyword from left to right compares concentration, no It is preferably used as cryptographic Hash, the remaining 4th, 5,7,8 value is more uniform, can choose two therein as cryptographic Hash, it is assumed that choose Last two are used as cryptographic Hash, then the cryptographic Hash of this 8 keywords is respectively as follows: 2,75,28,34,15,38,62,20.
Radix transformation approach, which refers to, regards decimal number X as other systems, such as ten ternarys, turns according still further to ten trits After changing decimal number into, the wherein several cryptographic Hash as X are extracted, radix transformation approach generally takes the number greater than original radix to make For the radix of conversion, and two radixes should be coprime.
For example, needing to carry out Hash operation to 80127429, to obtain corresponding cryptographic Hash in a certain concrete application When, then can have:
Hash (80127429)=(80127429) 13
=8*137+0*136+1*135+2*134+7*133+4*132+2*131+9
=(502432641) 10
If taking intermediate three as cryptographic Hash, Hash (80127429)=432 can be obtained.
Random number method refers to setting hash function are as follows: HASH (key)=Random (key), wherein Random is pseudorandom Function.And character string numerical value Hash rule refers to the sum of II value of ASC of multiple characters of the specified digit of character string to N modulus As cryptographic Hash.
Step S103, it detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
It is understood that being stored in presetting database corresponding to real-name authentication system in the embodiment of the present invention Completed the identity information of real-name authentication and the certification cryptographic Hash corresponding to it, wherein the certification cryptographic Hash refers to body After being mixed with the first specific identifier in part information and carry out above-mentioned Hash operation, obtained cryptographic Hash.Thus, when to mixing Having the first identity information of first specific identifier to carry out Hash operation can pass through after obtaining corresponding cryptographic Hash to be certified It detects with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified in presetting database, to carry out first identity information Real-name authentication.
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in step S104, the described presetting database, Send the first authentication result that characterization real-name authentication passes through;
If there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in step S105, the described presetting database, Then send the second authentication result of characterization real-name authentication failure.
For above-mentioned steps S104 and step S105, it is to be understood that if find in the preset database with should be to If authenticating the identical certification cryptographic Hash of cryptographic Hash, then it is logical characterization real-name authentication can be sent to corresponding application platform or user The first authentication result crossed;And if in preset data library lookup certification cryptographic Hash identical less than with the cryptographic Hash to be certified Words can then send the second authentication result of characterization real-name authentication failure to corresponding application platform or user.
For ease of understanding, according to Fig. 1 described embodiment, below with a practical application scene to the embodiment of the present invention One of real name identification method be described:
Fig. 2 shows flow diagram of the real name identification method in the embodiment of the present invention under an application scenarios.Such as Shown in Fig. 2, under the scene, the real name identification method, including step S201, step S202, step S203, step S204, step Rapid S205, step S206, step S207, step S208 and step S209.
Wherein, the real-name authentication request that user sends step S201, is obtained, real-name authentication request includes being mixed with the First identity information of one specific identifier is similar to above-mentioned steps S101;Step S202, first identity information is breathed out Uncommon operation, it is similar to above-mentioned steps S102 to obtain cryptographic Hash to be certified;Step S203, detect presetting database in the presence or absence of with The identical certification cryptographic Hash of the cryptographic Hash to be certified is similar to above-mentioned steps S103;If the presetting database in step S209 It is middle to there is certification cryptographic Hash identical with the cryptographic Hash to be certified, then send the first authentication result that characterization real-name authentication passes through Part it is similar to above-mentioned steps S105, for simplicity, details are not described herein.
If there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in step S204, the described presetting database, Then judge whether first identity information is to authenticate for the first time;
If step S205, described first identity information is to authenticate for the first time, the second identity information of user's transmission, institute are obtained Stating the second identity information is the unmixed identity information for having first specific identifier;
Step S206, real-name authentication is carried out to second identity information, obtains real-name authentication result;
Step S207, judge whether the real-name authentication result is authentification failure;
If step S208, the described real-name authentication result is authentification failure, send characterization real-name authentication failure second is recognized Demonstrate,prove result;
If step S209, the described real-name authentication result is that certification passes through, sends characterization real-name authentication passes through first and recognize Demonstrate,prove result.
For above-mentioned steps S204, in the embodiment of the present invention, if in the presetting database there is no with it is described to be certified If the identical certification cryptographic Hash of cryptographic Hash, then the first identity information authentification failure is not thought directly, and continuing judgement should Whether the first identity information is certification for the first time in real-name authentication system, if judging, first identity information is not that the real name is recognized If certification for the first time in card system, then it is believed that the first identity information authentification failure, and to corresponding application platform or User sends the second authentication result of characterization real-name authentication failure;And if judging first identity information is the real-name authentication system If certification for the first time in system, S205 is thened follow the steps.
It is understood that in the embodiment of the present invention, when the first identity information had carried out in real-name authentication system in fact When name certification, real-name authentication system can then create certification mark corresponding with first identity information wherein, such as create Flag1=1, thus, when certification corresponding with first identity information being not present in real-name authentication system identifying, i.e. real name There is no flag1 or there are when flag1=0 in Verification System, then it is believed that first identity information is real-name authentication system In certification for the first time.
For above-mentioned steps S205 to step S206, it is to be understood that when first identity information is the real-name authentication When certification for the first time in system, real-name authentication system can then require user to input the second identity corresponding with first identity information Information, wherein second identity information is the unmixed identity information for having above-mentioned first specific identifier, i.e. second identity information For the true identity information of user, and real-name authentication is carried out to second identity information, to obtain real-name authentication result.
In the embodiment of the present invention, real-name authentication system carries out the authentication method of real-name authentication to second identity information, can Think any authentication method in existing authentication method, for example, real-name authentication can be carried out by third party authentication server, Will second identity information be sent to corresponding third party authentication server so that the third party authentication server to this Two identity informations carry out real-name authentication, to obtain the real-name authentication of second identity information as a result, and by obtained real name Authentication result returns to real-name authentication system.
For above-mentioned steps S207 to step S209, it is to be understood that in the embodiment of the present invention, when real-name authentication system When obtained real-name authentication result is authentification failure, real-name authentication system can be sent to corresponding application platform or user The second authentication result of real-name authentication failure is characterized, and when the obtained real-name authentication result of real-name authentication system is to authenticate successfully When, real-name authentication system can send the first certification knot that characterization real-name authentication passes through to corresponding application platform or user Fruit.
Further, as shown in figure 3, in the embodiment of the present invention, when determined the first identity information be real-name authentication system Certification for the first time, and obtain the second identity information corresponding with first identity information, and carry out to the second identity information real Name authenticates, and after having obtained the real-name authentication result of the second identity information, can also include:
If step S301, the described real-name authentication result is that certification passes through, the second specific identifier is obtained;
It should be noted that in the embodiment of the present invention, when the real-name authentication result of second identity information is that certification passes through When, real-name authentication system then can further obtain the second specific identifier, wherein second specific identifier can be user's input Any identification information can be such as the numerical value 12345 of user's input, naturally it is also possible to the mark being randomly generated for real-name authentication system Know information, the character string a1b2c3d, etc. being randomly generated such as real name Verification System.
Step S302, second identity information and second specific identifier are mixed using default mixing rule Processing, obtains mixed tiers e'tat information;
Here, real-name authentication system after getting second specific identifier, that is, can be used default mixing rule to this Two identity informations and second specific identifier carry out mixed processing, to obtain mixed tiers e'tat information.
It should be noted that the default mixing rule can be the customized hybrid regulatory of user in the embodiment of the present invention Then, i.e. user is when inputting second specific identifier, user also can customize input mix second identity information and this second The mixing rule of specific identifier, such as mixing rule of " the second specific identifier of interval insertion in the second identity information ", or " will Second specific identifier is inserted into the first place of the second identity information " mixing rule, or " the second specific identifier is inserted into The mixing rule, etc. of the 5th of two identity informations ", real-name authentication system is in the second specific identifier for getting user's input After corresponding mixing rule, can according to the corresponding mixing rule to second identity information and second specific identifier into Row mixed processing, to obtain mixed tiers e'tat information.
Here, in the embodiment of the present invention, the default mixing rule can certainly be user from pre-set a variety of Selected mixing rule in mixing rule, i.e., can be preset that there are many mixing rules in real-name authentication system, defeated in user When entering the second specific identifier, user can therefrom choose it and want for mixing the mixed of second identity information and second specific identifier Normally, real-name authentication system then can be according to the mixing rule selected by user come to second identity information and this is second specific Mark carries out mixed processing, to obtain mixed tiers e'tat information.
Here it is to be understood that user is when inputting second specific identifier, if not inputting customized hybrid regulatory Then, and if also not choosing corresponding mixing rule from real-name authentication system, real-name authentication system then can be directly according to default Selection Strategy selects to mix the mixing rule of second identity information and second specific identifier, such as from pre-set a variety of Mixing rule is randomly selected in mixing rule to mix second identity information and second specific identifier, such as is randomly choosed The mixing rule of " the second specific identifier is inserted into the first place of the second identity information " come mix second identity information and this Two specific identifiers;Or mixing rule is chosen according to the identity type of the second identity information, i.e., it is each in real-name authentication system Mixing rule is provided with corresponding identity type, and " interval insertion second is special in the second identity information for such as the first mixing rule Identity type corresponding to calibration knowledge " is identification card number, and the second specific identifier " is inserted into the second identity letter by the second mixing rule Identity type corresponding to the first place of breath " is account No., and the second specific identifier " is inserted into the second identity by third mixing rule Identity type corresponding to the 5th of information " is phone number, etc., thus, when real-name authentication system determines a certain second body When part information is identity account, real-name authentication system can then choose " in second identity information be spaced corresponding with identification card number Be inserted into the second specific identifier " mixing rule mix second identity information and corresponding second specific identifier;And work as real name When Verification System determines that another second identity information is phone number, real-name authentication system can then be chosen corresponding with phone number The mixing rule of " the second specific identifier is inserted into the 5th of the second identity information " mixes second identity information and correspondence The second specific identifier.
Step S303, Hash operation is carried out to the tiers e'tat information, obtained corresponding with the tiers e'tat information Authenticate cryptographic Hash;
Step S304, by the certification cryptographic Hash and the second identity information associated storage in the presetting database In.
For above-mentioned steps S303 and step S304, it is to be understood that in the embodiment of the present invention, real-name authentication system exists It, can be to using Kazakhstan above-mentioned after obtaining the tiers e'tat information of the second identity information and the second specific identifier after mixed processing Uncommon function carries out Hash operation to the tiers e'tat information, to obtain certification cryptographic Hash corresponding with tiers e'tat information, and will Obtained certification cryptographic Hash and the second identity information associated storage in the presetting database of real-name authentication system so that after If continuous user continues the real-name authentication of the identity information, can only it be breathed out by comparing the certification saved in presetting database Uncommon value quickly to obtain real-name authentication as a result, thus authenticated time needed for reducing the multiple real-name authentication of user, to improve real name The authentication efficiency of certification promotes the using experience degree of user.
It preferably, can also include: output after obtaining mixed tiers e'tat information in the embodiment of the present invention The tiers e'tat information, perhaps exports the default mixing rule and second specific identifier or output is described default The mark of mixing corresponding to mixing rule and second specific identifier.
Here, real-name authentication system is mixed in the second identity information inputted to user with corresponding second specific identifier Conjunction processing, after obtaining tiers e'tat information, can export obtained tiers e'tat information to user, so that user knows Its mixed identity information of true identity information facilitates user subsequent when other application platform carries out real-name authentication, can be only Real-name authentication is carried out by inputting the mixed identity information, so that the input of true identity information is avoided, it is true to reduce The risk of leakage of real identity information improves the protection to individual subscriber privacy.
It is understood that being believed using default mixing rule the second identity that user inputs in the embodiment of the present invention Breath carries out mixed processing with corresponding second specific identifier, and after obtaining tiers e'tat information, real-name authentication system can also be pre- by this If mixing rule and corresponding second specific identifier, or this is preset into the mark of mixing corresponding to mixing rule and second spy Calibration knows output to user, so that user can preset mixing corresponding to mixing rule or the default mixing rule by this Mark and second specific identifier, obtain mixed tiers e'tat information.
In the embodiment of the present invention, when user's request progress real-name authentication, and the body for being mixed with the first specific identifier has been uploaded When part information, Hash operation can be carried out to the identity information and obtain cryptographic Hash to be certified, and by the cryptographic Hash to be certified and is preset The certification cryptographic Hash saved in database is compared, to obtain real-name authentication as a result, user is made to carry out real-name authentication When, it does not need to upload its true identity information, reduces the disclosure risk of user real identification information, improve to individual subscriber The protection of privacy.In addition, the embodiment of the present invention carries out the comparison of real-name authentication by cryptographic Hash that presetting database provides, it can The authenticated time of multiple real-name authentication is greatly reduced, real-name authentication efficiency is improved, promotes the usage experience of user.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
A kind of real name identification method is essentially described above, a kind of real-name authentication device will be described in detail below.
Fig. 4 shows one embodiment structure chart of real-name authentication device in the embodiment of the present invention.As shown in figure 4, described Real-name authentication device, comprising:
Certification request obtains module 401, for obtaining the real-name authentication request of user's transmission, the real-name authentication request packet Include the first identity information for being mixed with the first specific identifier;
Hash operation module 402 obtains cryptographic Hash to be certified for carrying out Hash operation to first identity information;
Cryptographic Hash detection module 403, for detecting in presetting database with the presence or absence of identical as the cryptographic Hash to be certified Certification cryptographic Hash;
First authentication result sending module 404, if for existing and the cryptographic Hash to be certified in the presetting database Identical certification cryptographic Hash then sends the first authentication result that characterization real-name authentication passes through;
Second authentication result sending module 405, if for being not present and the Hash to be certified in the presetting database It is worth identical certification cryptographic Hash, then sends the second authentication result of characterization real-name authentication failure.
Further, the real-name authentication device, comprising:
Authentication interface setup module, for presetting real-name authentication interface, to be obtained by the real-name authentication interface The real-name authentication request that user sends.
Preferably, the second authentication result sending module 405, comprising:
Authentication determination unit for the first time, if for there is no identical with the cryptographic Hash to be certified in the presetting database Cryptographic Hash is authenticated, then judges whether first identity information is to authenticate for the first time;
Second identity information acquiring unit obtains user's transmission if being to authenticate for the first time for first identity information The second identity information, second identity information be the unmixed identity information for having first specific identifier;
Second identity information authentication unit obtains real-name authentication for carrying out real-name authentication to second identity information As a result;
Second authentication result transmission unit, for sending characterization real name when the real-name authentication result is authentification failure Second authentication result of authentification failure.
Optionally, the second identity information authentication unit is also used to for second identity information being sent to corresponding Third party authentication server obtains so that the third party authentication server carries out real-name authentication to second identity information To real-name authentication result.
Further, the real-name authentication device, further includes:
Specific identifier obtains module, if being that certification passes through for the real-name authentication result, obtains the second specific identifier;
Mixed processing module, for using default mixing rule to second identity information and second specific identifier Mixed processing is carried out, mixed tiers e'tat information is obtained;
Certification cryptographic Hash obtains module, for carrying out Hash operation to the tiers e'tat information, obtains and the third The corresponding certification cryptographic Hash of identity information;
Cryptographic Hash memory module is authenticated, is used for the certification cryptographic Hash and the second identity information associated storage in institute It states in presetting database.
Preferably, the real-name authentication device, further includes:
Identity information output module, for exporting the tiers e'tat information, or the output default mixing rule and Second specific identifier, or mixing mark and second specific identifier corresponding to the output default mixing rule.
Fig. 5 is a kind of schematic diagram of terminal device provided in an embodiment of the present invention.As shown in figure 5, the terminal of the embodiment Equipment 5 includes: processor 50, memory 51 and is stored in the memory 51 and can run on the processor 50 Computer-readable instruction 52, such as real-name authentication program.The realization when processor 50 executes the computer-readable instruction 52 Step in above-mentioned each real name identification method embodiment, such as step S101 shown in FIG. 1 to step S105.Alternatively, described Processor 50 realizes the function of each module/unit in above-mentioned each Installation practice, example when executing the computer-readable instruction 52 Module 401 as shown in Figure 4 to module 405 function.
Illustratively, the computer-readable instruction 52 can be divided into one or more module/units, one Or multiple module/units are stored in the memory 51, and are executed by the processor 50, to complete the present invention.Institute Stating one or more module/units can be the series of computation machine readable instruction section that can complete specific function, the instruction segment For describing implementation procedure of the computer-readable instruction 52 in the terminal device 5.
The terminal device 5 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The terminal device may include, but be not limited only to, processor 50, memory 51.It will be understood by those skilled in the art that Fig. 5 The only example of terminal device 5 does not constitute the restriction to terminal device 5, may include than illustrating more or fewer portions Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net Network access device, bus etc..
The processor 50 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 51 can be the internal storage unit of the terminal device 5, such as the hard disk or interior of terminal device 5 It deposits.The memory 51 is also possible to the External memory equipment of the terminal device 5, such as be equipped on the terminal device 5 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 51 can also both include the storage inside list of the terminal device 5 Member also includes External memory equipment.The memory 51 is for storing the computer-readable instruction and terminal device institute Other programs and data needed.The memory 51 can be also used for temporarily storing the number that has exported or will export According to.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of real name identification method characterized by comprising
The real-name authentication request that user sends is obtained, the real-name authentication request includes the first body for being mixed with the first specific identifier Part information;
Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database, sends characterization real name and recognize Demonstrate,prove the first authentication result passed through;
If sending characterization real name there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database Second authentication result of authentification failure.
2. real name identification method according to claim 1, which is characterized in that requested obtaining the real-name authentication that user sends Before, comprising:
Real-name authentication interface is preset, with the real-name authentication request sent by the real-name authentication interface captures user.
3. real name identification method according to claim 1 or 2, which is characterized in that if in the presetting database There is no certification cryptographic Hash identical with the cryptographic Hash to be certified, then send the second certification knot of characterization real-name authentication failure Fruit, comprising:
If judging described first there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database Whether identity information is to authenticate for the first time;
If first identity information is to authenticate for the first time, the second identity information of user's transmission, the second identity letter are obtained Breath is the unmixed identity information for having first specific identifier;
Real-name authentication is carried out to second identity information, obtains real-name authentication result;
When the real-name authentication result is authentification failure, the second authentication result of characterization real-name authentication failure is sent.
4. real name identification method according to claim 3, which is characterized in that described to be carried out in fact to second identity information Name certification, obtains real-name authentication result, comprising:
Second identity information is sent to corresponding third party authentication server, so that the third party authentication server Real-name authentication is carried out to second identity information, obtains real-name authentication result.
5. real name identification method according to claim 3, which is characterized in that carrying out real name to second identity information Certification, after obtaining real-name authentication result, further includes:
If the real-name authentication result is that certification passes through, the second specific identifier is obtained;
Mixed processing is carried out to second identity information and second specific identifier using default mixing rule, is mixed Tiers e'tat information afterwards;
Hash operation is carried out to the tiers e'tat information, obtains certification cryptographic Hash corresponding with the tiers e'tat information;
By the certification cryptographic Hash and the second identity information associated storage in the presetting database.
6. real name identification method according to claim 5, which is characterized in that obtain mixed tiers e'tat information it Afterwards, further includes:
The tiers e'tat information is exported,
Or the default mixing rule and second specific identifier are exported,
Or mixing mark and second specific identifier corresponding to the output default mixing rule.
7. a kind of computer readable storage medium, the computer-readable recording medium storage has computer-readable instruction, special Sign is, the real-name authentication as described in any one of claims 1 to 6 is realized when the computer-readable instruction is executed by processor The step of method.
8. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor The computer-readable instruction of operation, which is characterized in that the processor realizes following step when executing the computer-readable instruction It is rapid:
The real-name authentication request that user sends is obtained, the real-name authentication request includes the first body for being mixed with the first specific identifier Part information;
Hash operation is carried out to first identity information, obtains cryptographic Hash to be certified;
It detects in presetting database with the presence or absence of certification cryptographic Hash identical with the cryptographic Hash to be certified;
If there is certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database, sends characterization real name and recognize Demonstrate,prove the first authentication result passed through;
If sending characterization real name there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database Second authentication result of authentification failure.
9. terminal device according to claim 8, which is characterized in that request it obtaining the real-name authentication that user sends Before, comprising:
Real-name authentication interface is preset, with the real-name authentication request sent by the real-name authentication interface captures user.
10. terminal device according to claim 8, which is characterized in that if in the presetting database there is no with The identical certification cryptographic Hash of the cryptographic Hash to be certified then sends the second authentication result of characterization real-name authentication failure, comprising:
If judging described first there is no certification cryptographic Hash identical with the cryptographic Hash to be certified in the presetting database Whether identity information is to authenticate for the first time;
If first identity information is to authenticate for the first time, the second identity information of user's transmission, the second identity letter are obtained Breath is the unmixed identity information for having first specific identifier;
Real-name authentication is carried out to second identity information, obtains real-name authentication result;
When the real-name authentication result is authentification failure, the second authentication result of characterization real-name authentication failure is sent.
CN201811122156.1A 2018-09-26 2018-09-26 A kind of real name identification method, computer readable storage medium and terminal device Pending CN109067551A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811122156.1A CN109067551A (en) 2018-09-26 2018-09-26 A kind of real name identification method, computer readable storage medium and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811122156.1A CN109067551A (en) 2018-09-26 2018-09-26 A kind of real name identification method, computer readable storage medium and terminal device

Publications (1)

Publication Number Publication Date
CN109067551A true CN109067551A (en) 2018-12-21

Family

ID=64765731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811122156.1A Pending CN109067551A (en) 2018-09-26 2018-09-26 A kind of real name identification method, computer readable storage medium and terminal device

Country Status (1)

Country Link
CN (1) CN109067551A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131240A (en) * 2019-12-23 2020-05-08 杭州迪普科技股份有限公司 Authentication information backup method and device, electronic equipment and storage medium
CN114006763A (en) * 2021-11-01 2022-02-01 许昌许继软件技术有限公司 Rapid retrieval matching method and system based on rapid table

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100122082A1 (en) * 2008-10-08 2010-05-13 Leiwen Deng User identity validation system and method
CN103269270A (en) * 2013-04-25 2013-08-28 安徽杨凌科技有限公司 Real-name authentication safe login method and system based on cell phone number
CN103929310A (en) * 2014-04-25 2014-07-16 长沙市梦马软件有限公司 Mobile phone client side password unified authentication method and system
CN105791262A (en) * 2015-12-30 2016-07-20 广东亿迅科技有限公司 APP real name authentication secure login system and method based on mobile phone IMSI
CN105868970A (en) * 2016-03-25 2016-08-17 联想(北京)有限公司 Authentication method and electronic device
CN107273514A (en) * 2017-06-21 2017-10-20 杭州云证网络科技有限公司 A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system
CN107423333A (en) * 2017-04-21 2017-12-01 博大莱哲科技(北京)有限公司 A kind of real name identification method and device
CN108365949A (en) * 2018-03-09 2018-08-03 北京阿尔山金融科技有限公司 Client's system of real name approaches to IM, apparatus and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100122082A1 (en) * 2008-10-08 2010-05-13 Leiwen Deng User identity validation system and method
CN103269270A (en) * 2013-04-25 2013-08-28 安徽杨凌科技有限公司 Real-name authentication safe login method and system based on cell phone number
CN103929310A (en) * 2014-04-25 2014-07-16 长沙市梦马软件有限公司 Mobile phone client side password unified authentication method and system
CN105791262A (en) * 2015-12-30 2016-07-20 广东亿迅科技有限公司 APP real name authentication secure login system and method based on mobile phone IMSI
CN105868970A (en) * 2016-03-25 2016-08-17 联想(北京)有限公司 Authentication method and electronic device
CN107423333A (en) * 2017-04-21 2017-12-01 博大莱哲科技(北京)有限公司 A kind of real name identification method and device
CN107273514A (en) * 2017-06-21 2017-10-20 杭州云证网络科技有限公司 A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system
CN108365949A (en) * 2018-03-09 2018-08-03 北京阿尔山金融科技有限公司 Client's system of real name approaches to IM, apparatus and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131240A (en) * 2019-12-23 2020-05-08 杭州迪普科技股份有限公司 Authentication information backup method and device, electronic equipment and storage medium
CN114006763A (en) * 2021-11-01 2022-02-01 许昌许继软件技术有限公司 Rapid retrieval matching method and system based on rapid table

Similar Documents

Publication Publication Date Title
CN109815657B (en) Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment
CN106453415B (en) Block chain-based equipment authentication method, authentication server and user equipment
CN110310205B (en) Block chain data monitoring method, device, equipment and medium
CN109672683B (en) Binding method and binding device of Internet of things equipment and terminal equipment
CN112765268B (en) Data privacy protection method, device and equipment based on block chain
US20030177366A1 (en) Method and apparatus for dynamic personal identification number management
CN109688186A (en) Data interactive method, device, equipment and readable storage medium storing program for executing
CN111191212B (en) Block chain-based digital certificate processing method, device, equipment and storage medium
CN110138767B (en) Transaction request processing method, device, equipment and storage medium
CN110661779B (en) Block chain network-based electronic certificate management method, system, device and medium
CN112448956B (en) Authority processing method and device of short message verification code and computer equipment
CN107358439A (en) Using method of payment, device and terminal device
CN104469736B (en) A kind of data processing method, server and terminal
CN109067551A (en) A kind of real name identification method, computer readable storage medium and terminal device
CN113890739B (en) Cross-blockchain authentication method and device, electronic equipment and medium
CN108833109A (en) Identity identifying method, device and electronic equipment
CN106209751B (en) Service-oriented interface authentication method based on the operating system certificate of authority
CN112487487A (en) Authority management method, device, equipment and storage medium for member of block chain node
CN112163949A (en) Intelligent contract generation method and device based on contract component imaging
CN107622396A (en) Self-service dealing method, system and terminal device
CN112468497A (en) Block chain terminal equipment authorization authentication method, device, equipment and storage medium
CN107844290B (en) Software product design method and device based on data stream security threat analysis
CN113935008B (en) User authentication method, device, electronic equipment and computer readable storage medium
CN109547404A (en) The acquisition methods and server of data
CN109461222A (en) Information access method of checking card, system and electronic equipment based on equipment of checking card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1262761

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181221

RJ01 Rejection of invention patent application after publication