CN109787976B - Information updating method and device, computer equipment and storage medium - Google Patents

Information updating method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN109787976B
CN109787976B CN201910043231.3A CN201910043231A CN109787976B CN 109787976 B CN109787976 B CN 109787976B CN 201910043231 A CN201910043231 A CN 201910043231A CN 109787976 B CN109787976 B CN 109787976B
Authority
CN
China
Prior art keywords
identity
authentication
verification
data
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910043231.3A
Other languages
Chinese (zh)
Other versions
CN109787976A (en
Inventor
郭锦宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201910043231.3A priority Critical patent/CN109787976B/en
Publication of CN109787976A publication Critical patent/CN109787976A/en
Priority to PCT/CN2019/122567 priority patent/WO2020147441A1/en
Application granted granted Critical
Publication of CN109787976B publication Critical patent/CN109787976B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Abstract

The invention discloses an information updating method, an information updating device, computer equipment and a storage medium. The method comprises the following steps: receiving identity modification data uploaded by a verification initiating terminal and an authority name; modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data; and if the request end corresponding to the name of the authorization mechanism has a user database, the updated identification data is sent to the corresponding request end for storage according to the name of the authorization mechanism. According to the method, the unified identity authentication platform is constructed to be connected with different service systems, and a user only needs to modify the identity modification data reserved on the identity authentication platform, so that the identity identification data stored in a plurality of service systems can be modified synchronously, and the information updating efficiency is improved.

Description

Information updating method and device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of cloud security, in particular to an information updating method and device, computer equipment and a storage medium.
Background
At present, more enterprises and public service platforms can be used as service providers to provide internet service services, different enterprises or public service platforms store customer information, and it is the most common way for the service providers of the internet services to confirm various services by means of short message verification codes. However, if the client information reserved by the client in a plurality of service providers changes, the existing information change method has the following defects:
1. for a service provider, the transaction cost of information change of a client is high, and a matched identity verification system needs to be built for verification;
2. for the user, once the information of the client is changed, the user needs to go to different enterprises to change the information of the client, so that the user spends more time and the efficiency is low.
Disclosure of Invention
The embodiment of the invention provides an information updating method, an information updating device, computer equipment and a storage medium, and aims to solve the problems that in the prior art, uploading of a large batch of picture memories does not meet the use requirement, and the efficiency of an uploading process is low due to the fact that network bandwidth cannot be effectively utilized.
In a first aspect, an embodiment of the present invention provides an information updating method, which includes:
receiving identity modification data uploaded by a verification initiating terminal and an authority name;
modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data;
if the request end corresponding to the name of the authorization mechanism has a user database, the updated identification data is sent to the corresponding request end for storage according to the name of the authorization mechanism;
if an identity authentication request sent by a request end is detected, acquiring a mechanism identification code corresponding to the identity authentication request, and calling an identity authentication configuration flow corresponding to the mechanism identification code in a corresponding storage area so as to send the identity authentication configuration flow to an authentication initiating end in communication connection with the request end;
receiving authentication data uploaded correspondingly by an authentication initiating terminal according to the authentication configuration flow, comparing the authentication data with stored identity identification data or the identity identification data sent to an identity checking terminal for authentication, and judging whether the authentication data passes authentication or not;
and if the authentication data passes the authentication, sending the information that the authentication of the authentication data passes to an authentication initiating terminal.
In a second aspect, an embodiment of the present invention provides an information updating apparatus, including:
the modification request unit is used for receiving the identity modification data uploaded by the verification initiating terminal and the name of the authorization mechanism;
the data updating unit is used for modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data;
the modified data storage unit is used for sending the updated identification data to the corresponding request terminal for storage according to the name of the authorization mechanism if the request terminal corresponding to the name of the authorization mechanism has a user database;
the configuration flow acquiring unit is used for acquiring a mechanism identification code corresponding to the identity authentication request if the identity authentication request sent by the request end is detected, and calling an identity authentication configuration flow corresponding to the mechanism identification code in a corresponding storage area so as to send the identity authentication configuration flow to an authentication initiating end in communication connection with the request end;
the data verification unit is used for receiving the identity verification data uploaded by the verification initiating terminal correspondingly according to the identity verification configuration process, comparing the identity verification data with the stored identity identification data or sending the identity identification data to the identity checking terminal for verification, and judging whether the identity verification data passes verification;
and the verification success notification unit is used for sending the verification passed information of the identity verification data to the verification initiating end if the identity verification data passes the verification.
In a third aspect, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the information updating method according to the first aspect when executing the computer program.
In a fourth aspect, the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, causes the processor to execute the information updating method according to the first aspect.
The embodiment of the invention provides an information updating method, an information updating device, computer equipment and a storage medium. The method comprises the steps of receiving identity modification data uploaded by a verification initiating terminal and an authority name; modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data; and if the request end corresponding to the name of the authorization mechanism has a user database, the updated identification data is sent to the corresponding request end for storage according to the name of the authorization mechanism. According to the method, the unified identity authentication platform is constructed to be connected with different service systems, and a user only needs to modify the identity modification data reserved on the identity authentication platform, so that the identity identification data stored in a plurality of service systems can be modified synchronously, and the information updating efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of an information updating method according to an embodiment of the present invention;
fig. 2 is another schematic flow chart of an information updating method according to an embodiment of the present invention;
fig. 3 is another schematic flow chart of an information updating method according to an embodiment of the present invention;
fig. 4 is another schematic flow chart of an information updating method according to an embodiment of the present invention;
fig. 5 is another schematic flow chart of an information updating method according to an embodiment of the present invention;
FIG. 6 is a schematic block diagram of an information updating apparatus provided by an embodiment of the present invention;
FIG. 7 is another schematic block diagram of an information updating apparatus provided by an embodiment of the present invention;
FIG. 8 is another schematic block diagram of an information updating apparatus provided by an embodiment of the present invention;
FIG. 9 is another schematic block diagram of an information updating apparatus provided by an embodiment of the present invention;
FIG. 10 is another schematic block diagram of an information updating apparatus provided by an embodiment of the present invention;
FIG. 11 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating an information updating method according to an embodiment of the present invention, where the information updating method is applied to a management server and is executed by application software installed in the management server.
As shown in fig. 1, the method includes steps S110 to S160.
And S110, receiving the identity modification data uploaded by the verification initiating terminal and the name of the authorization mechanism.
In this embodiment, in order to simplify the construction cost of the existing APP Application or public service platform (e.g., a convenient service website, etc.), the identity authentication function of the APP Application or public service platform may be separately stripped and delivered to a unified identity authentication platform for identity authentication, that is, the unified identity authentication platform provides an API (Application Programming Interface) Interface to connect and communicate with the request end, and at this time, the unified identity authentication platform may be regarded as Application software in the management server. And the request terminals corresponding to the APP applications or the public service platform only need to configure the identity verification configuration process on the interface of the identity verification configuration process provided by the unified identity authentication platform.
The requesting end is regarded as a server provider, such as an APP application or a server of a public service platform, and may also be understood as a service end.
The triggering condition for the request terminal to send the identity verification request to the identity authentication platform is as follows: after the verification initiating terminal is in communication connection with the request terminal, the service scene triggered by the verification initiating terminal has an identity verification requirement.
For example, a plurality of subsidiaries are provided under a certain group company, each subsidiary is provided with an APP application program which is correspondingly developed, each APP application program does not need to independently build an identity verification module, but is uniformly connected with an identity authentication platform for identity verification, development cost of the APP application programs is reduced, and unified management of identity recognition data is facilitated.
The identity authentication platform stores identity identification data of a plurality of users, the identity identification data are regarded as stored identity identification data, when part of data items (such as mobile phone numbers of the users) of the identity identification data of a certain user need to be changed, the user needs to log in an APP application program or a public service platform at a verification initiating end to be in communication connection with a request end (regarded as a service end server) corresponding to the APP application program or the public service platform. The identity modification data and the name of the authority are filled in an identity identification data change application interface provided by the request terminal, for example, the mobile phone number registered before is changed from X1 to X2, and the notified modified authority names A1, A2 and A3 (namely, the name of the authority) are selected. Because the identity modification data and the name of the authority can be visually and directly edited by the verification initiating terminal, the operation is simple and convenient, and the user can modify the identity modification data and the name of the authority conveniently and instantly.
In an embodiment, as shown in fig. 3, before step S110, the method further includes:
s101, receiving the identity verification data uploaded by the verification initiating terminal, and if the identity verification data exists in the stored identity identification data, sending the uploaded identity modification data and notification information of the name of the authorization mechanism to the verification initiating terminal.
In this embodiment, when a user needs to modify the identification data stored in the identity authentication platform, the user needs to be authenticated first, and the identification data stored in the identity authentication platform can be modified after the authentication is passed.
And S120, modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data.
In this embodiment, for example, the AA user needs to change the previously registered mobile phone number from X1 to X2, the identity modification data is X2, the previously registered mobile phone number in the stored identification data is X1, and X1 is replaced by X2, so that the updated identification data can be obtained.
S130, if the request end corresponding to the name of the authorization mechanism has a user database, the updated identification data is sent to the corresponding request end for storage according to the name of the authorization mechanism.
In this embodiment, it is first determined whether a user database exists at a request end corresponding to the name of the authorization mechanism, that is, the identity authentication platform provides authorization operations to allow a user to authorize which enterprises obtain their own updated identity identification data; the identity authentication platform is communicated with an enterprise system (namely a request end) authorized by a client, when the identity modification data needs to update the stored identity identification data, the identity modification data is updated to the enterprise system, and the identity modification data is synchronized aiming at the request end with a user database.
Namely, when the user information is changed, only the identity authentication is carried out on the identity authentication platform, and the own information is modified; after the operation is finished, the identity authentication platform synchronizes the client information to a client authorization system; the client does not need to carry out information change operation in a plurality of units and a plurality of systems, and the information updating efficiency is greatly improved.
In an embodiment, as shown in fig. 2, step S120 is followed by:
s131, if the request end corresponding to the name of the authorization mechanism does not have a user database, sending change information to the request end corresponding to the name of the authorization mechanism.
In this embodiment, if the request end corresponding to the name of the authority does not have the user database, it indicates that the request end completely strips the authentication function, and the request end does not locally store the identification data of the user. However, in order to enable the requesting end without the user database to know that the information of the user is updated, the identity authentication platform needs to send the change information to the requesting end without the user database locally, so as to serve as a history credential of information change.
S140, if the identity authentication request sent by the request end is detected, the mechanism identification code corresponding to the identity authentication request is obtained, and the identity authentication configuration process corresponding to the mechanism identification code is called in the corresponding storage area to be sent to the authentication initiating end in communication connection with the request end.
In this embodiment, after the user completes the change of information, if the user needs to log in the APP application or the public service platform, and needs to verify that the initiating terminal is in communication connection with the requesting terminal, the service scenario triggered by the verifying initiating terminal has an identity verification requirement, so that the requesting terminal is triggered to send an identity verification request to the identity authentication platform. For example, after the verification initiator logs in an APP application of a certain bank, there is a need to query account balance, and at this time, the request initiator sends an identity verification request to the identity authentication platform. When the identity authentication platform detects an identity authentication request sent by a request end, a mechanism identification code corresponding to the identity authentication request is firstly obtained, an identity authentication configuration flow is called correspondingly according to the mechanism identification code, and the identity authentication configuration flow is sent to an authentication initiating end in communication connection with the request end. The authentication initiating terminal receives the authentication configuration flow, and can acquire which authentication information needs to be uploaded for authentication.
In an embodiment, as shown in fig. 4, step S140 further includes, before:
s1401, if the identity authentication configuration process uploaded by the request end is detected, acquiring a mechanism identification code of the request end, and storing the identity authentication configuration process to a storage area established corresponding to the mechanism identification code.
In this embodiment, if an authentication configuration flow is configured in a certain request end, the first step is short message OTP authentication (i.e., short message dynamic password authentication task), the second step is OCR identity authentication (i.e., identification document OCR verification task), and the third step is identity verification (i.e., networking verification citizen identity information task), and after the configuration and generation of the authentication configuration flow are completed, the authentication configuration flow is stored in a management server corresponding to a unified authentication platform.
