CN109857766B - User information verification method and device, computer equipment and computer storage medium - Google Patents
User information verification method and device, computer equipment and computer storage medium Download PDFInfo
- Publication number
- CN109857766B CN109857766B CN201811576571.4A CN201811576571A CN109857766B CN 109857766 B CN109857766 B CN 109857766B CN 201811576571 A CN201811576571 A CN 201811576571A CN 109857766 B CN109857766 B CN 109857766B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- financial data
- verification
- financial
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a user information verification method, a device, computer equipment and a computer storage medium, wherein the user information verification method provided by the invention comprises the following steps: acquiring face image information of a user; determining the identity information of the user according to the face image information of the user; acquiring the authentication authority of the identity information, and acquiring the financial data of the user according to the authentication authority; comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result; and when the comparison result is not matched, generating reminding information to remind a manager to process. Therefore, managers of the marriage shop can accurately judge the authenticity of the marriage dating user data.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a user information verification method and device, computer equipment and a computer storage medium.
Background
At present, marriage dating is very common, many marriage shops exist in various places, most users can directly go to the shops to fill in personal data, but because marriage workers cannot judge the authenticity of the user data, certain fraud risk exists, and one member can cheat a plurality of members, so that the safety of the marriage dating is influenced. Therefore, for the marital introduction store, it is difficult for the manager of the marital introduction store to judge whether the user data of the marital dating is real or not.
Disclosure of Invention
In view of the foregoing problems, it is a primary object of the present invention to provide a method, an apparatus, a computer device, and a computer storage medium for verifying user information, which can improve the authenticity of the user information.
In order to achieve the above object, the present invention provides a method for verifying user information, the method comprising:
acquiring face image information of a user;
determining identity information of the user according to the face image information of the user;
acquiring the authentication authority of the identity information, and acquiring the financial data of the user according to the authentication authority;
comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result;
and when the comparison result is not matched, generating reminding information to remind a manager to process.
Preferably, the step of obtaining the authentication right for the identity information and obtaining the financial data of the user according to the authentication right includes:
sending the identity information of the user to a bank server according to the identity information of the user;
receiving an authentication request sent by a bank server, and executing authentication operation on the authentication request according to the authentication authority of the user;
and receiving the financial data of the user after the verification authority passes.
Preferably, the verification authority comprises multiple levels of verification authorities for acquiring different financial data, and the multiple levels of verification authorities correspond to multiple financial data one to one.
Preferably, the step of obtaining the authentication right of the user and obtaining the financial data of the user according to the authentication right includes:
sending a request for checking financial data in a preset time period to a cloud server;
obtaining a verification request sent by the cloud server, and sending the verification authority of the user to the cloud server;
and receiving the financial data sent by the cloud server.
Preferably, the step of obtaining the authentication right of the user and obtaining the financial data of the user according to the authentication right further includes:
acquiring encryption verification information; the encryption authentication information is a password authentication mode set in a bank server for the user history;
responding to the password input by the user according to the encrypted verification information;
sending the password input by the user to a bank server;
and receiving the financial data sent by the bank server within the preset time period of the user.
Preferably, the step of comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result includes:
calculating at least one item of financial data according to the financial data and generating a first ratio value, and calculating at least one item of financial information according to the financial information currently input by the user and generating a second ratio value;
comparing the first proportion value with the second proportion value to generate a comparison result;
when the comparison results are consistent, determining that the financial information of the user is real;
and when the comparison result is inconsistent, determining that the financial information of the user is false.
Preferably, after the step of comparing the first proportion value with the second proportion value to generate the comparison result, the method further includes:
clustering and dividing the comparison result by adopting a clustering algorithm;
determining the grade of the user according to the comparison result of the cluster division; wherein the level of the user corresponds to at least one type of reminding information;
and sending the reminding information corresponding to the user level to a manager to remind the manager to perform corresponding processing according to the user level.
The present invention also provides a user information verification apparatus, including:
the first acquisition module is used for acquiring face image information of a user;
the determining module is used for determining the identity information of the user according to the face image information of the user;
the second acquisition module is used for acquiring the verification authority of the identity information and acquiring the financial data of the user according to the verification authority; (ii) a
The comparison module is used for comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result;
and the reminding module is used for generating reminding information to remind a manager to process when the comparison result is not matched.
The present invention also provides a user information authentication device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the user information authentication method as described above when executing the computer program.
The present invention also provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the user information authentication method as described above.
Obtaining face image information of a user; determining identity information of the user according to the user face image information; acquiring the verification authority of the user, and acquiring financial data of the user according to the verification authority; comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result; and when the comparison result is not matched, generating reminding information to remind a manager to process, so that the manager of the marriage shop can accurately judge the authenticity of the marriage dating user data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
Fig. 1 is a network architecture diagram of a user information verification method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a user information verification method according to an embodiment of the present invention;
FIG. 3 is a schematic flow chart diagram of another embodiment of the present invention;
fig. 4 is a schematic flowchart of step S30 according to the present invention;
FIG. 5 is a block diagram of a user information verification apparatus according to an embodiment of the present invention;
fig. 6 is a structural diagram of a user information verification device according to an embodiment of the present invention.
The implementation, functional features and advantages of the present invention will be further described with reference to the accompanying drawings.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
The terms "first," "second," and "third," etc. in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "comprises" and any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
First, a network architecture to which the scheme of the embodiments of the present application may be applied will be described by way of example with reference to the accompanying drawings.
In an embodiment of the present invention, as shown in fig. 1, the network architecture relates to a user side, a store server and an image capturing device deployed in a wedding store, a bank server storing user financial data, and a cloud server storing user financial data. The user can provide authentication authority and the like for identity information through a specific app installed on the user terminal or access a specific webpage; namely, the store server is a server used by store managers for comparing financial data of users; the image acquisition equipment refers to equipment with an image acquisition function and the like, such as a camera, a mobile phone, a tablet, a computer and the like, and can be used for acquiring face image information of a user; the bank server and the cloud server can be understood as servers for storing financial data of users; the network architecture can send out reminding information to managers of the marriage shops after comparing the financial data of the users.
As shown in fig. 2, the present invention provides a user information verification method, including:
in step S10, the face image information of the user is acquired.
In the embodiment of the invention, the facial image information is obtained by analyzing a plurality of feature points of a human face through a human face recognition technology, the facial image information comprises numerous characteristics of five sense organs of the human face and the like, the human face recognition technology generally needs to extract the five sense organs of the human face, such as the characteristics of a nose, eyes, a chin, a mouth and the like, then calculates the position relation among the characteristics, and takes the geometric characteristics among the five sense organs as important characteristics for recognizing the human face, wherein a manager in a wedding store needs to collect the facial image information of a user through an image collection device firstly, and then uploads the collected facial image information to a store server, so that the identity information of the user can be inquired according to the facial image information of the user.
Step S20, determining the identity information of the user according to the face image information of the user.
In the embodiment of the invention, the identity information can be an identity card number, a residence address, a native place, a working address and the like, after the facial image information of the user is acquired, the facial image information of the user is determined through a face recognition algorithm and uploaded to a store server, then the identity information of the user and the facial image information are correspondingly stored in the store server, and the identity information of the user can be directly acquired through the facial image information in the process of dating of the subsequent user.
And step S30, acquiring the verification authority of the user identity information, and acquiring the financial data of the user according to the verification authority.
In an embodiment of the present invention, the validation authority may be a multi-level validation authority, and is used to obtain different financial data, and the multi-level validation authority corresponds to multiple financial data one to one. The multi-level verification authority can be a first-level verification authority, a second-level verification authority, a third-level verification authority, the first-level verification authority can correspond to deposit data, deposit data can be obtained through the first-level verification authority, the second-level verification authority can correspond to loan data, the loan data can be obtained through the second-level authority, the third-level verification authority can correspond to property data, property data can be obtained through the third-level verification authority, it can be understood that different financial data of users can be obtained through different verification authorities, the financial data can be checked by managers in shops, and meanwhile leakage of property data of the users can be avoided.
The financial data of the user can be financial data of the user in a bank, financial data of WeChat and financial data of a Paibao, the financial data of the user is obtained by obtaining the verification authority of the user, the specific verification authority is generally set according to the user, the obtained verification authority of the user obtains the financial data to be checked by a manager of a store, and therefore the authenticity of user data is determined.
In a specific embodiment of the present invention, the step of obtaining the authentication authority for the user identity information in step S30 and obtaining the financial data of the user according to the authentication authority specifically includes:
step one, according to the identity information of the user, the identity information of the user is sent to a bank server.
In a specific embodiment of the present invention, the server may send the determined user identity information to the bank server, and may respond to the response information sent by the bank server, and it may be understood that, in other embodiments, the identity information may also be sent to the bank server by the user himself.
And step two, receiving the verification request sent by the bank server, and executing verification operation on the verification request according to the verification authority of the user.
In an embodiment of the present invention, the verification request sent by the bank server may be an inquiry request for checking financial data, for example, whether the content of the verification request is "respected user" and whether to inquire deposit data, for example, if the inquiry request inputs a first level of verification right ", the store server responds to the verification request sent by the bank server and performs a verification operation according to the verification right input by the user, for example, the user inputs the first level of verification right, sends the verification right input by the user to the bank server, and performs the verification operation.
Specifically, the multiple levels of authentication permissions may be different authentication manners, for example, the first level of authentication permission may be a password of the user, the password of the user is correspondingly matched with a password pre-stored in a bank server, meanwhile, the second level of authentication permission may be a birthday and a password of the user, the third level of authentication permission may be an identification number and a password, and the identification number and the birthday set by the user are pre-stored in the bank server, and the store server sends the authentication permission input by the user to the bank server for matching so as to implement the authentication operation.
And step three, receiving the financial data of the user after the verification authority passes.
In a specific embodiment of the present invention, after the bank server passes the authentication authority of the user, the store server sends a request for the user to view the financial data within a preset time period to the bank server, and it may be understood that, in some other embodiments, the authentication authority may also be set in a terminal of the user, and a staff member in the store may send a request for viewing the financial data to the terminal of the user through the store server, where the request for viewing the user's WeChat account data, a request for paying treasures account data, a request for online banking account data, and the like are sent to a mobile phone of the user.
And step S40, comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result.
In a specific embodiment of the present invention, when the shop server obtains the financial data of the user, the financial data of the user is compared with the financial information currently input by the user according to the financial information currently input by the user, specifically, the financial information may be property information, loan information, deposit information, right of stock information, and the like, and under the authorization of the user himself, the method may be used to determine whether the financial information currently input by the user is real, so as to know the authenticity of the information provided by the user. For example, the financial information currently input by the user includes a real estate 3, a loan of 100 ten thousand and a right of stock of 20 ten thousand, the financial data of the user includes a real estate 1, a loan of 50 ten thousand and a right of stock of 10 ten thousand, and the comparison result can be obtained by comparing the financial information currently input by the user with the same item in the financial data.
And step S50, when the comparison result is not matched, generating reminding information to remind the manager to process.
In an embodiment of the present invention, after the above-mentioned user financial data is compared with the currently inputted financial information, the obtained comparison result is used to prompt the manager of the wedding store, for example, a user enters identity information and financial information into a store server at a wedding store, by comparing the financial information currently input by the user, the obtained comparison results are inconsistent, identity information and financial information are input into a user through a marriage store, a store server obtains financial data of the user and compares the financial data with the financial information input by the user, if the obtained results are inconsistent, the manager of the wedding store may be prompted to proceed, for example, the manager may decrease the user's credit or add to a blacklist or the like, so that the manager can determine whether the friend-making information of the user is real or not in subsequent work.
As shown in fig. 3, as an alternative implementation, the step S30 includes:
and step 31, sending a request for checking the financial data in the preset time period to the cloud server.
And step 32, acquiring a verification request sent by the cloud server, and sending the verification authority of the user to the cloud server.
And step 33, receiving the financial data sent by the cloud server.
In the specific embodiment of the invention, the cloud server can be preset to store the financial data of the user, the financial data use state of the user can be updated in real time, and the cloud server can be connected with the store server, so that the store server can acquire the financial data of the cloud server; the cloud server can set the verification authority according to the user, financial data of the user can be acquired only after the verification authority of the user passes, identity information, face image information and the like of the user can be set in the cloud server, when the user is registered, the cloud server can update the financial data of the user in real time according to authorization of the user, and when the user arrives at a marriage shop to input personal data, authenticity of the user for inputting the personal data can be judged according to the financial data of the cloud server.
As shown in fig. 4, after the step of obtaining the authentication authority of the user in step S30 and obtaining the financial data of the user according to the authentication authority, the method includes:
step S31, obtaining encryption verification information; the encryption authentication information is a password authentication mode set in a bank server for user history.
Step S32, responding to the password input by the user according to the encrypted authentication information.
Step S33, the password input by the user is sent to the bank server.
And step S34, receiving the financial data in the preset time period of the user sent by the bank server.
In an embodiment of the present invention, the encrypted verification information may be a dynamic verification code input request, a data password input request, and the like, for example, the dynamic verification code is a random verification code sent by the bank server to the mobile phone of the user, the digital password represents a bank account password set by the user, the store server receives the encrypted verification information sent by the bank server after sending a request for checking financial data of the user to the bank server, the store server may obtain a password of the user and send the password to the bank server, and receive financial data sent by the bank server within a preset time period of the user after passing through an encrypted verification mode of the bank server, the password may be a dynamic verification code received by a terminal of the user or a bank account password set by the user, and perform a verification operation corresponding to the encrypted verification information of the bank server, therefore, the financial data of the user in the preset time period can be obtained accurately by verifying the financial data in the preset time period, and the financial data of the user can be obtained accurately within three months.
In other embodiments, the encryption verification information may be obtained from a bank server, may also be encryption verification information sent from a payment apparatus, a WeChat, a cloud server for storing user account data, and the like, and may also be in a form of fingerprint verification, face image verification, voiceprint verification, and the like.
Wherein, the step S40 of comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result includes:
step one, calculating at least one item of financial data according to the financial data and generating a first ratio value, and calculating at least one item of financial information according to the financial information currently input by a user and generating a second ratio value.
And step two, comparing the first proportion value with the second proportion value to generate a comparison result.
And step three, when the comparison results are consistent, determining that the financial information of the user is real.
And step four, when the comparison result is inconsistent, determining that the financial information of the user is false.
In an embodiment of the present invention, the financial data of the user may include deposit data, loan data, property data, etc., and the ratio of each financial data is different, for example, the property data is 10% and the deposit data is 50%; selecting at least one financial data from the financial data of the user to calculate, and generating a first ratio, for example, the deposit data in the bank account data of the user is 100 ten thousand, and calculating in proportion to 500 ten thousand of the total financial data to obtain the first ratio of the deposit data as 20%; the first proportion value can be obtained by calculating the proportion of any financial data to all financial data of the user; it can be understood that at least one financial information is selected from the financial information currently input by the user for calculation, a second ratio value is generated, after the first ratio value and the second ratio value are compared, when the comparison result is consistent, the financial information currently input by the user is determined to be real, when the comparison result is inconsistent, the financial information currently input by the user is determined to be false, and the store server can send reminding information to the manager.
Further, after the step of comparing the first ratio value with the second ratio value to generate a comparison result in the second step, the method further includes:
step 1, clustering division is carried out on the comparison result by adopting a clustering algorithm.
And 3, sending the reminding information corresponding to the user level to a manager to remind the manager to perform corresponding processing according to the user level.
In the specific embodiment of the invention, the financial information currently input by the user and the result of the financial data comparison have various conditions, the store server can perform cluster division on each comparison result, when the comparison results are inconsistent, the comparison results can be clustered and divided into the category of the blacklist, meanwhile, the user can be clustered and divided into the category of the blacklist, and the corresponding reminding information added into the blacklist can be set; when the comparison results are consistent, clustering and dividing the comparison results into categories of a white list, clustering and dividing the user into categories of the white list, and correspondingly sending out a prompt to a manager to improve the credit of dating of the marriage and love of the user; different levels are correspondingly provided with different reminding information, so that managers can perform different processing on users. It is to be understood that the above description is not intended to limit the scope of the present invention, and that the present invention may be modified by those skilled in the art.
As shown in fig. 5, the present invention also provides a user information authentication apparatus 2 including: the device comprises a first obtaining module 21, a determining module 22, a second obtaining module 23, a comparing module 24 and a reminding module 25.
The first obtaining module 21 is configured to obtain face image information of a user.
And the determining module 22 is used for determining the identity information of the user according to the face image information of the user.
And the second obtaining module 23 is configured to obtain a verification right for the identity information, and obtain financial data of the user according to the verification right.
And the comparison module 24 is configured to compare the financial data with the financial information currently input by the user, and generate a corresponding comparison result.
And the reminding module 25 is used for generating reminding information to remind a manager to process when the comparison result is not matched.
It should be noted that the user information verification apparatus 2 provided in the embodiment of the present invention is an apparatus corresponding to the user information verification method, all embodiments of the user information verification method are applicable to the user information verification apparatus 2, and corresponding modules in the embodiments of the user information verification apparatus 2 correspond to steps in the user information verification method and can achieve the same or similar beneficial effects.
As shown in fig. 6, the present invention also provides a user information authentication device, which includes a memory 11, a processor 13, and a computer program 12 stored in the memory 11 and operable on the processor 13, wherein the processor 13 implements the steps of the user information authentication method as described above when executing the computer program 12.
Specifically, in an embodiment of the present invention, the processor 13 implements the following steps when executing the computer program 12: acquiring face image information of a user; determining identity information of the user according to the face image information of the user; acquiring authentication authority of the identity information, and acquiring financial data of a user according to the authentication authority; comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result; and when the comparison result is not matched, generating reminding information to remind a manager to process.
Specifically, in an embodiment of the present invention, the processor 13 executes the computer program 12 to implement the following steps: sending the identity information of the user to a bank server according to the identity information of the user; receiving a verification request sent by a bank server, and executing verification operation on the verification request according to the verification authority of a user; and receiving the financial data of the user after the verification authority passes.
Specifically, in an embodiment of the present invention, the processor 13 executes the computer program 12 to implement the following steps: sending a request for checking financial data in a preset time period to a cloud server; acquiring a verification request sent by a cloud server, and sending the verification authority of a user to the cloud server; and receiving financial data sent by the cloud server.
Specifically, in an embodiment of the present invention, the processor 13 executes the computer program 12 to implement the following steps: acquiring encryption verification information; the encryption authentication information is a password authentication mode which is set in a bank server for user history; responding to the password input by the user according to the encryption verification information; sending the password input by the user to a bank server; and receiving financial data sent by the bank server in a user preset time period.
Specifically, in an embodiment of the present invention, the processor 13 executes the computer program 12 to implement the following steps: calculating at least one item of financial data according to the financial data and generating a first ratio value, and calculating at least one item of financial information according to the current financial information input by the user and generating a second ratio value; comparing the first proportion value with the second proportion value to generate a comparison result; when the comparison results are consistent, determining that the financial information of the user is real; and when the comparison result is inconsistent, determining that the financial information of the user is false.
Specifically, in an embodiment of the present invention, the processor 13 implements the following steps when executing the computer program 12: clustering division is carried out on the comparison result by adopting a clustering algorithm; determining the grade of the user according to the comparison result of the clustering division; wherein, the level of the user corresponds to at least one reminding information; and sending the reminding information corresponding to the user level to a manager to remind the manager to perform corresponding processing according to the user level.
That is, in the embodiment of the present invention, the steps of the user information authentication method described above are implemented when the processor 13 of the user information authentication apparatus 1 executes the computer program 12, so that the manager of the wedding store can accurately judge the authenticity of the wedding dating user profile.
It should be noted that, since the steps of the user information authentication method described above are implemented when the processor 13 of the user information authentication apparatus 1 executes the computer program 12, all embodiments of the user information authentication method described above are applicable to the user information authentication apparatus 1, and can achieve the same or similar beneficial effects.
The present invention also provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the user information authentication method as described above.
In particular, in a particular embodiment of the invention, the computer readable storage medium, when executed by the processor, performs the steps of: acquiring face image information of a user; determining identity information of the user according to the face image information of the user; acquiring authentication authority of the identity information, and acquiring financial data of a user according to the authentication authority; comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result; and when the comparison result is not matched, generating reminding information to remind a manager to process.
In particular, in a particular embodiment of the invention, the computer readable storage medium, when executed by the processor, performs the steps of: according to the identity information of the user, the identity information of the user is sent to a bank server; receiving a verification request sent by a bank server, and executing verification operation on the verification request according to the verification authority of a user; and receiving the financial data of the user after the verification authority passes.
In particular, in a particular embodiment of the invention, the computer readable storage medium, when executed by the processor, performs the steps of: sending a request for checking financial data in a preset time period to a cloud server; acquiring a verification request sent by a cloud server, and sending the verification authority of a user to the cloud server; and receiving financial data sent by the cloud server.
In particular, in a particular embodiment of the invention, the computer readable storage medium, when executed by the processor, performs the steps of: acquiring encryption verification information; the encryption authentication information is a password authentication mode which is set in a bank server for user history; responding to the password input by the user according to the encryption verification information; sending the password input by the user to a bank server; and receiving financial data sent by the bank server within a preset time period of the user.
In particular, in a particular embodiment of the invention, the computer readable storage medium, when executed by the processor, performs the steps of: calculating at least one item of financial data according to the financial data and generating a first ratio value, and calculating at least one item of financial information according to the current financial information input by the user and generating a second ratio value; comparing the first ratio value with the second ratio value to generate a comparison result; when the comparison results are consistent, determining that the financial information of the user is real; and when the comparison result is inconsistent, determining that the financial information of the user is false.
In particular, in a particular embodiment of the invention, the computer readable storage medium, when executed by the processor, performs the steps of: clustering division is carried out on the comparison result by adopting a clustering algorithm; determining the grade of the user according to the comparison result of the clustering division; wherein, the level of the user corresponds to at least one reminding message; and sending the reminding information corresponding to the user level to a manager to remind the manager to perform corresponding processing according to the user level.
That is, in an embodiment of the present invention, the computer program when executed by the processor implements the steps of the user information verification method described above, so that the manager of the wedding store can accurately judge the authenticity of the wedding dating user profile.
It should be noted that, since the steps of the user information verification method are implemented when the computer program is executed by the processor, all embodiments of the user information verification method are applicable to the computer-readable storage medium, and can achieve the same or similar advantages.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention or portions thereof contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes several instructions for enabling a terminal (which may be a smart speaker, a computer, a server, an air conditioner, or a network device, etc.) to execute the methods of the embodiments of the present invention.
In the description of the specification, reference to the description of "one embodiment," "some embodiments," "an example," "a specific example," or "some examples" or the like means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all modifications and equivalents of the present invention, which are made by the contents of the present specification and the accompanying drawings, or directly/indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (6)
1. A method for authenticating user information, the method comprising:
acquiring face image information of a user;
determining identity information of the user according to the face image information of the user;
acquiring the verification authority of the identity information, and acquiring financial data of the user according to the verification authority, wherein the specific verification authority is set according to the user;
comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result;
when the comparison result is not matched, generating reminding information to remind a manager to process;
the step of obtaining the authentication authority for the identity information and obtaining the financial data of the user according to the authentication authority comprises the following steps:
sending the identity information of the user to a bank server according to the identity information of the user;
receiving an authentication request sent by a bank server, and executing authentication operation on the authentication request according to the authentication authority of the user;
receiving financial data of the user after the verification authority passes;
the verification authority comprises multiple levels of verification authorities for acquiring different financial data, and the multiple levels of verification authorities correspond to multiple financial data one to one;
wherein, the step of comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result comprises:
calculating at least one item of financial data according to the financial data and generating a first ratio value, and calculating at least one item of financial information according to the financial information currently input by the user and generating a second ratio value;
comparing the first ratio value with the second ratio value to generate a comparison result;
when the comparison results are consistent, determining that the financial information of the user is real;
when the comparison result is inconsistent, determining that the financial information of the user is false;
after the step of comparing the first ratio value with the second ratio value to generate a comparison result, the method further includes:
clustering and dividing the comparison result by adopting a clustering algorithm;
determining the grade of the user according to the comparison result of the cluster division; wherein the level of the user corresponds to at least one type of reminding information;
and sending the reminding information corresponding to the user level to a manager to remind the manager to perform corresponding processing according to the user level.
2. The method of claim 1, wherein the step of obtaining the user's authentication rights, and obtaining the user's financial data according to the authentication rights, comprises:
sending a request for checking financial data in a preset time period to a cloud server;
obtaining a verification request sent by the cloud server, and sending the verification authority of the user to the cloud server;
and receiving the financial data sent by the cloud server.
3. The method of claim 1, wherein the step of obtaining the user's authentication right and obtaining the user's financial data according to the authentication right further comprises:
acquiring encryption verification information; the encryption authentication information is a password authentication mode set in a bank server for the user history;
responding to the password input by the user according to the encrypted verification information;
sending the password input by the user to a bank server;
and receiving the financial data sent by the bank server within the preset time period of the user.
4. A user information authentication apparatus, comprising:
the first acquisition module is used for acquiring the face image information of a user;
the determining module is used for determining the identity information of the user according to the face image information of the user;
the second acquisition module is used for acquiring the authentication authority of the identity information and acquiring the financial data of the user according to the authentication authority, wherein the specific authentication authority is set according to the user;
the comparison module is used for comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result;
the reminding module is used for generating reminding information to remind a manager to process when the comparison result is unmatched;
in the step of acquiring the authentication right for the identity information and acquiring the financial data of the user according to the authentication right, the second acquiring module is specifically configured to:
sending the identity information of the user to a bank server according to the identity information of the user;
receiving a verification request sent by a bank server, and executing verification operation on the verification request according to the verification authority of the user;
receiving financial data of the user after the verification authority passes;
the verification authority comprises multiple levels of verification authorities for acquiring different financial data, and the multiple levels of verification authorities correspond to various financial data one by one;
wherein, in the aspect of the step of comparing the financial data with the financial information currently input by the user to generate a corresponding comparison result, the comparison module is specifically configured to:
calculating at least one item of financial data according to the financial data and generating a first ratio value, and calculating at least one item of financial information according to the financial information currently input by the user and generating a second ratio value;
comparing the first ratio value with the second ratio value to generate a comparison result;
when the comparison results are consistent, determining that the financial information of the user is real;
when the comparison result is inconsistent, determining that the financial information of the user is false;
wherein, in a later aspect of the step of comparing the first ratio value with the second ratio value to generate a comparison result, the comparison module is further configured to:
clustering and dividing the comparison result by adopting a clustering algorithm;
determining the grade of the user according to the comparison result of the cluster division; wherein the level of the user corresponds to at least one type of reminding information;
and sending the reminding information corresponding to the user level to a manager to remind the manager to perform corresponding processing according to the user level.
5. A computer arrangement comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the user information authentication method according to any one of claims 1 to 3 when executing the computer program.
6. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the user information authentication method according to any one of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811576571.4A CN109857766B (en) | 2018-12-22 | 2018-12-22 | User information verification method and device, computer equipment and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811576571.4A CN109857766B (en) | 2018-12-22 | 2018-12-22 | User information verification method and device, computer equipment and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109857766A CN109857766A (en) | 2019-06-07 |
CN109857766B true CN109857766B (en) | 2022-09-06 |
Family
ID=66891796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811576571.4A Active CN109857766B (en) | 2018-12-22 | 2018-12-22 | User information verification method and device, computer equipment and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109857766B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110704823A (en) * | 2019-09-10 | 2020-01-17 | 平安科技(深圳)有限公司 | Data request method, device, storage medium and electronic equipment |
CN111538482A (en) * | 2020-03-18 | 2020-08-14 | 中国平安人寿保险股份有限公司 | Webpage making method and device, computer equipment and storage medium |
CN112597481A (en) * | 2020-12-29 | 2021-04-02 | 平安银行股份有限公司 | Sensitive data access method and device, computer equipment and storage medium |
CN116664326A (en) * | 2023-08-01 | 2023-08-29 | 北京清众神州大数据有限公司 | Enterprise financial data management method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101833728A (en) * | 2010-04-19 | 2010-09-15 | 杨家水 | Commodity anti-counterfeiting method |
CN103944719A (en) * | 2014-04-02 | 2014-07-23 | 尚清实业(上海)有限公司 | Comprehensive verification system and method for identities and documentary evidences |
CN107330104A (en) * | 2017-07-07 | 2017-11-07 | 国政通科技股份有限公司 | A kind of utilization communication network verifies the method and system of user real identification |
CN108182627A (en) * | 2018-01-19 | 2018-06-19 | 上海锐垚科技有限公司 | A kind of system that user credit assessment is realized according to user behavior |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014094033A1 (en) * | 2012-12-21 | 2014-06-26 | My Verified Id Limited | Computer implemented frameworks and methodologies for enabling identification verification in an online environment |
-
2018
- 2018-12-22 CN CN201811576571.4A patent/CN109857766B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101833728A (en) * | 2010-04-19 | 2010-09-15 | 杨家水 | Commodity anti-counterfeiting method |
CN103944719A (en) * | 2014-04-02 | 2014-07-23 | 尚清实业(上海)有限公司 | Comprehensive verification system and method for identities and documentary evidences |
CN107330104A (en) * | 2017-07-07 | 2017-11-07 | 国政通科技股份有限公司 | A kind of utilization communication network verifies the method and system of user real identification |
CN108182627A (en) * | 2018-01-19 | 2018-06-19 | 上海锐垚科技有限公司 | A kind of system that user credit assessment is realized according to user behavior |
Also Published As
Publication number | Publication date |
---|---|
CN109857766A (en) | 2019-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109857766B (en) | User information verification method and device, computer equipment and computer storage medium | |
US10965668B2 (en) | Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification | |
US20220141218A1 (en) | Systems and methods for smartcard biometric enrollment | |
US10580009B2 (en) | Mobile communications message verification of financial transactions | |
US10600055B2 (en) | Authentication and interaction tracking system and method | |
US10250583B2 (en) | Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score | |
WO2020024398A1 (en) | Biometrics-assisted payment method and apparatus, and computer device and storage medium | |
US9704051B2 (en) | Method and system for verifying identities | |
US20210089635A1 (en) | Biometric identity verification and protection software solution | |
WO2017196609A1 (en) | User authentication and access control using identity services | |
WO2017140190A1 (en) | Method and device for authenticating user identity based on transaction data | |
US20200143377A1 (en) | Systems and methods for user identity authentication | |
US11521208B2 (en) | System and method for authenticating transactions from a mobile device | |
CN111160920A (en) | Method and device for preventing bank card from being embezzled | |
CN108960820A (en) | A kind of real name identification method based on block chain, system and storage medium | |
CN114004639B (en) | Method, device, computer equipment and storage medium for recommending preferential information | |
CN115170257A (en) | Method, system and device for bid evaluation | |
CN117853103A (en) | Payment system activation method based on intelligent bracelet | |
CN111681010A (en) | Transaction verification method and device | |
TWI827086B (en) | Learning model evaluation system, learning model evaluation method and program product | |
CN107615299A (en) | For assessing the method and system of fingerprint template | |
TWI813322B (en) | Learning model creation system, learning model creation method, and program product | |
US20230135488A1 (en) | Systems and methods for user authentication to verify transaction legitimacy | |
CN115907953A (en) | Vehicle lending scheme recommendation method and device, electronic equipment and computer storage medium | |
US11853920B2 (en) | Methods and systems for implementing hierarchy of rule-based security authentication modes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |