CN109615380A - Method, apparatus, computer equipment and the storage medium of user identity authentication - Google Patents

Method, apparatus, computer equipment and the storage medium of user identity authentication Download PDF

Info

Publication number
CN109615380A
CN109615380A CN201811255392.0A CN201811255392A CN109615380A CN 109615380 A CN109615380 A CN 109615380A CN 201811255392 A CN201811255392 A CN 201811255392A CN 109615380 A CN109615380 A CN 109615380A
Authority
CN
China
Prior art keywords
financial institution
user identity
identity authentication
certification
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811255392.0A
Other languages
Chinese (zh)
Inventor
李其刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201811255392.0A priority Critical patent/CN109615380A/en
Publication of CN109615380A publication Critical patent/CN109615380A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure is directed to a kind of method for authenticating user identity and devices, belong to identity validation technology field, which comprises receive the user identity authentication request from financial institution server;User identity authentication request is transmitted to authentication module corresponding with the auth type, to carry out user identity authentication by the authentication module, certification log is generated, contains financial institution mark, the auth type, authenticated time in the certification log;User identity authentication result is sent to the financial institution server;Determine authentication and accounting rule corresponding with financial institution mark;Based on the financial institution mark in the certification log, the auth type, authenticated time, according to determining authentication and accounting rule, Xiang Suoshu financial institution server sends charging message.The poor efficiency of parted hair charging is avoided, and realizes separating for certification and charging, substantially increases treatment effeciency.

Description

Method, apparatus, computer equipment and the storage medium of user identity authentication
Technical field
The present invention relates to identity validation technology fields, are financial institution's progress more particularly to proxy authenticating server is used for Method, apparatus, computer equipment and the storage medium of user identity authentication.
Background technique
Existing financial institution (including insurance institution, banking institution, internet financial institution etc.), business (insurance Business, stock exchange, financial management in the Internet etc.) much it is directed to do intelligent authentication for user, such as recognition of face certification, optical character are known Not (OCR, Optical Character Recognition) identity card identification certification, voiceprint etc..In the prior art, often Financial institution oneself, family is equipped with intelligent authentication server.In recent years, intelligent authentication is carried out respectively in order to save each financial institution Repeated construction expense, be changed to by third party (certification authority) certificate server authenticate.But due to for every financial institution The basic information collected when certification is different, and charging regulation is also different.Although being authenticated by a certificate server, the certification It is also to establish independent subsystem for different financial institutions in server, is carried out for its peculiar essential information for needing to authenticate Certification, and adapt to the charging of the charging regulation of the financial institution.It therefore, is still one by one in certificate server It is being run for the subsystem of each financial institutional establishment.Therefore, as long as needing the swapping data with a new authority server, The certificate server will be directed to this new authority server, customize new data interaction format, i.e. frame structure.For every A other mechanisms for needing to exchange data remodify code or the new data interaction format of customization is pretty troublesome.
Summary of the invention
Based on this, subsystem effect is separately provided to solve to remain as each financial institution in certificate server in the related technology The low technical problem of rate, it is that financial institution carries out user identity authentication that the present invention provides one kind for proxy authenticating server Method, apparatus, computer equipment and storage medium.
In a first aspect, providing a kind of side for carrying out user identity authentication for financial institution for proxy authenticating server Method, comprising:
The user identity authentication request from financial institution server is received, the user identity authentication request has certification Type and financial institution mark;
User identity authentication request is transmitted to authentication module corresponding with the auth type, by the certification Module carries out user identity authentication, generates certification log, contains financial institution mark, the certification in the certification log Type, authenticated time;
User identity authentication result is sent to the financial institution server;
Determine authentication and accounting rule corresponding with financial institution mark;
Based on the financial institution mark in the certification log, the auth type, authenticated time, according to determining Authentication and accounting rule, Xiang Suoshu financial institution server send charging message.
The financial institution mark based in the certification log, the certification in one of the embodiments, Type, authenticated time, according to determining authentication and accounting rule, Xiang Suoshu financial institution server sends charging message, comprising:
It obtains authenticated time and falls certification log within a predetermined period of time;
For the certification log of acquisition, according to determining authentication and accounting rule, it is determining with it is described authenticate it is described in log Financial institution identifies charging number corresponding with the auth type;
The summation for being directed to the charging number that financial institution's mark is determined within a predetermined period of time is added to charging In message, Xiang Suoshu financial institution server is sent.
It in one of the embodiments, include level one choice and level two options in the certification log, level one choice includes Financial institution's mark, the title of the auth type, the authenticated time, level two options are the specific taxes of level one choice Value,
It is described to the financial institution server send charging message while also send charging list file, for indicate to The detailed programs of financial institution's charging, the charging list file include boxhead and table body,
The transmission charging list file includes:
According to the level-one item in certification log, the boxhead of charging list file is generated;
According to the secondary items in certification log, the table body of charging list file is generated;
The charging list file of generation is sent to the financial institution server.
The user identity authentication request has the secondary items and the gold of auth type in one of the embodiments, Melt the secondary items of authority identification,
The generation authenticates log
Secondary items in user identity authentication request are mapped as the secondary items in the certification log;
Secondary items in user identity authentication request are inputted into machine learning model, are exported by machine learning model It authenticates in log to the corresponding level-one item of the secondary items.
The machine learning model is trained as follows in one of the embodiments:
Secondary items sample set is inputted into machine learning model, each secondary items that the secondary items sample set includes Sample is equipped with the label of corresponding level-one item, the corresponding level-one item determined by machine learning model output, with The label is compared, such as inconsistent, then adjusts the machine learning model, makes the judgement of the machine learning model output Level-one item it is consistent with label.
The service class that the user identity authentication request is also used for user identity authentication in one of the embodiments, Type;
The type of service being also used for containing family authentication in the certification log;
The charging message sent to the financial institution server is also based on the type of service contained in certification log.
Second aspect provides a kind of dress for carrying out user identity authentication for financial institution for proxy authenticating server It sets, comprising:
Request reception unit, for receiving the user identity authentication request from financial institution server, user's body There is part certification request auth type and the financial institution to identify;
Retransmission unit is requested, for user identity authentication request to be transmitted to certification corresponding with the auth type Module generates certification log, contains the finance in the certification log to carry out user identity authentication by the authentication module Authority identification, the auth type, authenticated time;
As a result transmission unit, for user identity authentication result to be sent to the financial institution server;
Rule determination unit, for determining authentication and accounting rule corresponding with financial institution mark;
Message sending unit, for being identified, the auth type, being recognized based on the financial institution in the certification log The time is demonstrate,proved, according to determining authentication and accounting rule, Xiang Suoshu financial institution server sends charging message.
The third aspect provides a kind of computer equipment, including memory and processor, is stored with meter in the memory Calculation machine readable instruction, when the computer-readable instruction is executed by the processor, so that processor execution is described above The step of carrying out the method for user identity authentication for proxy authenticating server for financial institution.
Fourth aspect provides a kind of storage medium for being stored with computer-readable instruction, the computer-readable instruction When being executed by one or more processors, so that one or more processors execute described above is for proxy authenticating server Financial institution carries out the step of method of user identity authentication.
The technical scheme provided by this disclosed embodiment can include the following benefits:
It is above-mentioned to be set for proxy authenticating server for the method, apparatus of financial institution's progress user identity authentication, computer Standby and storage medium is requested by receiving the user identity authentication from financial institution server, and the user identity authentication is asked It asks with auth type and financial institution mark;User identity authentication request is transmitted to and the auth type pair The authentication module answered generates certification log, contains in the certification log to carry out user identity authentication by the authentication module Financial institution's mark, the auth type, authenticated time;User identity authentication result is sent to financial institution's clothes Business device;Determine authentication and accounting rule corresponding with financial institution mark;Based on the financial machine in the certification log Structure mark, the auth type, authenticated time, according to determining authentication and accounting rule, Xiang Suoshu financial institution server is sent Charging message.To complete authentication and accounting process, the poor efficiency of parted hair charging is avoided.Moreover, each different types of certification It separates, avoids the subsystem that the prior art is docked with each financial institution and require with recognition of face certification, OCR identity The brings repeated construction such as identification card, voiceprint improves systematic collaboration treatment effeciency.The present invention only generates day in certification Will, and charge information is generated by charging child servers from each log every predetermined period, separating for certification and charging is realized, Substantially increase treatment effeciency.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited It is open.
Detailed description of the invention
Fig. 1 is that the proxy authenticating server that is used for provided in one embodiment is that financial institution carries out user identity authentication The implementation environment figure of method.
Fig. 2 is that a kind of proxy authenticating server that is used for shown according to an exemplary embodiment is that financial institution carries out user The flow chart of identity authentication method.
Fig. 3 is to carry out user identity for proxy authenticating server shown in corresponding embodiment according to fig. 2 for financial institution A kind of specific implementation flow chart of step S150 in the method for certification.
Fig. 4 is to carry out user identity for proxy authenticating server shown in corresponding embodiment according to fig. 2 for financial institution A kind of specific implementation flow chart of step S120 in the method for certification.
Fig. 5 schematically shows one kind and carries out user identity for proxy authenticating server for realizing above-mentioned for financial institution The electronic equipment example block diagram of the method for certification.
Fig. 6 schematically shows one kind and carries out user identity for proxy authenticating server for realizing above-mentioned for financial institution The computer readable storage medium of the method for certification.
Fig. 7 is that a kind of proxy authenticating server that is used for shown according to an exemplary embodiment is that financial institution carries out user The block diagram of the device of authentication.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Fig. 1 is that the proxy authenticating server that is used for provided in one embodiment is that financial institution carries out user identity authentication The implementation environment figure of method, as shown in Figure 1, in the implementation environment, including proxy authenticating server 100 and connected to it Multiple financial institution servers 200.The proxy authenticating server 100 includes front interface 101, recognition of face authentication module 102, OCR authentication module 103, voiceprint module 104, accounting module 105.
Proxy authenticating server 100 is to be integrated with the server of a variety of different authentication modules and accounting module, such as collect At recognition of face authentication module, OCR authentication module, voiceprint module server.The multiple financial institution server 200 from different financial institutions and can have multiple, and connect respectively with the proxy authenticating server 100.The agency Certificate server 100 receives the user identity authentication request from financial institution server, the user identity authentication request tool There are auth type and financial institution mark;User identity authentication request is transmitted to corresponding with the auth type Authentication module generates certification log, contains in the certification log described to carry out user identity authentication by the authentication module Financial institution's mark, the auth type, authenticated time;User identity authentication result is sent to the financial institution services Device;Determine authentication and accounting rule corresponding with financial institution mark;Based on the financial institution in the certification log Mark, the auth type, authenticated time, according to determining authentication and accounting rule, Xiang Suoshu financial institution server sends meter Take message.
It should be noted that the proxy authenticating server 100 and multiple financial institution servers 200 can be desk-top meter Calculation machine server, huge computer servers, Cloud Server, server cluster etc., however, it is not limited to this.Proxy authentication service Device 100 and multiple financial institution servers 200 can be attached by wired, wireless or other communication connection modes, The present invention is herein with no restrictions.
As shown in Fig. 2, in one embodiment it is proposed that a kind of for proxy authenticating server is that financial institution is used Family identity authentication method, it is described to be answered for the method that proxy authenticating server is financial institution's progress user identity authentication For can specifically include following steps in above-mentioned proxy authenticating server:
Step S110, receives the user identity authentication request from financial institution server, and the user identity authentication is asked It asks with auth type and financial institution mark;
User identity authentication request is transmitted to authentication module corresponding with the auth type by step S120, with User identity authentication is carried out by the authentication module, certification log is generated, is marked in the certification log containing the financial institution Know, the auth type, authenticated time;
User identity authentication result is sent to the financial institution server by step S130;
Step S140 determines authentication and accounting rule corresponding with financial institution mark;
Step S150 is identified, the auth type, authenticated time based on the financial institution in the certification log, According to determining authentication and accounting rule, Xiang Suoshu financial institution server sends charging message.
Wherein, the auth type is, for example, the auth types such as face authentication, OCR certification, voiceprint.The finance machine Structure mark illustrates requesting party's (requesting the agency of certification) of the certification request.The authentication module, that is, the agency Authentication module included in certificate server 100, i.e. recognition of face authentication module 102, OCR authentication module 103, voiceprint Module 104.The authenticated time is the time that the proxy authenticating server is authenticated.The charging regulation can be because of The difference of requesting party and different, such as the request for company A, charging regulation are recognition of face of every progresss, 0.1 yuan of receipts; Request for B company, charging regulation are then recognition of face in monthly 1,000,000 times or less 100,000 yuan of unified charging, are monthly exceeded 1000000 portions pers add 0.03 yuan.This addresses the problem be originally that subsystem bring is separately provided in each server The problem of inefficiency.
Optionally, it is that financial institution being used that Fig. 3, which is the proxy authenticating server that is used for according to fig. 2 shown in corresponding embodiment, The datail description of step S150 in the identity authentication method of family, it is described to carry out user for proxy authenticating server for financial institution In identity authentication method, step S150 be may comprise steps of:
Step S151 obtains authenticated time and falls certification log within a predetermined period of time;
Step S152, for the certification log of acquisition, according to determining authentication and accounting rule, the determining and certification log In the financial institution identify corresponding with auth type charging number;
Step S153 adds the summation for being directed to the charging number that financial institution's mark is determined within a predetermined period of time It is added in charging message, Xiang Suoshu financial institution server is sent.
Wherein, the predetermined amount of time be, for example, daily, weekly, per ten days, monthly.Which reduces the number of payment, Improve the efficiency of data transmission.
It in one exemplary embodiment, include level one choice and level two options in the certification log, level one choice includes Financial institution's mark, the title of the auth type, the authenticated time, level two options are the specific taxes of level one choice Value.
It is described to the financial institution server send charging message while also send charging list file, for indicate to The detailed programs of financial institution's charging, the charging list file include boxhead and table body,
The transmission charging list file includes:
According to the level-one item in certification log, the boxhead of charging list file is generated;
According to the secondary items in certification log, the table body of charging list file is generated;
The charging list file of generation is sent to the financial institution server.
For the level one choice and level two options, for example, level one choice is client, level two options are safety life insurances, then It is recorded as " client: safety life insurance ".If a log is " client: safety life insurance;Interface: recognition of face ";Time: 2018 May 27 11:37:48 ", then the log be safety life insurance on May 27th, 2018 11:37:48 one user to insure entrusted The recognition of face certification that support certificate server is done.
Since in the database of each financial institution oneself, data only store into the dedicated format of oneself database, and And the record of charging is needed for one comprising option be all different.For example, the record in the database of A bank is adopted With " A bank;Recognition of face;May in 2018 11:37:48 " on the 27th form.It is also used to the request that certificate server is sent " A bank;Recognition of face;May in 2018 11:37:48 " on the 27th form, have financial institution's identification field, and a number of B bank According to the record in library using " on May 27th, 2018 11:37:48;The form of recognition of face ".It is asked to what certificate server was sent It asks also using " on May 27th, 2018 11:37:48;The form of recognition of face ".It does not have financial institution's identification field, with A bank Form disunity.In addition, the format due to their own request may not contain level one choice, it can not be to each financial machine The request of structure carries out unified log processing after certification.Therefore after above-mentioned steps, the data format of each financial institution is obtained Unification has been arrived, has facilitated proxy authenticating server to carry out unified log processing, realizes each financial institution data format and charging The good docking of server data format, improves authentication efficiency.
The report of the generation can be inquired for each financial institution.Although in the database of each financial institution oneself The data format of middle storage is not identical, but by way of above-mentioned level one choice and level two options, can be with unified shape Formula is stored in the database of charging child servers, realizes charging subdata base storage format and each financial institution stores format Smooth docking.
Optionally, it is that financial institution being used that Fig. 4, which is the proxy authenticating server that is used for according to fig. 2 shown in corresponding embodiment, The datail description of step S120 in the identity authentication method of family, it is described to carry out user for proxy authenticating server for financial institution In identity authentication method, the user identity authentication request has the secondary items and financial institution mark of auth type Secondary items, generation certification log includes:
Secondary items in user identity authentication request are mapped as the second level in the certification log by step S121 Project;
Secondary items in user identity authentication request are inputted machine learning model, by engineering by step S122 It practises in the log of model authentication output to the corresponding level-one item of the secondary items.
In one exemplary embodiment, the machine learning model trains as follows:
Secondary items sample set is inputted into machine learning model, each secondary items that the secondary items sample set includes Sample is equipped with the label of corresponding level-one item, the corresponding level-one item determined by machine learning model output, with The label is compared, such as inconsistent, then adjusts the machine learning model, makes the judgement of the machine learning model output Level-one item it is consistent with label.
The mode of learning of the machine learning model are as follows: constantly change the connection of network under the stimulation of extraneous input sample Weight.The essence of study is to carry out dynamic adjustment to each connection weight.Since once the corresponding level one choice of each sample is it is known that machine Device learning model applies operation according to each connection weight, to each sample, and obtained level one choice is not inconsistent with known, with regard to automatic Each connection weight is adjusted, until obtained level one choice is consistent with previously known.In this way, just having trained machine learning mould Type.Then, the level two options in financial institution's certification request are inputted into machine learning model, just obtains corresponding level-one choosing ?.
In one exemplary embodiment, the service class that the user identity authentication request is also used for user identity authentication Type;
The type of service being also used for containing family authentication in the certification log;
The charging message sent to the financial institution server is also based on the type of service contained in certification log.
Wherein, the type of service is, for example, to insure, do bank card, loan etc..
As shown in fig. 7, in one embodiment, providing one kind for proxy authenticating server is that financial institution is used The device of family authentication, it is described to collect for the device that proxy authenticating server is financial institution's progress user identity authentication It is sent out in above-mentioned proxy authenticating server, can specifically include request reception unit 110, request retransmission unit 120, result Send unit 130, rule determination unit 140, message sending unit 150.
Request reception unit 110, for receiving the user identity authentication request from financial institution server, the user There is ID authentication request auth type and the financial institution to identify;
Retransmission unit 120 is requested, it is corresponding with the auth type for being transmitted to user identity authentication request Authentication module generates certification log, contains in the certification log described to carry out user identity authentication by the authentication module Financial institution's mark, the auth type, authenticated time;
As a result transmission unit 130, for user identity authentication result to be sent to the financial institution server;
Rule determination unit 140, for determining authentication and accounting rule corresponding with financial institution mark;
Message sending unit 150, for based on financial institution mark, the certification class in the certification log Type, authenticated time, according to determining authentication and accounting rule, Xiang Suoshu financial institution server sends charging message.
The function of modules and the realization process of effect are specifically detailed in above-mentioned for proxy authentication service in above-mentioned apparatus Device corresponds to the realization process of step in the method for financial institution's progress user identity authentication, details are not described herein.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
In addition, although describing each step of method in the disclosure in the accompanying drawings with particular order, this does not really want These steps must be executed in this particular order by asking or implying, or having to carry out step shown in whole could realize Desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/ Or a step is decomposed into execution of multiple steps etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, mobile terminal or network equipment etc.) is executed according to disclosure embodiment Method.
In an exemplary embodiment of the disclosure, a kind of electronic equipment that can be realized the above method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
The electronic equipment 500 of this embodiment according to the present invention is described referring to Fig. 5.The electronics that Fig. 5 is shown Equipment 500 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 5, electronic equipment 500 is showed in the form of universal computing device.The component of electronic equipment 500 can wrap It includes but is not limited to: at least one above-mentioned processing unit 510, at least one above-mentioned storage unit 520, the different system components of connection The bus 530 of (including storage unit 520 and processing unit 510).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 510 Row, so that various according to the present invention described in the execution of the processing unit 510 above-mentioned " illustrative methods " part of this specification The step of illustrative embodiments.For example, the processing unit 510 can execute step S110 as shown in fig. 1, receives and It is requested from the user identity authentication of financial institution server, the user identity authentication request has auth type and the finance Authority identification;User identity authentication request is transmitted to authentication module corresponding with the auth type by step S120, with User identity authentication is carried out by the authentication module, certification log is generated, is marked in the certification log containing the financial institution Know, the auth type, authenticated time;User identity authentication result is sent to the financial institution server by step S130; Step S140 determines authentication and accounting rule corresponding with financial institution mark;Step S150, based in the certification log Financial institution mark, the auth type, authenticated time, according to determining authentication and accounting rule, to the financial machine Structure server sends charging message.
Storage unit 520 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 5201 and/or cache memory unit 5202, it can further include read-only memory unit (ROM) 5203.
Storage unit 520 can also include program/utility with one group of (at least one) program module 5205 5204, such program module 5205 includes but is not limited to: operating system, one or more application program, other program moulds It may include the realization of network environment in block and program data, each of these examples or certain combination.
Bus 530 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 500 can also be with one or more external equipments 700 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 500 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 500 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 550.Also, electronic equipment 500 can be with By network adapter 560 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.As shown, network adapter 560 is communicated by bus 530 with other modules of electronic equipment 500. It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 500, including but not Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment Method.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is additionally provided, energy is stored thereon with Enough realize the program product of this specification above method.In some possible embodiments, various aspects of the invention may be used also In the form of being embodied as a kind of program product comprising program code, when described program product is run on the terminal device, institute Program code is stated for executing the terminal device described in above-mentioned " illustrative methods " part of this specification according to this hair The step of bright various illustrative embodiments.
Refering to what is shown in Fig. 6, describing the program product for realizing the above method of embodiment according to the present invention 600, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure His embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Adaptive change follow the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure or Conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by claim It points out.

Claims (9)

1. a kind of method for carrying out user identity authentication for proxy authenticating server for financial institution, which is characterized in that described Proxy authenticating server has the authentication module corresponding to different types of user identity authentication, the method includes;
The user identity authentication request from financial institution server is received, the user identity authentication request has auth type It is identified with the financial institution;
User identity authentication request is transmitted to authentication module corresponding with the auth type, by the authentication module User identity authentication is carried out, certification log is generated, contains financial institution mark, the certification class in the certification log Type, authenticated time;
User identity authentication result is sent to the financial institution server;
Determine authentication and accounting rule corresponding with financial institution mark;
Based on the financial institution mark in the certification log, the auth type, authenticated time, according to determining certification Charging regulation, Xiang Suoshu financial institution server send charging message.
2. the method as described in claim 1, which is characterized in that the financial institution mark based in the certification log Know, the auth type, authenticated time, according to determining authentication and accounting rule, Xiang Suoshu financial institution server sends charging Message, comprising:
It obtains authenticated time and falls certification log within a predetermined period of time;
For the certification log of acquisition, according to determining authentication and accounting rule, the determining finance with the certification log Authority identification and the corresponding charging number of the auth type;
The summation for being directed to the charging number that financial institution's mark is determined within a predetermined period of time is added to charging message In, Xiang Suoshu financial institution server is sent.
3. the method as described in claim 1, which is characterized in that in the certification log include level one choice and level two options, Level one choice includes financial institution's mark, the title of the auth type, the authenticated time, and level two options are level-one choosings The specific assignment of item,
Charging list file is also sent while the transmission charging message to the financial institution server, for indicating to described The detailed programs of financial institution's charging, the charging list file include boxhead and table body,
The transmission charging list file includes:
According to the level-one item in certification log, the boxhead of charging list file is generated;
According to the secondary items in certification log, the table body of charging list file is generated;
The charging list file of generation is sent to the financial institution server.
4. the method as described in claim 1, which is characterized in that the user identity authentication request has the second level of auth type The secondary items of project and financial institution mark,
The generation authenticates log
Secondary items in user identity authentication request are mapped as the secondary items in the certification log;
Secondary items in user identity authentication request are inputted into machine learning model, by machine learning model authentication output To the corresponding level-one item of the secondary items in log.
5. method as claimed in claim 4, which is characterized in that the machine learning model is trained as follows:
Secondary items sample set is inputted into machine learning model, each secondary items sample that the secondary items sample set includes It is equipped with the label of corresponding level-one item, the corresponding level-one item determined by machine learning model output is and described Label is compared, such as inconsistent, then adjusts the machine learning model, makes the one of the judgement of the machine learning model output Grade project is consistent with label.
6. the method as described in claim 1, which is characterized in that the user identity authentication request also has user identity authentication For type of service;
The type of service being also used for containing family authentication in the certification log;
The charging message sent to the financial institution server is also based on the type of service contained in certification log.
7. a kind of device for carrying out user identity authentication for financial institution for proxy authenticating server, which is characterized in that described Device includes:
Request reception unit, for receiving the user identity authentication request from financial institution server, the user identity is recognized There is auth type and the financial institution to identify for card request;
Retransmission unit is requested, for user identity authentication request to be transmitted to certification mould corresponding with the auth type Block generates certification log, contains the financial machine in the certification log to carry out user identity authentication by the authentication module Structure mark, the auth type, authenticated time;
As a result transmission unit, for user identity authentication result to be sent to the financial institution server;
Rule determination unit, for determining authentication and accounting rule corresponding with financial institution mark;
Message sending unit, when for based on the financial institution mark authenticated in log, the auth type, certification Between, according to determining authentication and accounting rule, Xiang Suoshu financial institution server sends charging message.
8. a kind of computer equipment, including memory and processor, it is stored with computer-readable instruction in the memory, it is described When computer-readable instruction is executed by the processor, so that the processor is executed as described in any one of claims 1 to 6 Method.
9. a kind of storage medium for being stored with computer-readable instruction, the computer-readable instruction is by one or more processors When execution, so that one or more processors execute such as method described in any one of claims 1 to 6.
CN201811255392.0A 2018-10-26 2018-10-26 Method, apparatus, computer equipment and the storage medium of user identity authentication Pending CN109615380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811255392.0A CN109615380A (en) 2018-10-26 2018-10-26 Method, apparatus, computer equipment and the storage medium of user identity authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811255392.0A CN109615380A (en) 2018-10-26 2018-10-26 Method, apparatus, computer equipment and the storage medium of user identity authentication

Publications (1)

Publication Number Publication Date
CN109615380A true CN109615380A (en) 2019-04-12

Family

ID=66002816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811255392.0A Pending CN109615380A (en) 2018-10-26 2018-10-26 Method, apparatus, computer equipment and the storage medium of user identity authentication

Country Status (1)

Country Link
CN (1) CN109615380A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11816195B2 (en) * 2019-08-14 2023-11-14 Nec Corporation Information processing apparatus, information processing method, and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090328178A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Techniques to perform federated authentication
CN103854180A (en) * 2012-12-05 2014-06-11 中国银联股份有限公司 Credit voucher generating method and system, and application authorization method and system
CN104506542A (en) * 2014-12-29 2015-04-08 深圳中兴网信科技有限公司 Security certification method and security certification system
US20150379516A1 (en) * 2014-06-25 2015-12-31 Moneygram International, Inc. Method and Apparatus for Performing Authentication Services
CN107079034A (en) * 2016-11-15 2017-08-18 深圳达闼科技控股有限公司 A kind of identity authentication method, terminal device, certificate server and electronic equipment
CN107846408A (en) * 2017-11-17 2018-03-27 北京汉王智远科技有限公司 Identity authorization system and method based on cloud platform
CN108462710A (en) * 2018-03-20 2018-08-28 新华三技术有限公司 Authentication authority method, device, certificate server and machine readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090328178A1 (en) * 2008-06-27 2009-12-31 Microsoft Corporation Techniques to perform federated authentication
CN103854180A (en) * 2012-12-05 2014-06-11 中国银联股份有限公司 Credit voucher generating method and system, and application authorization method and system
US20150379516A1 (en) * 2014-06-25 2015-12-31 Moneygram International, Inc. Method and Apparatus for Performing Authentication Services
CN104506542A (en) * 2014-12-29 2015-04-08 深圳中兴网信科技有限公司 Security certification method and security certification system
CN107079034A (en) * 2016-11-15 2017-08-18 深圳达闼科技控股有限公司 A kind of identity authentication method, terminal device, certificate server and electronic equipment
CN107846408A (en) * 2017-11-17 2018-03-27 北京汉王智远科技有限公司 Identity authorization system and method based on cloud platform
CN108462710A (en) * 2018-03-20 2018-08-28 新华三技术有限公司 Authentication authority method, device, certificate server and machine readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李馥娟;王群;: "云计算环境中的身份认证模型", 数学的实践与认识, no. 06 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11816195B2 (en) * 2019-08-14 2023-11-14 Nec Corporation Information processing apparatus, information processing method, and storage medium

Similar Documents

Publication Publication Date Title
US12021854B2 (en) Secure permissioning of access to user accounts, including secure deauthorization of access to user accounts
US11887069B2 (en) Secure updating of allocations to user accounts
US20200167798A1 (en) Customizing customer onboarding for a service with machine learning models
US20190147430A1 (en) Customizing payment sessions with machine learning models
US20170200137A1 (en) Combined security for electronic transfers
US20180191685A1 (en) Recurring transfer notifications and secure transfers
US10389715B1 (en) Method and system for authentication via location monitoring
WO2018005885A1 (en) Communicating in chat sessions using chat bots to access payment accounts
US20220318805A1 (en) Detailing secure service provider transactions
CN109614780B (en) Biological information authentication method and device, storage medium and electronic equipment
US20240127219A1 (en) Emv secure chip communications
CN109615380A (en) Method, apparatus, computer equipment and the storage medium of user identity authentication
CN109688190A (en) Transmit method, apparatus, computer equipment and the storage medium of finance data
US20170270519A1 (en) Enabling a secure card on file option for electronic merchant applications
CN110581771A (en) Method for processing cost split by using network message service, computer device readable storage medium and computer device
US20240364675A1 (en) Secure Permissioning of Access to User Accounts, Including Secure Deauthorization of Access to User Accounts
US11449851B1 (en) Systems and methods for providing embedded banking services
JP2023005954A (en) Program, system, and method
CN116128619A (en) Service processing method, device, computer equipment and storage medium
KR20090047404A (en) System for financial transaction

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 201, room 518000, building A, No. 1, front Bay Road, Qianhai Shenzhen Guangdong Shenzhen Hong Kong cooperation zone (Qianhai business secretary)

Applicant after: ONECONNECT FINANCIAL TECHNOLOGY Co.,Ltd. (SHANGHAI)

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A

Applicant before: ONECONNECT FINANCIAL TECHNOLOGY Co.,Ltd. (SHANGHAI)

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190412