When the identity authentication configuration process is stored, the mechanism identification code of the request end is firstly acquired, then the storage area corresponding to the mechanism identification code is positioned in the management server, and finally the identity authentication configuration process is stored in the storage area corresponding to the mechanism identification code. And if the storage area corresponding to the mechanism identification code is not located in the management server, creating a storage area according to the mechanism identification code, and then storing the identity authentication configuration flow into the storage area corresponding to the mechanism identification code.
If the same mechanism identification code uploads a plurality of identity authentication configuration flows, the mechanism is represented to have a plurality of service scenes, and each service scene corresponds to different authentication flows. Once the number of the authentication configuration processes corresponding to the same mechanism identification code exceeds 1, the request terminal sends out a new edition of the initially uploaded authentication configuration process corresponding to the mechanism identification code to perform service scene naming (for example, naming the mechanism service number code of the service scene), and also performs service scene naming on the authentication configuration process currently uploaded by the request terminal, and after the service scene naming is completed respectively, corresponding sub-storage areas are created in the storage areas corresponding to the mechanism identification code to store the authentication configuration processes of different service scenes respectively.
In one embodiment, as shown in fig. 5, step S1401 further includes:
s14011, acquiring the task nodes which are selected in the task set and are arranged on the configuration interface; the task set at least comprises a short message dynamic password verification task, a face recognition verification task, a video verification task, an identity document OCR verification task, a networking verification citizen identity information task and an artificial verification task;
s14012, obtaining the connection relation between the configured task nodes;
and S14013, correspondingly generating an identity authentication configuration flow according to the task nodes and the connection relationship among the task nodes.
In this embodiment, the workflow engine activity is used as a bottom support (the workflow engine activity is a lightweight workflow service management platform for enterprise users, developers, and system administrators, and the core of the workflow engine activity is a fast and stable BPMN2.0 flow engine developed by java) to implement an authentication configuration flow.
In the process of configuring the flow, the identity authentication platform provides an online editing interface (the online editing interface is loaded with a workflow engine activity) for the request end, and the identity authentication configuration flow can be correspondingly generated only by selecting task nodes in the task set and setting the connection relationship between the task nodes on the online editing interface. For example, the configuration flow of the identity verification called by a certain service scenario of the request end is that short message OTP verification (short message dynamic password verification task) is performed as the first step, OCR identity verification (identification document OCR verification task) is performed as the second step, and identity verification (networking verification of citizen identity information task) is performed as the third step, only OCR dynamic password verification task, identification document verification task and networking verification of citizen identity information task need to be selected from task sets (task sets at least comprise short message dynamic password verification task, face recognition verification task, video verification task, identification document OCR verification task, networking verification of citizen identity information task and manual verification task), and then the configuration of the sequence and connection relation between task nodes is completed, namely, the authentication configuration process can be correspondingly generated in the workflow engine activiti. Through the visual configuration process, the user-defined configuration process and the generation process of the identity verification configuration process are simplified.
S150, receiving authentication data uploaded correspondingly by the authentication initiating terminal according to the authentication configuration process, comparing the authentication data with stored identity identification data or sending the authentication data to the identity checking terminal for authentication, and judging whether the authentication data passes the authentication.
In this embodiment, after the server corresponding to the identity authentication platform receives the authentication data (e.g., the short message verification code, the OCR identification information of the identification card photo, the short video including the face, etc.) uploaded by the authentication initiating terminal according to the authentication configuration flow, the server compares the authentication data uploaded by the authentication initiating terminal one by one according to the stored identification data, and determines whether the stored identification data includes the uploaded authentication data, that is, whether the authentication data passes the background authentication of the identity authentication platform. Because the identity authentication module of the APP application program or the public service platform is stripped, a plurality of APP application programs or the public service platforms can share the same identity authentication platform, the development process of the APP application programs or the public service platforms is simplified, and the development cost is reduced.
In one embodiment, step S150 includes:
if the identity verification data does not comprise networking verification citizen identity information, comparing the identity verification data with stored identity identification data to judge whether the identity verification data passes verification;
if the identity verification data comprises networking verification citizen identity information, judging whether the uploading time of the identity verification data is within a preset working time period, and if the uploading time of the identity verification data is within the preset working time period, sending the networking verification citizen identity information included in the identity verification data to an artificial verification terminal for artificial verification.
In this embodiment, if the authentication data includes networking check citizen identity information, it is determined whether the uploading time of the authentication data is in the working time period (e.g., 9:00-18:00 on Monday-Friday), and if the uploading time of the authentication data is in the working time period, the networking check citizen identity information included in the authentication data is sent to the identity check terminal (the identity check terminal is a networking check citizen identity information system, which is based on the existing intranet and internetwork interconnection platform of the Miner's Bank, and forwards the user of the Miner's bank and the check request sent by the front-end system of the Account System, Credit investigation System, and Backward money System, and accepts and forwards the check request sent by the front-end system of the Miner's Bank user and the comprehensive business system, and accepts and forwards the result check of the information sharing system of the Miner's department) Carrying out manual inspection; and if the uploading time of the identity verification data is not in the working time period, comparing the identity verification data stored in the management server by the networking verification citizen identity information included in the identity verification data for verification.
And S160, if the authentication data passes the authentication, sending the information that the authentication of the authentication data passes to the authentication initiating terminal.
In this embodiment, if the uploaded authentication data passes the verification of the authentication platform, the verification initiating end is notified that the uploaded authentication data passes the verification, and at this time, the verification initiating end can perform a service approval operation according to the authentication data, for example, an APP application program of a certain bank is logged in, and after the authentication data of the verification initiating end passes the verification of the authentication platform, the subsequent process of successful authentication can be continuously executed, for example, a certain service is opened, and the certain service is stopped.
In an embodiment, after step S160, the method further includes:
if the uploaded identity verification data is not verified, the identity verification data is sent to an artificial verification end to be manually verified;
and if the fed-back manual verification failing information is received, sending the verification failing information of the identity verification data to a verification initiating terminal.
In this embodiment, if the uploaded authentication data is not authenticated in the management server, the authentication data may be sent to a manual verification terminal for manual verification, so as to further ensure that the authentication data has information inconsistent with the stored identification data, and thus, a small amount of authentication data that is not authenticated by the server can be further manually verified and confirmed. If the manual operation on the identity authentication data is still failed, the verification of the identity authentication data is failed, and the verification failure information of the identity authentication data needs to be sent to a verification initiating terminal.
According to the method, the unified identity authentication platform is constructed to be connected with different service systems, and a user only needs to modify the identity modification data reserved on the identity authentication platform, so that the identity identification data stored in a plurality of service systems can be modified synchronously, and the information updating efficiency is improved.
An embodiment of the present invention further provides an information updating apparatus, where the information updating apparatus is configured to execute any embodiment of the foregoing information updating method. Specifically, referring to fig. 6, fig. 6 is a schematic block diagram of an information updating apparatus according to an embodiment of the present invention. The information updating apparatus 100 may be disposed in a management server.
As shown in fig. 6, the information updating apparatus 100 includes a modification request unit 110, a data updating unit 120, a modified data storage unit 130, a configuration flow acquisition unit 140, a data verification unit 150, and a verification success notification unit 160.
The modification request unit 110 is configured to receive the identity modification data uploaded by the authentication initiator and the name of the authority.
In this embodiment, in order to simplify the construction cost of the existing APP Application or public service platform (e.g., a convenient service website, etc.), the identity authentication function of the APP Application or public service platform may be separately stripped and delivered to a unified identity authentication platform for identity authentication, that is, the unified identity authentication platform provides an API (Application Programming Interface) Interface to connect and communicate with the request end, and at this time, the unified identity authentication platform may be regarded as Application software in the management server. And the request terminals corresponding to the APP applications or the public service platform only need to configure the identity verification configuration process on the interface of the identity verification configuration process provided by the unified identity authentication platform.
The requesting end is regarded as a server provider, such as an APP application or a server of a public service platform, and may also be understood as a service end.
The triggering condition for the request terminal to send the identity verification request to the identity authentication platform is as follows: after the verification initiating terminal is in communication connection with the request terminal, the service scene triggered by the verification initiating terminal has an identity verification requirement.
For example, a plurality of subsidiaries are provided under a certain group company, each subsidiary is provided with an APP application program which is correspondingly developed, each APP application program does not need to independently build an identity verification module, but is uniformly connected with an identity authentication platform for identity verification, development cost of the APP application programs is reduced, and unified management of identity recognition data is facilitated.
The identity authentication platform stores identity identification data of a plurality of users, the identity identification data are regarded as stored identity identification data, when part of data items (such as mobile phone numbers of the users) of the identity identification data of a certain user need to be changed, the user needs to log in an APP application program or a public service platform at a verification initiating end to be in communication connection with a request end (regarded as a service end server) corresponding to the APP application program or the public service platform. The identity modification data and the name of the authority are filled in an identity identification data change application interface provided by the request terminal, for example, the mobile phone number registered before is changed from X1 to X2, and the notified modified authority names A1, A2 and A3 (namely, the name of the authority) are selected. Because the identity modification data and the name of the authority can be visually and directly edited by the verification initiating terminal, the operation is simple and convenient, and the user can modify the identity modification data and the name of the authority conveniently and instantly.
In one embodiment, as shown in fig. 8, the information updating apparatus 100 further includes:
the identity verification unit 101 is configured to receive identity verification data uploaded by a verification initiating terminal, and send notification information of the uploaded identity modification data and the name of the authority to the verification initiating terminal if the identity verification data exists in the stored identity identification data.
In this embodiment, when a user needs to modify the identification data stored in the identity authentication platform, the user needs to be authenticated first, and the identification data stored in the identity authentication platform can be modified after the authentication is passed.
The data updating unit 120 is configured to modify the corresponding stored identification data according to the identification modification data, so as to obtain updated identification data.
In this embodiment, for example, the AA user needs to change the previously registered mobile phone number from X1 to X2, the identity modification data is X2, the previously registered mobile phone number in the stored identification data is X1, and X1 is replaced by X2, so that the updated identification data can be obtained.
And a modified data storage unit 130, configured to send the updated identification data to a corresponding request end for storage according to the name of the authorization mechanism if the request end corresponding to the name of the authorization mechanism has a user database.
In this embodiment, it is first determined whether a user database exists at a request end corresponding to the name of the authorization mechanism, that is, the identity authentication platform provides authorization operations to allow a user to authorize which enterprises obtain their own updated identity identification data; the identity authentication platform is communicated with an enterprise system (namely a request end) authorized by a client, when the identity modification data needs to update the stored identity identification data, the identity modification data is updated to the enterprise system, and the identity modification data is synchronized aiming at the request end with a user database.
Namely, when the user information is changed, only the identity authentication is carried out on the identity authentication platform, and the own information is modified; after the operation is finished, the identity authentication platform synchronizes the client information to a client authorization system; the client does not need to carry out information change operation in a plurality of units and a plurality of systems, and the information updating efficiency is greatly improved.
In one embodiment, as shown in fig. 7, the information updating apparatus 100 further includes:
a change information sending unit 131, configured to send change information to the requesting end corresponding to the authority name if the requesting end corresponding to the authority name does not have a user database.
In this embodiment, if the request end corresponding to the name of the authority does not have the user database, it indicates that the request end completely strips the authentication function, and the request end does not locally store the identification data of the user. However, in order to enable the requesting end without the user database to know that the information of the user is updated, the identity authentication platform needs to send the change information to the requesting end without the user database locally, so as to serve as a history credential of information change.
The configuration flow acquiring unit 140 is configured to, if an authentication request sent by a request end is detected, acquire a mechanism identification code corresponding to the authentication request, and call an authentication configuration flow corresponding to the mechanism identification code in a corresponding storage area to send the authentication configuration flow to an authentication initiating end in communication connection with the request end.
In this embodiment, after the user completes the change of information, if the user needs to log in the APP application or the public service platform, and needs to verify that the initiating terminal is in communication connection with the requesting terminal, the service scenario triggered by the verifying initiating terminal has an identity verification requirement, so that the requesting terminal is triggered to send an identity verification request to the identity authentication platform. For example, after the verification initiator logs in an APP application of a certain bank, there is a need to query account balance, and at this time, the request initiator sends an identity verification request to the identity authentication platform. When the identity authentication platform detects an identity authentication request sent by a request end, a mechanism identification code corresponding to the identity authentication request is firstly obtained, an identity authentication configuration flow is called correspondingly according to the mechanism identification code, and the identity authentication configuration flow is sent to an authentication initiating end in communication connection with the request end. The authentication initiating terminal receives the authentication configuration flow, and can acquire which authentication information needs to be uploaded for authentication.
In one embodiment, as shown in fig. 9, the information updating apparatus 100 further includes:
the authentication process configuration unit 1401 is configured to, if an authentication configuration process uploaded by a request end is detected, obtain a mechanism identification code of the request end, and store the authentication configuration process in a storage area established in correspondence with the mechanism identification code.
In this embodiment, if an authentication configuration flow is configured in a certain request end, the first step is short message OTP authentication (i.e., short message dynamic password authentication task), the second step is OCR identity authentication (i.e., identification document OCR verification task), and the third step is identity verification (i.e., networking verification citizen identity information task), and after the configuration and generation of the authentication configuration flow are completed, the authentication configuration flow is stored in a management server corresponding to a unified authentication platform.
When the identity authentication configuration process is stored, the mechanism identification code of the request end is firstly acquired, then the storage area corresponding to the mechanism identification code is positioned in the management server, and finally the identity authentication configuration process is stored in the storage area corresponding to the mechanism identification code. And if the storage area corresponding to the mechanism identification code is not located in the management server, creating a storage area according to the mechanism identification code, and then storing the identity authentication configuration flow into the storage area corresponding to the mechanism identification code.
If the same mechanism identification code uploads a plurality of identity authentication configuration flows, the mechanism is represented to have a plurality of service scenes, and each service scene corresponds to different authentication flows. Once the number of the authentication configuration processes corresponding to the same mechanism identification code exceeds 1, the request terminal sends out a new edition of the initially uploaded authentication configuration process corresponding to the mechanism identification code to perform service scene naming (for example, naming the mechanism service number code of the service scene), and also performs service scene naming on the authentication configuration process currently uploaded by the request terminal, and after the service scene naming is completed respectively, corresponding sub-storage areas are created in the storage areas corresponding to the mechanism identification code to store the authentication configuration processes of different service scenes respectively.
In one embodiment, as shown in fig. 10, the information updating apparatus 100 further includes:
a task node configuring unit 14011, configured to obtain a task node that is selected in the task set and is placed in the configuration interface; the task set at least comprises a short message dynamic password verification task, a face recognition verification task, a video verification task, an identity document OCR verification task, a networking verification citizen identity information task and an artificial verification task;
a connection relationship configuration unit 14012, configured to obtain a connection relationship between the configured task nodes;
the process generating unit 14013 is configured to generate an authentication configuration process according to the task nodes and the connection relationship between the task nodes.
In this embodiment, the workflow engine activity is used as a bottom support (the workflow engine activity is a lightweight workflow service management platform for enterprise users, developers, and system administrators, and the core of the workflow engine activity is a fast and stable BPMN2.0 flow engine developed by java) to implement an authentication configuration flow.
In the process of configuring the flow, the identity authentication platform provides an online editing interface (the online editing interface is loaded with a workflow engine activity) for the request end, and the identity authentication configuration flow can be correspondingly generated only by selecting task nodes in the task set and setting the connection relationship between the task nodes on the online editing interface. For example, the configuration flow of the identity verification called by a certain service scenario of the request end is that short message OTP verification (short message dynamic password verification task) is performed as the first step, OCR identity verification (identification document OCR verification task) is performed as the second step, and identity verification (networking verification of citizen identity information task) is performed as the third step, only OCR dynamic password verification task, identification document verification task and networking verification of citizen identity information task need to be selected from task sets (task sets at least comprise short message dynamic password verification task, face recognition verification task, video verification task, identification document OCR verification task, networking verification of citizen identity information task and manual verification task), and then the configuration of the sequence and connection relation between task nodes is completed, namely, the authentication configuration process can be correspondingly generated in the workflow engine activiti. Through the visual configuration process, the user-defined configuration process and the generation process of the identity verification configuration process are simplified.
The data verification unit 150 is configured to receive authentication data uploaded by the authentication initiation end according to the authentication configuration process, compare the authentication data with stored identification data or send the identification data to the identity verification end for verification, and determine whether the authentication data passes verification.
In this embodiment, after the server corresponding to the identity authentication platform receives the authentication data (e.g., the short message verification code, the OCR identification information of the identification card photo, the short video including the face, etc.) uploaded by the authentication initiating terminal according to the authentication configuration flow, the server compares the authentication data uploaded by the authentication initiating terminal one by one according to the stored identification data, and determines whether the stored identification data includes the uploaded authentication data, that is, whether the authentication data passes the background authentication of the identity authentication platform. Because the identity authentication module of the APP application program or the public service platform is stripped, a plurality of APP application programs or the public service platforms can share the same identity authentication platform, the development process of the APP application programs or the public service platforms is simplified, and the development cost is reduced.
In one embodiment, the data verification unit 150 includes:
the first verification unit is used for comparing the identity verification data with the stored identity identification data if the identity verification data does not comprise networking verification citizen identity information so as to judge whether the identity verification data passes verification;
and the second verification unit is used for judging whether the uploading time of the identity verification data is within a preset working time period or not if the identity verification data comprises networking verification citizen identity information, and sending the networking verification citizen identity information included in the identity verification data to the manual verification terminal for manual verification if the uploading time of the identity verification data is within the preset working time period.
In this embodiment, if the authentication data includes networking check citizen identity information, it is determined whether the uploading time of the authentication data is in the working time period (e.g., 9:00-18:00 on Monday-Friday), and if the uploading time of the authentication data is in the working time period, the networking check citizen identity information included in the authentication data is sent to the identity check terminal (the identity check terminal is a networking check citizen identity information system, which is based on the existing intranet and internetwork interconnection platform of the Miner's Bank, and forwards the user of the Miner's bank and the check request sent by the front-end system of the Account System, Credit investigation System, and Backward money System, and accepts and forwards the check request sent by the front-end system of the Miner's Bank user and the comprehensive business system, and accepts and forwards the result check of the information sharing system of the Miner's department) Carrying out manual inspection; and if the uploading time of the identity verification data is not in the working time period, comparing the identity verification data stored in the management server by the networking verification citizen identity information included in the identity verification data for verification.
And a verification success notification unit 160, configured to send verification passed information of the authentication data to the verification initiating end if the authentication data passes verification.
In this embodiment, if the uploaded authentication data passes the verification of the authentication platform, the verification initiating end is notified that the uploaded authentication data passes the verification, and at this time, the verification initiating end can perform a service approval operation according to the authentication data, for example, an APP application program of a certain bank is logged in, and after the authentication data of the verification initiating end passes the verification of the authentication platform, the subsequent process of successful authentication can be continuously executed, for example, a certain service is opened, and the certain service is stopped.
In one embodiment, the information updating apparatus 100 further includes:
the verification forwarding unit is used for sending the authentication data to an artificial verification end for artificial verification if the uploaded authentication data fails to pass verification;
and the verification failure notification unit is used for sending the verification failure information of the identity verification data to the verification initiating end if the fed back manual verification failure information is received.
In this embodiment, if the uploaded authentication data is not authenticated in the management server, the authentication data may be sent to a manual verification terminal for manual verification, so as to further ensure that the authentication data has information inconsistent with the stored identification data, and thus, a small amount of authentication data that is not authenticated by the server can be further manually verified and confirmed. If the manual operation on the identity authentication data is still failed, the verification of the identity authentication data is failed, and the verification failure information of the identity authentication data needs to be sent to a verification initiating terminal.
The device can realize synchronous modification of the stored identity identification data in a plurality of service systems by constructing a uniform identity authentication platform to be connected with different service systems, and a user only needs to modify the identity modification data reserved on the identity authentication platform, so that the information updating efficiency is improved.
The above-described information updating apparatus may be implemented in the form of a computer program that can be run on a computer device as shown in fig. 11.
Referring to fig. 11, fig. 11 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer device 500 is a management server, which may be an independent server or a server cluster composed of a plurality of servers.
Referring to fig. 11, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
The non-volatile storage medium 503 may store an operating system 5031 and a computer program 5032. The computer program 5032, when executed, may cause the processor 502 to perform an information update method.
The processor 502 is used to provide computing and control capabilities that support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the operation of the computer program 5032 in the non-volatile storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can be caused to execute an information updating method.
The network interface 505 is used for network communication, such as providing transmission of data information. Those skilled in the art will appreciate that the configuration shown in fig. 11 is a block diagram of only a portion of the configuration associated with aspects of the present invention and is not intended to limit the computing device 500 to which aspects of the present invention may be applied, and that a particular computing device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
Wherein the processor 502 is configured to run the computer program 5032 stored in the memory to implement the following functions: receiving identity modification data uploaded by a verification initiating terminal and an authority name; modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data; if the request end corresponding to the name of the authorization mechanism has a user database, the updated identification data is sent to the corresponding request end for storage according to the name of the authorization mechanism; if an identity authentication request sent by a request end is detected, acquiring a mechanism identification code corresponding to the identity authentication request, and calling an identity authentication configuration flow corresponding to the mechanism identification code in a corresponding storage area so as to send the identity authentication configuration flow to an authentication initiating end in communication connection with the request end; receiving authentication data uploaded correspondingly by an authentication initiating terminal according to the authentication configuration flow, comparing the authentication data with stored identity identification data or the identity identification data sent to an identity checking terminal for authentication, and judging whether the authentication data passes authentication or not; and if the authentication data passes the authentication, sending the information that the authentication of the authentication data passes to an authentication initiating terminal.
In an embodiment, after performing the step of modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data, the processor 502 further performs the following operations: and if the request end corresponding to the name of the authorization mechanism does not have the user database, sending change information to the request end corresponding to the name of the authorization mechanism.
In one embodiment, the processor 502 further performs the following operations before performing the steps of receiving the identity modification data uploaded by the authentication initiator and the authority name: receiving the identity verification data uploaded by the verification initiating terminal, and if the identity verification data exists in the stored identity identification data, sending the notification information of the uploaded identity modification data and the name of the authorization mechanism to the verification initiating terminal.
In an embodiment, before executing the steps of obtaining the mechanism identification code corresponding to the authentication request if the authentication request sent by the request end is detected, and calling the authentication configuration flow in the corresponding storage area to send to the authentication initiating end in communication connection with the request end, the processor 502 further executes the following operations: and if the identity authentication configuration process uploaded by the request end is detected, acquiring a mechanism identification code of the request end, and storing the identity authentication configuration process to a storage area established corresponding to the mechanism identification code.
In an embodiment, before executing the steps of obtaining the mechanism identification code of the request end and storing the authentication configuration flow to the storage area established corresponding to the mechanism identification code if the authentication configuration flow uploaded by the request end is detected, the processor 502 further executes the following operations: acquiring a task node which is selected in a task set and is arranged on a configuration interface; acquiring a connection relation between the configured task nodes; correspondingly generating an identity authentication configuration flow according to the task nodes and the connection relation between the task nodes; the task set at least comprises a short message dynamic password verification task, a face recognition verification task, a video verification task, an identity document OCR verification task, a networking verification citizen identity information task and an artificial verification task.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 11 does not constitute a limitation on the specific construction of the computer device, and that in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device may only include a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are consistent with those of the embodiment shown in fig. 11, and are not described herein again.
It should be understood that, in the embodiment of the present invention, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the invention, a computer-readable storage medium is provided. The computer readable storage medium may be a non-volatile computer readable storage medium. The computer-readable storage medium stores a computer program, wherein the computer program when executed by a processor implements the steps of: receiving identity modification data uploaded by a verification initiating terminal and an authority name; modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data; if the request end corresponding to the name of the authorization mechanism has a user database, the updated identification data is sent to the corresponding request end for storage according to the name of the authorization mechanism; if an identity authentication request sent by a request end is detected, acquiring a mechanism identification code corresponding to the identity authentication request, and calling an identity authentication configuration flow corresponding to the mechanism identification code in a corresponding storage area so as to send the identity authentication configuration flow to an authentication initiating end in communication connection with the request end; receiving authentication data uploaded correspondingly by an authentication initiating terminal according to the authentication configuration flow, comparing the authentication data with stored identity identification data or the identity identification data sent to an identity checking terminal for authentication, and judging whether the authentication data passes authentication or not; and if the authentication data passes the authentication, sending the information that the authentication of the authentication data passes to an authentication initiating terminal.
In an embodiment, after modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data, the method further includes: and if the request end corresponding to the name of the authorization mechanism does not have the user database, sending change information to the request end corresponding to the name of the authorization mechanism.
In an embodiment, before receiving the identity modification data uploaded by the authentication initiating terminal and the name of the authority, the method further includes: receiving the identity verification data uploaded by the verification initiating terminal, and if the identity verification data exists in the stored identity identification data, sending the notification information of the uploaded identity modification data and the name of the authorization mechanism to the verification initiating terminal.
In an embodiment, before the step of acquiring the mechanism identification code corresponding to the authentication request and calling the authentication configuration flow in the corresponding storage area to send the authentication configuration flow to the authentication initiating end in communication connection with the requesting end if the authentication request sent by the requesting end is detected, the method further includes: and if the identity authentication configuration process uploaded by the request end is detected, acquiring a mechanism identification code of the request end, and storing the identity authentication configuration process to a storage area established corresponding to the mechanism identification code.
In an embodiment, before the obtaining of the mechanism identification code of the request end and storing the authentication configuration flow in a storage area established corresponding to the mechanism identification code if the authentication configuration flow uploaded by the request end is detected, the method further includes: acquiring a task node which is selected in a task set and is arranged on a configuration interface; the task set at least comprises a short message dynamic password verification task, a face recognition verification task, a video verification task, an identity document OCR verification task, a networking verification citizen identity information task and an artificial verification task; acquiring a connection relation between the configured task nodes; and correspondingly generating an identity authentication configuration flow according to the task nodes and the connection relation between the task nodes.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses, devices and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only a logical division, and there may be other divisions when the actual implementation is performed, or units having the same function may be grouped into one unit, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An information updating method applied to a management server, the method being executed by application software installed in the management server, the method comprising:
receiving identity modification data uploaded by a verification initiating terminal and an authority name;
modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data;
if the request end corresponding to the name of the authorization mechanism has a user database, the updated identification data is sent to the corresponding request end for storage according to the name of the authorization mechanism;
if an identity authentication request sent by a request end is detected, acquiring a mechanism identification code corresponding to the identity authentication request, and calling an identity authentication configuration flow corresponding to the mechanism identification code in a corresponding storage area so as to send the identity authentication configuration flow to an authentication initiating end in communication connection with the request end;
receiving authentication data uploaded correspondingly by an authentication initiating terminal according to the authentication configuration flow, comparing the authentication data with stored identity identification data or the identity identification data sent to an identity checking terminal for authentication, and judging whether the authentication data passes authentication or not;
and if the authentication data passes the authentication, sending the information that the authentication of the authentication data passes to an authentication initiating terminal.
2. The information updating method according to claim 1, wherein after modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data, the method further comprises:
and if the request end corresponding to the name of the authorization mechanism does not have the user database, sending change information to the request end corresponding to the name of the authorization mechanism.
3. The information updating method according to claim 1, wherein before receiving the identity modification data uploaded by the authentication initiator and the name of the authority, further comprising:
receiving the identity verification data uploaded by the verification initiating terminal, and if the identity verification data exists in the stored identity identification data, sending the notification information of the uploaded identity modification data and the name of the authorization mechanism to the verification initiating terminal.
4. The information updating method according to claim 1, wherein if an authentication request sent by a requesting end is detected, acquiring a mechanism identification code corresponding to the authentication request, and before invoking an authentication configuration flow in a corresponding storage area to send to an authentication initiating end in communication connection with the requesting end, further comprising:
and if the identity authentication configuration process uploaded by the request end is detected, acquiring a mechanism identification code of the request end, and storing the identity authentication configuration process to a storage area established corresponding to the mechanism identification code.
5. The information updating method according to claim 4, wherein if the authentication configuration process uploaded by the request end is detected, acquiring a mechanism identification code of the request end, and before the authentication configuration process is stored in a storage area established in correspondence with the mechanism identification code, the method further comprises:
acquiring a task node which is selected in a task set and is arranged on a configuration interface; the task set at least comprises a short message dynamic password verification task, a face recognition verification task, a video verification task, an identity document OCR verification task, a networking verification citizen identity information task and an artificial verification task;
acquiring a connection relation between the configured task nodes;
and correspondingly generating an identity authentication configuration flow according to the task nodes and the connection relation between the task nodes.
6. An information updating apparatus that operates in a management server, comprising:
the modification request unit is used for receiving the identity modification data uploaded by the verification initiating terminal and the name of the authorization mechanism;
the data updating unit is used for modifying the corresponding stored identification data according to the identification modification data to obtain updated identification data;
the modified data storage unit is used for sending the updated identification data to the corresponding request terminal for storage according to the name of the authorization mechanism if the request terminal corresponding to the name of the authorization mechanism has a user database;
the configuration flow acquiring unit is used for acquiring a mechanism identification code corresponding to the identity authentication request if the identity authentication request sent by the request end is detected, and calling an identity authentication configuration flow corresponding to the mechanism identification code in a corresponding storage area so as to send the identity authentication configuration flow to an authentication initiating end in communication connection with the request end;
the data verification unit is used for receiving the identity verification data uploaded by the verification initiating terminal correspondingly according to the identity verification configuration process, comparing the identity verification data with the stored identity identification data or sending the identity identification data to the identity checking terminal for verification, and judging whether the identity verification data passes verification;
and the verification success notification unit is used for sending the verification passed information of the identity verification data to the verification initiating end if the identity verification data passes the verification.
7. The information updating apparatus according to claim 6, further comprising:
and the change information sending unit is used for sending change information to the request end corresponding to the name of the authorization mechanism if the request end corresponding to the name of the authorization mechanism does not have a user database.
8. The information updating apparatus according to claim 6, further comprising:
and the identity verification unit is used for receiving the identity verification data uploaded by the verification initiating terminal, and if the stored identity identification data contains the identity verification data, sending the uploaded identity modification data and the notification information of the name of the authorization mechanism to the verification initiating terminal.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the information updating method according to any one of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to execute the information updating method according to any one of claims 1 to 5.
CN201910043231.3A 2019-01-17 2019-01-17 Information updating method and device, computer equipment and storage medium Active CN109787976B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910043231.3A CN109787976B (en) 2019-01-17 2019-01-17 Information updating method and device, computer equipment and storage medium
PCT/CN2019/122567 WO2020147441A1 (en) 2019-01-17 2019-12-03 Information updating method and apparatus, computer device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910043231.3A CN109787976B (en) 2019-01-17 2019-01-17 Information updating method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109787976A CN109787976A (en) 2019-05-21
CN109787976B true CN109787976B (en) 2021-11-16

Family

ID=66500880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910043231.3A Active CN109787976B (en) 2019-01-17 2019-01-17 Information updating method and device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109787976B (en)
WO (1) WO2020147441A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109787976B (en) * 2019-01-17 2021-11-16 深圳壹账通智能科技有限公司 Information updating method and device, computer equipment and storage medium
CN110933029B (en) * 2019-10-24 2021-12-28 杭州数梦工场科技有限公司 Information synchronization method, device and equipment based on unified authentication
CN113010876B (en) * 2019-12-05 2023-04-18 马上消费金融股份有限公司 Data storage method, application account registration method and storage device
CN111611216A (en) * 2020-04-28 2020-09-01 卓望数码技术(深圳)有限公司 Data sharing method, electronic device, and medium
CN112084993A (en) * 2020-09-19 2020-12-15 神思电子技术股份有限公司 Control method of identity authentication process
CN113015156A (en) * 2021-02-25 2021-06-22 康佳集团股份有限公司 Mobile phone number batch binding changing method, terminal and computer readable storage medium
CN115080094B (en) * 2022-08-16 2022-11-29 张家港金典软件有限公司 Security system updating method and system based on hierarchical interaction
CN115378983B (en) * 2022-10-26 2023-01-31 中航信移动科技有限公司 Paperless data processing system for data change
CN117354069B (en) * 2023-12-06 2024-02-13 自然资源陕西省卫星应用技术中心 Remote sensing data management system and method based on data lake

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179387A (en) * 2007-12-12 2008-05-14 江苏省电力公司 Digital certificate and multilevel field based unified identification management and authentication method
CN101399813A (en) * 2007-09-24 2009-04-01 中国移动通信集团公司 Identity combination method
CN103227799A (en) * 2013-05-13 2013-07-31 山东临沂烟草有限公司 Implementing method of unified user management and single sign-on platform based on multiple application systems
CN103595713A (en) * 2013-11-08 2014-02-19 红云红河烟草(集团)有限责任公司 Unified managing and authenticating platform for enterprise identity information
CN107241361A (en) * 2017-08-07 2017-10-10 中国石油工程建设有限公司 A kind of unified identity authentication method based on cloud environment
CN107277049A (en) * 2017-07-27 2017-10-20 郑州云海信息技术有限公司 The access method and device of a kind of application system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888409A (en) * 2012-12-19 2014-06-25 中国电信股份有限公司 Distributed unified authentication method and system
US9877185B2 (en) * 2013-09-13 2018-01-23 Facebook, Inc. Techniques for phone number and data management
US9529930B2 (en) * 2014-06-09 2016-12-27 Delonaco Limited Unified ID
CN105577665B (en) * 2015-12-24 2019-06-18 西安电子科技大学 Identity and access control management system and method under a kind of cloud environment
CN107465692B (en) * 2017-09-15 2019-12-20 湖北省楚天云有限公司 Unified user identity authentication method, system and storage medium
CN109787976B (en) * 2019-01-17 2021-11-16 深圳壹账通智能科技有限公司 Information updating method and device, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101399813A (en) * 2007-09-24 2009-04-01 中国移动通信集团公司 Identity combination method
CN101179387A (en) * 2007-12-12 2008-05-14 江苏省电力公司 Digital certificate and multilevel field based unified identification management and authentication method
CN103227799A (en) * 2013-05-13 2013-07-31 山东临沂烟草有限公司 Implementing method of unified user management and single sign-on platform based on multiple application systems
CN103595713A (en) * 2013-11-08 2014-02-19 红云红河烟草(集团)有限责任公司 Unified managing and authenticating platform for enterprise identity information
CN107277049A (en) * 2017-07-27 2017-10-20 郑州云海信息技术有限公司 The access method and device of a kind of application system
CN107241361A (en) * 2017-08-07 2017-10-10 中国石油工程建设有限公司 A kind of unified identity authentication method based on cloud environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于智能客户端技术的企业业务的统一管理平台设计与实现;朱鹏等;《电脑知识与技术》;20080805(第22期);全文 *

Also Published As

Publication number Publication date
WO2020147441A1 (en) 2020-07-23
CN109787976A (en) 2019-05-21

Similar Documents

Publication Publication Date Title
CN109787976B (en) Information updating method and device, computer equipment and storage medium
EP3704620B1 (en) System and method for blockchain-based notification
CN108777625B (en) Signature verification method, device and system, storage medium and electronic device
US8064583B1 (en) Multiple data store authentication
CN109120597B (en) Identity verification and login method and device and computer equipment
EP3688650A1 (en) System and method for providing a representational state transfer proxy service for a blockchain cloud service
CN111010372A (en) Block chain network identity authentication system, data processing method and gateway equipment
CN110049048B (en) Data access method, equipment and readable medium for government affair public service
CN111064749B (en) Network connection method, device and storage medium
US9253173B2 (en) System and method for supporting security administration
CN110838010B (en) Service processing method, device, terminal, server and storage medium
CN112073289B (en) Instant messaging control method and device
CN104754009A (en) Service acquisition and invocation method, device, client-side and server
CN110321730A (en) A kind of method, block chain node and the storage medium of operation data processing
US10049230B1 (en) System and methods for exchanging identity information among independent enterprises which may include person enable correlation
CN104935555B (en) client certificate authentication method, server, client and system
CN103559430B (en) application account management method and device based on Android system
CN112422570B (en) Game login method and device
CN112597118B (en) Shared file adding method and device
CN111930535B (en) Application function calling method and device, computer equipment and storage medium
CN114238927A (en) Business system login method, system, device, computer equipment and storage medium
CN114499905A (en) Method and device for changing and binding application account, computer equipment and storage medium
CN113810426B (en) Access system, method and device of instant messaging service
CN115102749B (en) Resource interaction method, device, equipment and storage medium
CN115589333B (en) Access request authentication method, device, system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant