CN109842611A - Auth method, device, computer equipment and storage medium - Google Patents

Auth method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109842611A
CN109842611A CN201811532325.9A CN201811532325A CN109842611A CN 109842611 A CN109842611 A CN 109842611A CN 201811532325 A CN201811532325 A CN 201811532325A CN 109842611 A CN109842611 A CN 109842611A
Authority
CN
China
Prior art keywords
service
proof rule
business
information
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811532325.9A
Other languages
Chinese (zh)
Other versions
CN109842611B (en
Inventor
林梓棱
朱欢敏
张健鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811532325.9A priority Critical patent/CN109842611B/en
Publication of CN109842611A publication Critical patent/CN109842611A/en
Application granted granted Critical
Publication of CN109842611B publication Critical patent/CN109842611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

This application involves a kind of auth method, device, computer equipment and storage mediums.The method is related to identity identifying technology, comprising: receives business request information, and extracts service identification information and user identity information from business request information;According to the user class of the type of service of business request information and user identity information, the first proof rule is determined;Each service propelling information in service identification information and preset service propelling table is subjected to service propelling matching;According to service propelling matching result, service propelling adjustment processing is carried out to the first proof rule, obtains the second proof rule;Authentication process is carried out according to the second proof rule, obtains authentication result.Authentication accuracy can be improved using this method.

Description

Auth method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of auth method, device, computer equipment and Storage medium.
Background technique
With the development of computer technology, various application programs emerge one after another, and can provide various business online Service, such as Web conference, shopping online and other teleaction services etc..And corresponding clothes are provided by application program in operation system It when business, needs to carry out verification verifying to the identity of terminal user, such as sign electronically, account password etc..However, current long-range body Part verification mode, is easy to appear the problem of cheating by personation, limited to the authentication accuracy of terminal user.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of identity that can be improved authentication accuracy and test Demonstrate,prove method, apparatus, computer equipment and storage medium.
A kind of auth method, which comprises
Business request information is received, and extracts service identification information and user identity information from business request information;
According to the user class of the type of service of business request information and user identity information, the first proof rule is determined;
Each service propelling information in service identification information and preset service propelling table is subjected to service propelling matching;
According to service propelling matching result, service propelling adjustment processing is carried out to the first proof rule, obtains the second verifying Rule;
Authentication process is carried out according to the second proof rule, obtains authentication result.
In one of the embodiments, according to the user class of the type of service of business request information and user identity information Not, determine that the first proof rule includes:
The type of service of business request information is determined according to service identification information;
Inquire preset business proof rule table;
The corresponding business proof rule of type of service is determined according to business proof rule table;
According to the user class of user identity information more new business proof rule, the first proof rule is obtained.
In one of the embodiments, according to the user class of user identity information more new business proof rule, is obtained One proof rule includes:
Inquire preset user identity rank table;
The corresponding user class of user identity information is determined according to user identity rank table;
Determine the corresponding user class verifying demand of user class;
The first proof rule for meeting user class verifying demand is extracted from business proof rule.
Believe in one of the embodiments, by each service propelling in service identification information and preset service propelling table Breath carries out before service propelling matching, further includes:
Obtain the history service data of user identity information;
Business demand analysis is carried out to history service data, obtains business demand analysis result;
Result, which is analyzed, according to business demand generates service propelling table.
In one of the embodiments, according to service propelling matching result, service propelling tune is carried out to the first proof rule Whole processing, obtaining the second proof rule includes:
Obtain service propelling matching result;
Preset push verifying demand corresponding with service propelling matching result is inquired, push verifying demand includes proof rule Type demand and proof rule requirements of combination;
The type requirements verification rule for meeting proof rule type demand is extracted from the first proof rule;
Type requirements verification rule is combined according to proof rule requirements of combination, obtains the second proof rule.
Authentication process is carried out according to the second proof rule in one of the embodiments, obtains authentication result Include:
Certificate message is generated according to the second proof rule, and it is corresponding to business request information to issue certificate message Terminal;
The certificate data that terminal returns is received, certificate data is verified by terminal according to certificate message Data collect;
Certificate data and preset identity reference data are subjected to data verification, obtain authentication result.
In one of the embodiments, after obtaining authentication result, further includes:
When authentication result is identity exception, authentication unexpected message is generated;
Issue authentication unexpected message.
A kind of authentication means, described device include:
Service request receiving module for receiving business request information, and extracts service identification from business request information Information and user identity information;
First proof rule module, for according to the type of service of business request information and the user class of user identity information Not, the first proof rule is determined;
Service propelling matching module, for believing each service propelling in service identification information and preset service propelling table Breath carries out service propelling matching;
Second proof rule module, for carrying out service propelling to the first proof rule according to service propelling matching result Adjustment processing, obtains the second proof rule;
Authentication process module obtains authentication knot for carrying out authentication process according to the second proof rule Fruit.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
Business request information is received, and extracts service identification information and user identity information from business request information;
According to the user class of the type of service of business request information and user identity information, the first proof rule is determined;
Each service propelling information in service identification information and preset service propelling table is subjected to service propelling matching;
According to service propelling matching result, service propelling adjustment processing is carried out to the first proof rule, obtains the second verifying Rule;
Authentication process is carried out according to the second proof rule, obtains authentication result.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor It is performed the steps of when row
Business request information is received, and extracts service identification information and user identity information from business request information;
According to the user class of the type of service of business request information and user identity information, the first proof rule is determined;
Each service propelling information in service identification information and preset service propelling table is subjected to service propelling matching;
According to service propelling matching result, service propelling adjustment processing is carried out to the first proof rule, obtains the second verifying Rule;
Authentication process is carried out according to the second proof rule, obtains authentication result.
Above-mentioned auth method, device, computer equipment and storage medium, according to the business request information received Type of service and user class determine the first proof rule, and according in service identification information and preset service propelling table The service propelling matching result of each service propelling information obtains the second proof rule after adjusting the first proof rule, further according to the Two proof rules carry out authentication process, obtain authentication result.During authentication process, by combining industry Be engaged in the type of service of request message, user identity information user class, and by service identification information and service propelling information Service propelling matching result determine proof rule carry out authentication, proof rule it is with strong points, improve identity and test Demonstrate,prove accuracy.
Detailed description of the invention
Fig. 1 is the application scenario diagram of auth method in one embodiment;
Fig. 2 is the flow diagram of auth method in one embodiment;
Fig. 3 is the flow diagram that service propelling table generates in one embodiment;
Fig. 4 is the flow diagram of auth method in another embodiment;
Fig. 5 is the structural block diagram of authentication means in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Auth method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, terminal 102 It is communicated with server 104 by network by network.Terminal 102 sends business request information to server 104, with request Related service service, server 104 determine that first tests according to the type of service and user class of the business request information received Card rule, and knot is matched with the service propelling of each service propelling information in preset service propelling table according to service identification information Fruit obtains the second proof rule after adjusting the first proof rule, carries out authentication process further according to the second proof rule, obtains Authentication result.Wherein, it is various personal computers that terminal 102, which can be, but not limited to, laptop, smart phone, is put down Plate computer and portable wearable device, server 104 can use the clothes of the either multiple server compositions of independent server Device cluster be engaged in realize.
In one embodiment, as shown in Fig. 2, providing a kind of auth method, it is applied in Fig. 1 in this way It is illustrated for server 104, comprising the following steps:
Step S201: receiving business request information, and service identification information and user's mark are extracted from business request information Know information.
Terminal 102 sends business request information to server 104, to request corresponding business service.Server 104 receives To business request information, service identification information and user identity information are extracted from the business request information.Wherein, service identification The information requested business service classification of terminal 102 for identification can specifically include the business letters such as Business Name, business number Breath;User identity information can specifically include name, ID card No., phone number, business account for distinguishing each service-user Family ID etc. can unique identification service-user identity information.
Step S203: according to the user class of the type of service of business request information and user identity information, first is determined Proof rule.
Different authentication rules can be equipped with for different types of service, such as safety, confidentiality requirement The requirement of high type of service, authentication rule can also be higher.Difference can also be equipped with for different service-users Authentication rule, such as general service subscriber and important service user, different authentication rules can be set. In the present embodiment, in the type of service for after obtaining user identity information in business request information, determining business request information, with And the corresponding user class of user identity information, and the first proof rule is determined according to the type of service and user class.Wherein, First proof rule can include but is not limited to various verification modes, as static password, dynamic password, digital certificate and biology are special Sign identification etc., and for the combined authentication demand of various verification modes, as static password and the successive combination of dynamic password are tested Card demand.
Step S205: service identification information is subjected to business with each service propelling information in preset service propelling table and is pushed away Send matching.
Wherein, service propelling table records the various businesses pushed information for having the user identity information to correspond to service-user, industry Business push table can carry out big data analysis according to the history service data of service-user and obtain.It, will be from business in the present embodiment Each service propelling information in service identification information and service propelling table extracted in request message carries out service propelling matching.? When specific implementation, the Business Name of each service propelling information, business in service identification information and service propelling table can be numbered Etc. business information matched, to judge whether the corresponding type of service of service identification information is located according to service propelling matching result It is adjusted accordingly in service propelling table, and to the first verification result, such as when industry in the business request information that terminal is sent Business identification information and each service propelling information gap in service propelling table are larger, then can reinforce the intensity of authentication, such as The complexity for increasing authentication obtains suitable authentication rule, to improve the accuracy of authentication.
Step S207: according to service propelling matching result, service propelling adjustment processing is carried out to the first proof rule, is obtained Second proof rule.
After obtaining service propelling matching result, business is carried out to the first proof rule according to the service propelling matching result and is pushed away It send adjustment to handle, further proof rule screening is such as carried out to the first proof rule according to service propelling matching result, from the It is chosen in one proof rule and obtains the second proof rule.In addition it is also possible to the combination to each verification mode in the first proof rule Demand is adjusted, and obtains the second proof rule.
Step S209: authentication process is carried out according to the second proof rule, obtains authentication result.
After obtaining the second proof rule, authentication process is carried out to terminal according to second proof rule.For example, when the When two proof rules are static password+fingerprint recognition, the static password data and finger print data of terminal, and root can be successively obtained Authentication process is carried out according to static password data and finger print data are comprehensive, obtains authentication result.In addition, working as authentication As a result when normal for identity, business request information is responded, carries out corresponding business processing according to the business request information.
In above-mentioned auth method, according to the type of service and user class of the business request information received, determine First proof rule, and according to the service propelling of each service propelling information in service identification information and preset service propelling table Matching result obtains the second proof rule after adjusting the first proof rule, carries out at authentication further according to the second proof rule Reason, obtains authentication result.During authentication process, by combining the type of service of business request information, using The user class of family identification information, and determined by the service propelling matching result of service identification information and service propelling information Proof rule carry out authentication, proof rule it is with strong points, improve authentication accuracy.
In one embodiment, according to the user class of the type of service of business request information and user identity information, really Fixed first proof rule includes: the type of service that business request information is determined according to service identification information;Inquire preset business Proof rule table;The corresponding business proof rule of type of service is determined according to business proof rule table;According to user identity information User class more new business proof rule, obtain the first proof rule.
In the present embodiment, the user class of the type of service and user identity information of the first proof rule and business request information It is not related.Specifically, the type of service of business request information is determined according to service identification information, can such as inquire preset business Type list inquires corresponding type of service, the as industry of business request information according to service identification information from type of service table Service type.Preset business proof rule table is inquired, business proof rule table record has the corresponding business of various businesses type to test Card rule, business proof rule may include various authentication modes and corresponding verification mode requirements of combination, according to business The type of service of request message inquires corresponding business proof rule from business proof rule table.Obtain business proof rule Afterwards, according to the user class of user identity information, the business proof rule is updated from business user perspective, obtains the first verifying rule Then.The first obtained proof rule combines the type of service of business request information and the user class of user identity information, point Proof rule is not carried out from type of service angle and service-user angle to determine, can be improved the accuracy of authentication.
In one embodiment, it according to the user class of user identity information more new business proof rule, obtains first and tests Card rule includes: the preset user identity rank table of inquiry;Determine that user identity information is corresponding according to user identity rank table User class;Determine the corresponding user class verifying demand of user class;It is extracted from business proof rule and meets user class First proof rule of verifying demand.
When being updated processing to obtained business proof rule according to the user class of user identity information, inquiry is pre- If user identity rank table, user identity rank table records the corresponding user class of each user identity information, according to from business The user identity information extracted in request message inquires corresponding user class from user identity rank table.It further determines that The corresponding user class of user class verifies demand, and user class verifying demand can be configured according to practical application request, As by user class be divided into it is high, high, in, and low five ranks, with the reduction of user class, user class verifying Demand also reduces.Preset user class demand schedule can be specifically inquired, it is true from the user class demand schedule according to user class Fixed corresponding user class verifies demand.After determining user class verifying demand, according to user class verifying demand to working Business proof rule is screened, and the first proof rule for meeting user class verifying demand is obtained.
First proof rule may include various authentication modes, such as static password, dynamic password, digital certificate, life Object feature identification etc., wherein living things feature recognition includes vocal print, fingerprint, palm shape, retina, iris, human scent, shape of face, hand Blood vessel and the behavioural characteristics such as physical traits and signature, voice, walking step state such as DNA.
In one embodiment, as shown in figure 3, by each business in service identification information and preset service propelling table Before pushed information carries out service propelling matching, further include the steps that service propelling table generates:
Step S301: the history service data of user identity information are obtained.
In the present embodiment, service propelling table carries out big data analysis according to the history service data of service-user and obtains, Record the various businesses pushed information for thering is the user identity information to correspond to service-user.Specifically, the service propelling table is being generated When, obtain the corresponding history service data of user identity information.History service data reflect user identity information and correspond to business The historical requests business service in operation system of user, can be to the type of service of service-user according to the history service data Selection is predicted.In specific application the corresponding history service number of the user identity information can be inquired from operation system According to, including history service time, history service type, history service air control data and history service execution data etc..
Step S303: carrying out business demand analysis to history service data, obtains business demand analysis result.
Wherein, business demand analysis can unite according to type of service, corresponding business service time and business number Type of service each in history service data, is such as ranked up according to business service time and business number, obtains industry by meter analysis Business demand analysis result.Generally, long for history service service time in the history service data and business of business often A possibility that type, the corresponding service-user of user identity information requests the business service of the type of service again, is maximum, with this Service propelling table can be generated and carry out service propelling, to improve the specific aim of service propelling.
Step S305: result is analyzed according to business demand and generates service propelling table.
After obtaining business demand analysis result, result is analyzed according to the business demand and generates service propelling table.Specifically, industry Demand analysis result of being engaged in may include the corresponding probability of demand of each type of service, which reflects service-user to correspondence The desirability of type of service, probability of demand is higher, and demand of the surface service-user to corresponding type of service is bigger, service-user It is more possible to select the business service of the type of service.When generating service propelling table, generated according to each type of service corresponding Service propelling information, and each service propelling information is ranked up by the sequence of probability from high to low as desired.
In the present embodiment, the business demand that business demand is analyzed is carried out according to the history service data to service-user Analysis keeps each service propelling information in service propelling table with strong points, pushes away using the business as a result, generation service propelling table It send table to carry out traffic forecast verifying, i.e., carries out service identification information with each service propelling information in corresponding service propelling table Service propelling matching, and matched according to service propelling and carry out service propelling adjustment, suitable authentication rule is obtained, to improve The accuracy of authentication.
In one embodiment, according to service propelling matching result, the first proof rule is carried out at service propelling adjustment Reason, obtaining the second proof rule includes: to obtain service propelling matching result;It inquires corresponding with service propelling matching result preset Verifying demand is pushed, push verifying demand includes proof rule type demand and proof rule requirements of combination;From the first verifying rule The type requirements verification rule for meeting proof rule type demand is extracted in then;According to proof rule requirements of combination by type demand Proof rule is combined, and obtains the second proof rule.
Service propelling adjustment processing can be carried out to the first obtained proof rule according to service propelling matching result.Specifically Ground obtains service propelling matching result, inquires the service propelling matching result and correspond to preset push verifying demand.Wherein, it pushes away It send verifying demand that can be set according to practical business requirement, can such as be drawn according to the matching degree of service propelling matching result The push of corresponding level is divided to verify demand, matching degree is higher, and push verifying demand is lower.Pushing verifying demand may include testing Rule type demand and proof rule requirements of combination are demonstrate,proved, proof rule type demand is the restriction to verification mode, is such as limited to It must have living things feature recognition;Proof rule requirements of combination is the restriction to verifying sequence between each verification mode, such as ancestor Static password is verified again for face identification, or first dynamic password verification carries out fingerprint recognition etc. again.
After being verified rule type demand, according to the proof rule type demand to each authentication of the first proof rule Formula is screened, and the type requirements verification rule for meeting sufficient proof rule type demand is retained.The type that screening is obtained again needs It asks proof rule to be combined according to proof rule requirements of combination, obtains the second proof rule, the second proof rule is according to industry Business push matching result obtains after carrying out service propelling adjustment processing to the first proof rule.
In one embodiment, authentication process is carried out according to the second proof rule, obtaining authentication result includes: Certificate message is generated according to the second proof rule, and issues certificate message to the corresponding terminal of business request information; The certificate data that terminal returns is received, certificate data carries out verify data acquisition according to certificate message by terminal It obtains;Certificate data and preset identity reference data are subjected to data verification, obtain authentication result.
After obtaining the second proof rule, authentication process is carried out to terminal according to second proof rule.Specifically, root Certificate message is generated according to the second proof rule, and the certificate message is issued to terminal, certificate message is used for Instruction terminal carries out verify data acquisition, obtains and returns to certificate data.Server 104 receives the identity that terminal returns and tests Data are demonstrate,proved, preset identity reference data is inquired, which is the identification criteria data that service-user is reserved, such as pre- DNA information, finger print data, password and voice data for staying etc..Certificate data and preset identity reference data are carried out Data verification obtains authentication result.Pass through if certificate data carries out data verification result with identity reference data, Authentication result is also that identity is normal, and otherwise authentication result is that identity is abnormal.
In one embodiment, after obtaining authentication result, further includes: when authentication result is that identity is abnormal When, generate authentication unexpected message;Issue authentication unexpected message.
After obtaining authentication result, if authentication result is that identity is abnormal, show the operator of present terminal not It is service-user itself, does not pass through for illegal operation or authentication, generates authentication unexpected message at this time and will be under it It is sent to terminal, re-starts authentication after stopping service request or adjustment with prompt terminal.
In one embodiment, as shown in figure 4, providing a kind of auth method, comprising:
Step S401: receiving business request information, and service identification information and user's mark are extracted from business request information Know information.
Terminal 102 sends business request information to server 104, to request corresponding business service.Server 104 receives To business request information, service identification information and user identity information are extracted from the business request information.Wherein, including business Title and business number, user identity information includes name and account working ID.
Step S402: the type of service of business request information is determined according to service identification information;
Step S403: preset business proof rule table is inquired;
Step S404: the corresponding business proof rule of type of service is determined according to business proof rule table;
Step S405: preset user identity rank table is inquired;
Step S406: the corresponding user class of user identity information is determined according to user identity rank table;
Step S407: the corresponding user class verifying demand of user class is determined;
Step S408: the first proof rule for meeting user class verifying demand is extracted from business proof rule.
In the present embodiment, the user class of the type of service and user identity information of the first proof rule and business request information It is not related.When being updated processing to obtained business proof rule according to the user class of user identity information, inquiry is pre- If user identity rank table, user identity rank table records the corresponding user class of each user identity information, according to from business The user identity information extracted in request message inquires corresponding user class from user identity rank table.First verifying rule It then include various authentication modes: static password, dynamic password, digital certificate, living things feature recognition etc., wherein biological characteristic Identification includes the behavioural characteristics such as physical traits and signature, voice such as fingerprint, palm shape, retina, iris, shape of face.
Step S409: service identification information is subjected to business with each service propelling information in preset service propelling table and is pushed away Send matching;
Step S410: service propelling matching result is obtained;
Step S411: inquiry preset push verifying demand corresponding with service propelling matching result pushes verifying demand packet Include proof rule type demand and proof rule requirements of combination;
Step S412: the type requirements verification rule for meeting proof rule type demand is extracted from the first proof rule;
Step S413: type requirements verification rule is combined according to proof rule requirements of combination, obtains the second verifying Rule.
In the present embodiment, the various businesses push that service propelling table record has the user identity information to correspond to service-user is believed Breath, by the business information such as the Business Name of each service propelling information, business number in service identification information and service propelling table into Row matching, to judge whether the corresponding type of service of service identification information is in service propelling table according to service propelling matching result In, and the first verification result is adjusted accordingly.
Step S414: authentication process is carried out according to the second proof rule, obtains authentication result;
Step S415: when authentication result is identity exception, authentication unexpected message is generated;
Step S416: authentication unexpected message is issued.
After obtaining the second proof rule, authentication process is carried out to terminal according to second proof rule.Specifically, body Part verification processing includes: to generate certificate message according to the second proof rule, and issue certificate message to service request The corresponding terminal of message;The certificate data that terminal returns is received, certificate data is by terminal according to certificate message Verify data is carried out to collect;Certificate data and preset identity reference data are subjected to data verification, obtain identity Verification result.
If authentication result is that identity is abnormal, show that the operator of present terminal is not service-user itself, is non- Method operation or authentication do not pass through, generate authentication unexpected message at this time and are issued to terminal, with prompt terminal Authentication is re-started after stopping service request or adjustment.When authentication result is that identity is normal, service request is responded Message carries out corresponding business processing according to the business request information.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 5, providing a kind of authentication means, comprising: service request receiving module 501, the first proof rule module 503, service propelling matching module 505, the second proof rule module 507 and authentication process Module 509, in which:
Service request receiving module 501 for receiving business request information, and extracts business mark from business request information Know information and user identity information;
First proof rule module 503, for according to the type of service of business request information and the use of user identity information Family rank determines the first proof rule;
Service propelling matching module 505, for pushing away service identification information and each business in preset service propelling table Breath of delivering letters carries out service propelling matching;
Second proof rule module 507, for carrying out business to the first proof rule and pushing away according to service propelling matching result It send adjustment to handle, obtains the second proof rule;
Authentication process module 509 obtains authentication for carrying out authentication process according to the second proof rule As a result.
In one embodiment, the first proof rule module 503 includes type of service unit, business rule table unit, industry Business rule determination unit and the first proof rule unit, in which: type of service unit, for determining industry according to service identification information The type of service of business request message;Business rule table unit, for inquiring preset business proof rule table;Business rule determines Unit, for determining the corresponding business proof rule of type of service according to business proof rule table;First proof rule unit is used According to the user class of user identity information more new business proof rule, the first proof rule is obtained.
In one embodiment, the first proof rule unit includes that rank table subelement, user class subelement, user test Card demand subelement and the first proof rule subelement, in which: rank table subelement, for inquiring preset user identity rank Table;User class subelement, for determining the corresponding user class of user identity information according to user identity rank table;User tests Card demand subelement, for determining the corresponding user class verifying demand of user class;First proof rule subelement, for from The first proof rule for meeting user class verifying demand is extracted in business proof rule.
It in one embodiment, further include that historical data obtains module, business demand module and service propelling table module, In: historical data obtains module, for obtaining the history service data of user identity information;Business demand module, for going through History business datum carries out business demand analysis, obtains business demand analysis result;Service propelling table module, for according to business need Analysis result is asked to generate service propelling table.
In one embodiment, the second proof rule module 507 includes matching result unit, verifying requirement unit, type Demand processing unit and the second proof rule unit, in which: matching result unit, for obtaining service propelling matching result;It tests Requirement unit is demonstrate,proved, for inquiring preset push verifying demand corresponding with service propelling matching result, push verifying demand includes Proof rule type demand and proof rule requirements of combination;Type demand processing unit, for being extracted from the first proof rule Meet the type requirements verification rule of proof rule type demand;Second proof rule unit, for being combined according to proof rule Type requirements verification rule is combined by demand, obtains the second proof rule.
In one embodiment, authentication process module 509 includes verifying message issuance unit, verify data reception list Member and verification processing unit, in which: verifying message issuance unit, for generating certificate message according to the second proof rule, And certificate message is issued to the corresponding terminal of business request information;Verify data receiving unit is returned for receiving terminal Certificate data, certificate data by terminal according to certificate message carry out verify data collect;At verifying Unit is managed, for certificate data and preset identity reference data to be carried out data verification, obtains authentication result.
It in one embodiment, further include that unexpected message generation module and unexpected message issue module, in which: unexpected message Generation module, for generating authentication unexpected message when authentication result is identity exception;Unexpected message issues mould Block, for issuing authentication unexpected message.
Specific about authentication means limits the restriction that may refer to above for auth method, herein not It repeats again.Modules in above-mentioned authentication means can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment includes processor, memory and the network interface connected by system bus. Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory of the computer equipment includes non-easy The property lost storage medium, built-in storage.The non-volatile memory medium is stored with operating system and computer program.The built-in storage Operation for operating system and computer program in non-volatile memory medium provides environment.The network of the computer equipment connects Mouth with external terminal by network connection for being communicated.To realize that a kind of identity is tested when the computer program is executed by processor Card method.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor perform the steps of when executing computer program
Business request information is received, and extracts service identification information and user identity information from business request information;
According to the user class of the type of service of business request information and user identity information, the first proof rule is determined;
Each service propelling information in service identification information and preset service propelling table is subjected to service propelling matching;
According to service propelling matching result, service propelling adjustment processing is carried out to the first proof rule, obtains the second verifying Rule;
Authentication process is carried out according to the second proof rule, obtains authentication result.
In one embodiment, it also performs the steps of when processor executes computer program according to service identification information Determine the type of service of business request information;Inquire preset business proof rule table;Industry is determined according to business proof rule table The corresponding business proof rule of service type;According to the user class of user identity information more new business proof rule, first is obtained Proof rule.
In one embodiment, inquiry preset user's body is also performed the steps of when processor executes computer program Part rank table;The corresponding user class of user identity information is determined according to user identity rank table;Determine that user class is corresponding User class verifies demand;The first proof rule for meeting user class verifying demand is extracted from business proof rule.
In one embodiment, acquisition user identity information is also performed the steps of when processor executes computer program History service data;Business demand analysis is carried out to history service data, obtains business demand analysis result;According to business need Analysis result is asked to generate service propelling table.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains service propelling matching As a result;Preset push verifying demand corresponding with service propelling matching result is inquired, push verifying demand includes proof rule class Type demand and proof rule requirements of combination;The type demand that extraction meets proof rule type demand from the first proof rule is tested Card rule;Type requirements verification rule is combined according to proof rule requirements of combination, obtains the second proof rule.
In one embodiment, it also performs the steps of when processor executes computer program according to the second proof rule Certificate message is generated, and issues certificate message to the corresponding terminal of business request information;Receive the body that terminal returns Part verify data, certificate data carry out verify data according to certificate message by terminal and collect;By authentication Data and preset identity reference data carry out data verification, obtain authentication result.
In one embodiment, it also performs the steps of when processor executes computer program when authentication result is When identity exception, authentication unexpected message is generated;Issue authentication unexpected message.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Business request information is received, and extracts service identification information and user identity information from business request information;
According to the user class of the type of service of business request information and user identity information, the first proof rule is determined;
Each service propelling information in service identification information and preset service propelling table is subjected to service propelling matching;
According to service propelling matching result, service propelling adjustment processing is carried out to the first proof rule, obtains the second verifying Rule;
Authentication process is carried out according to the second proof rule, obtains authentication result.
In one embodiment, it also performs the steps of when computer program is executed by processor and is believed according to service identification Cease the type of service for determining business request information;Inquire preset business proof rule table;It is determined according to business proof rule table The corresponding business proof rule of type of service;According to the user class of user identity information more new business proof rule, is obtained One proof rule.
In one embodiment, inquiry preset user is also performed the steps of when computer program is executed by processor Level of identity table;The corresponding user class of user identity information is determined according to user identity rank table;Determine that user class is corresponding User class verify demand;The first proof rule for meeting user class verifying demand is extracted from business proof rule.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains user identifier letter The history service data of breath;Business demand analysis is carried out to history service data, obtains business demand analysis result;According to business Demand analysis result generates service propelling table.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains service propelling With result;Preset push verifying demand corresponding with service propelling matching result is inquired, push verifying demand includes proof rule Type demand and proof rule requirements of combination;The type demand for meeting proof rule type demand is extracted from the first proof rule Proof rule;Type requirements verification rule is combined according to proof rule requirements of combination, obtains the second proof rule.
In one embodiment, it is also performed the steps of when computer program is executed by processor according to the second verifying rule Certificate message is then generated, and issues certificate message to the corresponding terminal of business request information;Receive what terminal returned Certificate data, certificate data carry out verify data according to certificate message by terminal and collect;Identity is tested It demonstrate,proves data and preset identity reference data carries out data verification, obtain authentication result.
In one embodiment, it also performs the steps of when computer program is executed by processor when authentication result When for identity exception, authentication unexpected message is generated;Issue authentication unexpected message.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of auth method, which comprises
Business request information is received, and extracts service identification information and user identity information from the business request information;
According to the user class of the type of service of the business request information and the user identity information, determine that the first verifying is advised Then;
Each service propelling information in the service identification information and preset service propelling table is subjected to service propelling matching;
According to service propelling matching result, service propelling adjustment processing is carried out to first proof rule, obtains the second verifying Rule;
Authentication process is carried out according to second proof rule, obtains authentication result.
2. the method according to claim 1, wherein the type of service according to the business request information and The user class of the user identity information determines that the first proof rule includes:
The type of service of the business request information is determined according to the service identification information;
Inquire preset business proof rule table;
The corresponding business proof rule of the type of service is determined according to the business proof rule table;
The business proof rule is updated according to the user class of the user identity information, obtains the first proof rule.
3. according to the method described in claim 2, it is characterized in that, updating institute according to the user class of the user identity information Business proof rule is stated, obtaining the first proof rule includes:
Inquire preset user identity rank table;
The corresponding user class of the user identity information is determined according to the user identity rank table;
Determine the corresponding user class verifying demand of the user class;
First proof rule for meeting the user class verifying demand is extracted from the business proof rule.
4. the method according to claim 1, wherein described by the service identification information and preset business Each service propelling information in push table carries out before service propelling matching, further includes:
Obtain the history service data of the user identity information;
Business demand analysis is carried out to the history service data, obtains business demand analysis result;
Result, which is analyzed, according to the business demand generates the service propelling table.
5. the method according to claim 1, wherein described according to service propelling matching result, to described first Proof rule carries out service propelling adjustment processing, and obtaining the second proof rule includes:
Obtain service propelling matching result;
Preset push verifying demand corresponding with the service propelling matching result is inquired, the push verifying demand includes verifying Rule type demand and proof rule requirements of combination;
The type requirements verification rule for meeting the proof rule type demand is extracted from first proof rule;
The type requirements verification rule is combined according to the proof rule requirements of combination, obtains the second proof rule.
6. the method according to claim 1, wherein described carry out authentication according to second proof rule Processing, obtaining authentication result includes:
Certificate message is generated according to second proof rule, and issues the certificate message to the service request The corresponding terminal of message;
The certificate data that the terminal returns is received, the certificate data is by the terminal according to the authentication Message carries out verify data and collects;
The certificate data and preset identity reference data are subjected to data verification, obtain authentication result.
7. method described in -6 any one according to claim 1, which is characterized in that after obtaining authentication result, also Include:
When the authentication result is identity exception, authentication unexpected message is generated;
Issue the authentication unexpected message.
8. a kind of authentication means, which is characterized in that described device includes:
Service request receiving module extracts service identification for receiving business request information, and from the business request information Information and user identity information;
First proof rule module, for according to the type of service of the business request information and the use of the user identity information Family rank determines the first proof rule;
Service propelling matching module, for believing each service propelling in the service identification information and preset service propelling table Breath carries out service propelling matching;
Second proof rule module, for carrying out service propelling to first proof rule according to service propelling matching result Adjustment processing, obtains the second proof rule;
Authentication process module obtains authentication knot for carrying out authentication process according to second proof rule Fruit.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201811532325.9A 2018-12-14 2018-12-14 Identity authentication method, identity authentication device, computer equipment and storage medium Active CN109842611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811532325.9A CN109842611B (en) 2018-12-14 2018-12-14 Identity authentication method, identity authentication device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811532325.9A CN109842611B (en) 2018-12-14 2018-12-14 Identity authentication method, identity authentication device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109842611A true CN109842611A (en) 2019-06-04
CN109842611B CN109842611B (en) 2023-04-18

Family

ID=66883286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811532325.9A Active CN109842611B (en) 2018-12-14 2018-12-14 Identity authentication method, identity authentication device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109842611B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110633642A (en) * 2019-08-14 2019-12-31 深圳市天彦通信股份有限公司 Identity information verification method and device, terminal equipment and storage medium
CN110633560A (en) * 2019-09-20 2019-12-31 重庆洲雄科技有限责任公司 Identity recognition method and device, computer equipment and storage medium
CN110636106A (en) * 2019-08-15 2019-12-31 平安普惠企业管理有限公司 Information pushing method and device, computer equipment and storage medium
CN110647641A (en) * 2019-08-15 2020-01-03 平安科技(深圳)有限公司 Identity authentication method, identity authentication device, computer equipment and storage medium
CN110704823A (en) * 2019-09-10 2020-01-17 平安科技(深圳)有限公司 Data request method, device, storage medium and electronic equipment
CN110909013A (en) * 2019-10-12 2020-03-24 中国平安财产保险股份有限公司 Service list generation method, device, equipment and computer readable storage medium
CN111242576A (en) * 2020-01-10 2020-06-05 中国建设银行股份有限公司 Method and device for processing request
CN111274560A (en) * 2020-01-14 2020-06-12 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN111709035A (en) * 2020-06-12 2020-09-25 北京思特奇信息技术股份有限公司 Business process security verification method and system
CN112989307A (en) * 2021-04-21 2021-06-18 北京金和网络股份有限公司 Service information processing method, device and terminal
CN113542201A (en) * 2020-04-20 2021-10-22 上海云盾信息技术有限公司 Access control method and device for Internet service
CN113537994A (en) * 2021-06-25 2021-10-22 浙江吉利控股集团有限公司 Resource transfer method, device, equipment and medium
CN114006749A (en) * 2021-10-29 2022-02-01 平安银行股份有限公司 Security verification method, device, equipment and storage medium
CN116208953A (en) * 2022-09-07 2023-06-02 北京诚志北分机电技术有限公司 Communication method, system, terminal and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127599A (en) * 2006-08-18 2008-02-20 华为技术有限公司 An identity and right authentication method and system and a biological processing unit
WO2015196908A1 (en) * 2014-06-24 2015-12-30 华为技术有限公司 Service processing method, terminal, server and system
CN106228054A (en) * 2016-08-02 2016-12-14 北京小米移动软件有限公司 Auth method and device
CN106534150A (en) * 2016-11-29 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system, user terminal and website server
WO2017067374A1 (en) * 2015-10-22 2017-04-27 中兴通讯股份有限公司 Message push method and push server
EP3200487A1 (en) * 2014-11-28 2017-08-02 Huawei Technologies Co., Ltd. Message processing method and apparatus
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
CN108134791A (en) * 2017-12-22 2018-06-08 郑州云海信息技术有限公司 A kind of data center's total management system login validation method
CN108650098A (en) * 2018-05-08 2018-10-12 阿里巴巴集团控股有限公司 The method and device of User Defined verification mode
CN108810003A (en) * 2018-06-21 2018-11-13 吉旗(成都)科技有限公司 A kind of safety verification scheme of multi-service side's message access

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127599A (en) * 2006-08-18 2008-02-20 华为技术有限公司 An identity and right authentication method and system and a biological processing unit
WO2015196908A1 (en) * 2014-06-24 2015-12-30 华为技术有限公司 Service processing method, terminal, server and system
EP3200487A1 (en) * 2014-11-28 2017-08-02 Huawei Technologies Co., Ltd. Message processing method and apparatus
WO2017067374A1 (en) * 2015-10-22 2017-04-27 中兴通讯股份有限公司 Message push method and push server
CN106228054A (en) * 2016-08-02 2016-12-14 北京小米移动软件有限公司 Auth method and device
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
CN106534150A (en) * 2016-11-29 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system, user terminal and website server
CN108134791A (en) * 2017-12-22 2018-06-08 郑州云海信息技术有限公司 A kind of data center's total management system login validation method
CN108650098A (en) * 2018-05-08 2018-10-12 阿里巴巴集团控股有限公司 The method and device of User Defined verification mode
CN108810003A (en) * 2018-06-21 2018-11-13 吉旗(成都)科技有限公司 A kind of safety verification scheme of multi-service side's message access

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110633642B (en) * 2019-08-14 2021-11-16 深圳市天彦通信股份有限公司 Identity information verification method and device, terminal equipment and storage medium
CN110633642A (en) * 2019-08-14 2019-12-31 深圳市天彦通信股份有限公司 Identity information verification method and device, terminal equipment and storage medium
CN110636106A (en) * 2019-08-15 2019-12-31 平安普惠企业管理有限公司 Information pushing method and device, computer equipment and storage medium
CN110647641A (en) * 2019-08-15 2020-01-03 平安科技(深圳)有限公司 Identity authentication method, identity authentication device, computer equipment and storage medium
CN110636106B (en) * 2019-08-15 2023-04-07 平安普惠企业管理有限公司 Information pushing method and device, computer equipment and storage medium
CN110704823A (en) * 2019-09-10 2020-01-17 平安科技(深圳)有限公司 Data request method, device, storage medium and electronic equipment
CN110633560A (en) * 2019-09-20 2019-12-31 重庆洲雄科技有限责任公司 Identity recognition method and device, computer equipment and storage medium
CN110909013A (en) * 2019-10-12 2020-03-24 中国平安财产保险股份有限公司 Service list generation method, device, equipment and computer readable storage medium
CN110909013B (en) * 2019-10-12 2023-10-03 中国平安财产保险股份有限公司 Service list generation method, device, equipment and computer readable storage medium
CN111242576A (en) * 2020-01-10 2020-06-05 中国建设银行股份有限公司 Method and device for processing request
CN111274560B (en) * 2020-01-14 2022-11-18 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN111274560A (en) * 2020-01-14 2020-06-12 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN113542201A (en) * 2020-04-20 2021-10-22 上海云盾信息技术有限公司 Access control method and device for Internet service
CN111709035B (en) * 2020-06-12 2022-03-29 北京思特奇信息技术股份有限公司 Business process security verification method and system
CN111709035A (en) * 2020-06-12 2020-09-25 北京思特奇信息技术股份有限公司 Business process security verification method and system
CN112989307A (en) * 2021-04-21 2021-06-18 北京金和网络股份有限公司 Service information processing method, device and terminal
CN113537994A (en) * 2021-06-25 2021-10-22 浙江吉利控股集团有限公司 Resource transfer method, device, equipment and medium
CN114006749A (en) * 2021-10-29 2022-02-01 平安银行股份有限公司 Security verification method, device, equipment and storage medium
CN116208953A (en) * 2022-09-07 2023-06-02 北京诚志北分机电技术有限公司 Communication method, system, terminal and storage medium
CN116208953B (en) * 2022-09-07 2023-08-18 北京诚志北分机电技术有限公司 Communication method, system, terminal and storage medium

Also Published As

Publication number Publication date
CN109842611B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN109842611A (en) Auth method, device, computer equipment and storage medium
ES2875930T3 (en) Identity authentication using specific human biological characteristics collection algorithms
CN103152318B (en) A kind of identity identifying method, device and system thereof
CN108733819A (en) A kind of personnel's archives method for building up and device
JP2004234627A (en) Information-holding device
CN109767240A (en) Cloud customer service distribution method, device, computer equipment and storage medium
US20080148375A1 (en) Authentication system, authentication device, and authentication method
CN109815803B (en) Face examination risk control method and device, computer equipment and storage medium
US8065662B1 (en) Compatibility testing of an application programming interface
CN107256387A (en) Fingerprint verification method, system and computer-readable recording medium
CN111428218A (en) Seal authorization method and device and server
JP2010049357A (en) Authentication device, authentication system, and authentication method
CN109829277A (en) Terminal unlock method, device, computer equipment and storage medium
CN108900536A (en) Authentication method, device, computer equipment and storage medium
CN109547503A (en) Biological feather recognition method
CN110266738A (en) Identification authentication method and device based on multi-biological characteristic
CN110162942A (en) Auth method, device, equipment and storage medium based on timestamp
CN109688121A (en) Resource data acquisition methods, device, computer equipment and storage medium
CN108959884A (en) The testimony of a witness veritifies device and method
KR102168164B1 (en) Matching processing apparatus between user and a/s company based on condition and operating method thereof
CN115208664A (en) Method, device, equipment and storage medium for unified identification of multi-platform users
CN107507288B (en) Rapid attendance checking method and device
CN111538967B (en) Data management platform based on information resource library
CN107273456A (en) A kind of accurate recognition methods of multi dimensional analysis intelligent terminal feature
CN112100604A (en) Terminal equipment information processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant