CN110166417B - Task execution method and device, computer equipment and storage medium - Google Patents

Task execution method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN110166417B
CN110166417B CN201810866977.XA CN201810866977A CN110166417B CN 110166417 B CN110166417 B CN 110166417B CN 201810866977 A CN201810866977 A CN 201810866977A CN 110166417 B CN110166417 B CN 110166417B
Authority
CN
China
Prior art keywords
session
identity authentication
information
task
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810866977.XA
Other languages
Chinese (zh)
Other versions
CN110166417A (en
Inventor
朱仕达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810866977.XA priority Critical patent/CN110166417B/en
Publication of CN110166417A publication Critical patent/CN110166417A/en
Application granted granted Critical
Publication of CN110166417B publication Critical patent/CN110166417B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The invention relates to a task execution method, a task execution device and computer equipment, wherein the method comprises the following steps: acquiring identity authentication information of a first session user from session information in a session process, wherein the first session user is a session user in the session process; detecting first target session information in session information of a target session user, wherein the first target session information is used for triggering a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user; when the first target session information is detected, if the identity authentication result of the first session user is authentication passing, executing a target task corresponding to the first target session information, wherein the identity authentication result of the first session user is the result of performing identity authentication on the first session user according to the identity authentication information of the first session user. The method is simple to operate, high in operation efficiency and capable of saving terminal resources.

Description

Task execution method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for task execution, a computer device, and a storage medium.
Background
With the rapid development and wide application of network technology, people can perform conversations, such as video chat, in daily life and work through instant messaging applications.
When a conversation is carried out, if a user needs to carry out other tasks, the user needs to click a corresponding key to trigger the task and input password information to carry out verification so as to execute the task. For example, when video chat is performed, if a bank bill needs to be queried, the video chat needs to be closed, then the bill query button is clicked, a password is input for query, and then the video chat is restarted after the query is completed.
Disclosure of Invention
Therefore, it is necessary to provide a task execution method, a device, a computer device, and a storage medium for solving the above problems, where the identity authentication information corresponding to the first session user is obtained from the session information in the session process to perform identity authentication of the first session user, the target task is triggered by the session information of the session user, and the task is executed when the identity authentication result is passed, so that the operation is simple, the operation efficiency is high, and the terminal resources are saved.
A method of task execution, the method comprising: acquiring identity authentication information of a first session user from session information in a session process, wherein the first session user is a session user in the session process, and the identity authentication information of the first session user is used for performing identity authentication on the first session user; detecting first target session information in session information of a target session user, wherein the first target session information is used for triggering a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user; when the first target session information is detected, if the identity authentication result of the first session user is authentication passing, executing a target task corresponding to the first target session information, wherein the identity authentication result of the first session user is the result of performing identity authentication on the first session user according to the identity authentication information of the first session user.
A task execution device, the device comprising: the system comprises a first identity authentication information acquisition module, a second identity authentication information acquisition module and a first identity authentication information acquisition module, wherein the first identity authentication information acquisition module is used for acquiring identity authentication information of a first session user from session information in a session process, the first session user is a session user in the session process, and the identity authentication information of the first session user is used for performing identity authentication on the first session user; the system comprises a first session information detection module, a first task authorization module and a first session information processing module, wherein the first session information detection module is used for detecting first target session information in session information of a target session user, the first target session information is used for triggering a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user; and the first execution module is used for executing the target task corresponding to the first target session information if the identity authentication result of the first session user is authenticated when the first target session information is detected, wherein the identity authentication result of the first session user is the result of performing identity authentication on the first session user according to the identity authentication information of the first session user.
In an embodiment, the apparatus further includes a display module, configured to display, on a current interface when the first target session information is detected, an operation interface corresponding to the target task, where the current interface includes a session interface corresponding to a session or a display interface after the session interface exits.
In one embodiment, the display module is configured to display a task confirmation request interface corresponding to the target task on the current interface; the task execution device also comprises a trigger execution module used for triggering the execution of the target task when receiving the task confirmation instruction input in the task confirmation request interface.
In one embodiment, the apparatus further comprises: the first session identifier acquisition module is used for acquiring a session identifier corresponding to a session, and sending the session identifier and the identity authentication information of the first session user to a server so that the server stores the identity authentication information of the first session user and the session identifier in an associated manner; and the identity authentication sending module is used for sending an identity authentication request to the server when the first target session information is detected, wherein the identity authentication request carries the session identifier, and is used for indicating the server to obtain identity authentication information which is stored in association with the session identifier, and performing identity authentication on the first session user according to the identity authentication information which is stored in association, so as to obtain an identity authentication result of the first session user.
In one embodiment, the apparatus further comprises: the second session identification acquisition module is used for acquiring a session identification corresponding to a session, sending the session identification and the identity authentication information of the first session user to a server, so that the server performs identity authentication on the first session user according to the identity authentication information to obtain an identity authentication result of the first session user, and storing the identity authentication result of the first session user and the session identification in an associated manner; and the task execution request sending module is used for sending a task execution request to the server, wherein the task execution request comprises the session identifier, and the task execution request is used for indicating the server to obtain an identity authentication result stored in association with the session identifier and executing the target task according to the identity authentication result.
In one embodiment, the apparatus further comprises: the task parameter information acquisition module is used for acquiring task parameter information corresponding to the target task from session information in a session process; and the task execution request generation module is used for generating a task execution request corresponding to the target task according to the task parameter information.
In one embodiment, the apparatus further comprises: the second target session information detection module is used for detecting second target session information in the session information of the target session user, wherein the second target session information is used for triggering an associated task corresponding to the target task; and the associated task triggering module is used for triggering the associated task when the second target session information is detected.
In one embodiment, the apparatus further comprises: and the trigger stopping module is used for stopping triggering the non-associated task corresponding to the target task according to the session information in the session when the target task is in the trigger state.
In one embodiment, the first authentication information acquisition module is configured to: acquiring conversation image data and/or conversation audio data corresponding to the first conversation user from conversation information in a conversation process; and extracting the identity characteristic data in the conversation image data and/or the conversation audio data, and taking the identity characteristic data as the identity authentication information corresponding to the first conversation user.
In one embodiment, the apparatus further comprises: a second identity authentication information back module, configured to obtain identity authentication information corresponding to the first target session information, where the identity authentication information corresponding to the first target session information is used to perform identity authentication on a target session user that triggers the target task, and obtain an identity authentication result of the target session user; and the target task triggering module is used for triggering the target task corresponding to the first target session information when the identity authentication result of the target session user is authentication passing.
A computer device comprising a memory and a processor, the memory having stored therein a computer program which, when executed by the processor, causes the processor to carry out the steps of the task execution method described above.
A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, causes the processor to carry out the steps of the task execution method described above.
According to the task execution method, the device, the computer equipment and the storage medium, the identity authentication information corresponding to the first session user is acquired from the session information in the session process to perform the identity authentication of the first session user, the target task is triggered through the session information of the session user, and the task is executed when the identity authentication result is passed, so that the operation is simple, the operation efficiency is high, and the terminal resources are saved.
A method of task execution, the method comprising: receiving a task execution request, wherein a target task corresponding to the task execution request is triggered by first target session information, the first target session information is acquired from session information of a target session user in a session process, and the target session user is a first session user or a task authorization user corresponding to the first session user; acquiring an identity authentication result corresponding to the first session user, wherein the identity authentication result of the first session user is a result of performing identity authentication on the first session user according to identity authentication information of the first session user, and the identity authentication information of the first session user is acquired from session information in a session process; and if the identity authentication result corresponding to the first session user is authentication passing, executing the target task according to the task execution request.
A task execution device, the device comprising: the task execution request receiving module is used for receiving a task execution request, wherein a target task corresponding to the task execution request is triggered by first target session information, the first target session information is session information of a target session user in a session process, and the target session user is a first session user or a task authorization user corresponding to the first session user; an identity authentication result obtaining module, configured to obtain an identity authentication result corresponding to the first session user, where the identity authentication result of the first session user is a result of performing identity authentication on the first session user according to identity authentication information of the first session user, and the identity authentication information of the first session user is obtained from session information in a session process; and the second execution module is used for executing the target task according to the task execution request if the identity authentication result corresponding to the first session user is authentication passing.
In one embodiment, the identity authentication result obtaining module is configured to: receiving a session identifier corresponding to a session and the identity authentication information of the first session user; storing the identity authentication information of the first session user and the session identification in an associated manner; when an identity authentication request is received, extracting the session identifier from the identity authentication request, and acquiring identity authentication information stored in association with the session identifier, wherein the identity authentication request is triggered by the first target session information; and performing identity authentication on the first session user according to the identity authentication information stored in the association manner to obtain an identity authentication result of the first session user.
In one embodiment, the identity authentication result obtaining module includes: receiving a session identifier corresponding to a session and identity authentication information of the first session user, and performing identity authentication according to the identity authentication information of the first session user to obtain an identity authentication result of the first session user; storing the session identification in association with the identity authentication result of the first session user; and when the task execution request is received, extracting the session identifier from the task execution request, and acquiring an identity authentication result stored in association with the session identifier as an identity authentication result corresponding to the first session user.
In one embodiment, the target task is a resource transfer task, and the execution module is configured to: and if the identity authentication result of the first session user and the identity authentication result corresponding to the resource transfer target party session user are authenticated, executing the target task according to the task execution request.
A computer device comprising a memory and a processor, the memory having stored therein a computer program which, when executed by the processor, causes the processor to carry out the steps of the task execution method described above.
A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, causes the processor to carry out the steps of the task execution method described above.
According to the task execution method, the task execution device, the computer equipment and the storage medium, the identity authentication information corresponding to the session user in the session can be acquired to perform the identity authentication of the session user, so that the time for waiting for the user to input the identity authentication information in the target task execution process is reduced, and the target task execution efficiency is improved.
Drawings
FIG. 1 is a diagram of an application environment for a method of task execution provided in one embodiment;
FIG. 2 is a flow diagram of a method for task execution in one embodiment;
FIG. 3A is a schematic diagram of a session interface for conducting a real-time video session, in one embodiment;
FIG. 3B is a diagram illustrating an operation interface corresponding to a target task displayed on a session interface, in accordance with an embodiment;
FIG. 3C is a diagram illustrating an operation interface corresponding to a target task displayed on a session interface, in accordance with an embodiment;
FIG. 4 is a flow diagram of a method for task execution in one embodiment;
FIG. 5 is a flow diagram of a method for task execution in one embodiment;
FIG. 6 is a flow diagram of a method for task execution in one embodiment;
FIG. 7 is a flow diagram of a method for task execution in one embodiment;
FIG. 8 is a flowchart illustrating an embodiment of obtaining an authentication result corresponding to a first session user;
FIG. 9 is a flowchart illustrating an embodiment of obtaining an authentication result corresponding to a first session user;
fig. 10A is a schematic diagram illustrating a task execution method according to an embodiment of the present invention when performing a video chat according to an embodiment of the present invention;
fig. 10B is a schematic diagram illustrating a task execution method according to an embodiment of the present invention when performing video chat according to an embodiment of the present invention;
FIG. 11 is a block diagram showing the construction of a task execution device according to one embodiment;
FIG. 12 is a block diagram showing the construction of a task execution device according to one embodiment;
FIG. 13 is a block diagram showing an internal configuration of a computer device according to one embodiment;
FIG. 14 is a block diagram showing an internal configuration of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another. For example, the first target session information may be referred to as second target session information, and similarly, the second target session information may be referred to as first target session information, without departing from the scope of the present application.
Fig. 1 is a diagram of an application environment of a task execution method provided in an embodiment, as shown in fig. 1, in the application environment, including a first terminal 110, a server 120, and a second terminal 130.
The first terminal 110 is a terminal corresponding to a first session user, the second terminal 130 is a terminal corresponding to a second session user, and the first session user and the second session user can perform a session through the respective corresponding terminals and the server 120. The server 120 may be an instant messaging application server for relaying session information generated when a session is conducted between a first session user and a second session user. During the session, the first terminal 110 obtains the authentication information of the first session user in the session information, and sends the authentication information of the first session user to the server 120. The server 120 performs identity authentication on the first session user in the session, and obtains an identity authentication result of the first session user. The first terminal 110 detects first target session information in the session, and when the first target session information is detected, if the identity authentication result of the first session user is authenticated, executes a target task corresponding to the first target session information,
the server 120 may be an independent physical server, or may be a server cluster formed by a plurality of physical servers, and may be a cloud server providing basic cloud computing services such as a cloud server, a cloud database, a cloud storage, and a CDN. It should be noted that the first terminal 110 and the second terminal 120 may be, but are not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal and the server 120 may be connected through a communication connection manner such as a network, and the invention is not limited herein.
It is to be understood that the above application scenario is only an example, and is not to be construed as a limitation on the task execution method provided by the embodiment of the present invention. For example, in some embodiments, the server that forwards the session information may be different from the server that performs the authentication.
As shown in fig. 2, in an embodiment, a task execution method is provided, and this embodiment is mainly illustrated by applying the method to the first terminal 110 in fig. 1. The method specifically comprises the following steps:
step S202, obtaining the identity authentication information of the first session user from the session information in the session process, wherein the first session user is the session user in the session process, and the identity authentication information of the first session user is used for performing identity authentication on the first session user.
Specifically, a session is an interactive process conducted between at least one member and other members. The session may be a two-party session or a multi-party session such as a group session. The session may be a real-time communication session or an instant communication session. In a real-time communication session, both sessions are kept connected, and may be, for example, a real-time video chat session or a real-time voice chat session. In the instant messaging session, both parties of the session do not keep connection, and for example, a session in which both parties of the session transmit voice information or text information, or the like, may be used. The session information is information of the first session user collected while the session is in progress, for example, the session information may include at least one of voice information and video information uttered by the session user. The first session user may be any session user in the session. The identity authentication information is used for identity authentication, and the type of the obtained identity authentication information can be specifically set according to the needs. The identity authentication information is acquired from the session information in the session process, and the identity authentication information acquisition task is started to acquire the identity authentication information during the session. The number of times of acquiring the identity authentication information may be set as required, for example, the identity authentication information may be acquired once or once every preset time. In order to improve the reliability and security of identity authentication, the number of times of collection may be three.
The identity authentication information may include at least one of facial feature information, voiceprint feature information, facial expression information, and gesture information extracted from the session information. The voiceprint feature may include at least one corresponding feature of frequency, intensity, and sound pressure of the voice information, and the features may be represented by at least one of a change over time and a feature at one or more points in time, and the voiceprint feature may be extracted from the voice session information by acquiring the voice session information of the first session user by the recording device. The face features may include position information of feature points of the face and position relationship information between the feature points. The characteristic points of the human face may be, for example, the mouth corners, the nose, the eyes, and the like. In the conversation process, a conversation image of a first conversation user can be collected through a camera device, and the face feature information of the first conversation user is obtained according to the conversation image detection. The expression information refers to information expressed by the movement of the face or the head, and may be, for example, the number of blinks within a preset time period. Gesture information is information expressed by hand motion. The conversation image of the first conversation user can be collected through the camera device, and at least one of expression information and gesture information is obtained according to the conversation image detection.
In one embodiment, the identity authentication information collection task may be started in a silent manner when the session is entered, or the collection task may be started after a confirmation operation that the user agrees to collect is received. The silence is direct default acquisition, if the user agrees to the acquisition confirmation operation, the prompt information of whether the identity authentication information is acquired in the session process can be output when the user enters the session, and the identity authentication information acquisition task is started after the confirmation operation that the user agrees to the acquisition is received. For example, a face recognition task may be turned on while entering video chat while muting in the background of the first terminal. The face recognition task may collect facial features of the first session user at three random points in time.
In one embodiment, there may be a plurality of session users conducting a session, for example, two users may conduct a video chat with another three users, and when there are a plurality of session users, only one of the session users may be collected with the identity authentication information. Or when a plurality of session users exist, when face identity authentication information is collected, prompt information is sent out to prompt that only one face appears in the video, and the session user corresponding to the collected identity authentication information is taken as the first session user.
In one embodiment, the session may be a video real-time session or a voice real-time session, and acquiring the identity authentication information corresponding to the first session user in the session information includes: in the conversation process, conversation image data and/or conversation audio data corresponding to the first conversation user are/is obtained. And extracting the identity characteristic data in the conversation image data and/or the conversation audio data, and taking the identity characteristic data as the identity authentication information corresponding to the first conversation user.
Specifically, the conversation image data may be acquired by a camera of the terminal, and the conversation audio data may be acquired by a recording device of the terminal. The authentication information of the first session user may include one or more types. For example, only face feature information or fingerprint feature information may be extracted. Or, in the process of the video session, extracting the voiceprint feature information of the first session user from the session audio data collected by the sound recording device and extracting the expression information of the first session user from the session image data collected by the camera, and taking the voiceprint feature information and the expression information of the first session user as the identity authentication information corresponding to the first session user. The respective types of identity data may be one or more. For example, for facial features, one or more of eye features, mouth corner features, and nose features may be included.
Step S204, detecting first target session information in the session information of the target session user, wherein the first target session information is used for triggering a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user.
Specifically, the task authorized user is the user authorized by the first session user and can perform the target task. For example, the first session user may authorize the a-user to transfer money to the first session user's bank account, and then the a-user authorizes the user for the first session user's task when the target task is transfer money. The session information for triggering the task may be preset, and when a session is performed, it is detected whether first target session information for triggering the target task exists in the session. The first target conversation information may be at least one of a voice, a gesture, and an expression uttered by the conversation user. The target task is a task that the user wants to execute, and the target task corresponding to the first target session information may be set as needed, for example, the target task may be a resource transfer task or a resource amount query task. The resource transfer task refers to a process of transferring the resource from a first account to a second account for identifying a corresponding change in the value of the resource, and may be, for example, transferring a transfer to a user in a session. The resource amount query task refers to querying the amount of the resource. Resources of the resource transfer or resource amount query include, but are not limited to, one or more of virtual red packs, electronic coupons, loyalty coupons, points, electronic vouchers, gaming chips, virtual items, and financial products, among others. The target task may be executed in the terminal, or may be executed by the first terminal instructing another terminal or the server. For a target task that has started to execute and is in a suspended state, triggering the target task may be to invoke a process corresponding to the target task. For target tasks that have not yet started, then triggering the target task may be to start starting the target task. When a session is performed, a session information detection task is started, and whether first target session information appears in session information is detected. The session information detection task may be started in a silent manner, or the session information detection task may be started after receiving a confirmation operation that the user agrees to the detection.
The first target session information may also be acquired from the session image data and/or the session audio data, and the session information corresponding to the first target session information may be the same as or different from the session information corresponding to the identity authentication information of the first session user. For example, if voice information "i give you a transfer bar" input by the first session user in the session is collected, voiceprint feature information can be extracted from the "i give you a transfer bar" as identity authentication information of the first session user, and "transfer" in the "i give you a transfer bar" is used as first target session information. The first target session information may be the same type as or different from the first session user's authentication information. For example, the first target session information may be voice information, and the authentication information may be face feature information. Alternatively, the first target session information may be gesture information, and the authentication information may also be gesture information, but the specific gestures are different, for example, the first target session information may be a gesture in a shape of "Z" and the authentication information may be a gesture in a shape of "Y".
Step S206, when the first target session information is detected, if the identity authentication result of the first session user is that the first session user passes the authentication, executing the target task corresponding to the first target session information, where the identity authentication result of the first session user is a result of performing identity authentication on the first session user according to the identity authentication information of the first session user.
Specifically, the step of performing identity authentication may be performed in the current terminal, or may be performed in the server. The identity authentication information of the first session user may be compared with the preset identity authentication information, and if the comparison result is that the identity authentication information acquired in the session matches the preset identity authentication information, the identity authentication is passed. The steps of triggering the target task corresponding to the first target session information and performing identity authentication may be performed synchronously, or the target task is triggered first and then identity authentication is performed, or the identity authentication is performed first and then the task is triggered. The invention is not limited thereto. And the identity authentication result comprises passing authentication and failing authentication, and when the identity authentication result passes the authentication, the target task is executed, otherwise, the target task is not executed. The step of executing the target task may be completely executed in the terminal, or may be executed by other devices. The task execution may include multiple steps, for example, the transfer may include a resource transfer step, a transfer result sending step, a transfer result receiving step, and the like, the server may execute the steps of transferring the resource of the account of the first session user to the receiving account corresponding to the target task and sending the transfer result, and the first terminal may execute the steps of receiving the transfer result and displaying an interface where the transfer is completed, that is, when the identity authentication result of the first session user is authenticated, the first terminal receives the transfer result, and the target task is completed.
For example, the target task is a resource transfer task in which the first session user performs resource transfer to the opposite session user. And when the target task is transfer and the first target session information is 'transfer', if the fact that the session voice of the first session user comprises 'transfer' two characters is detected, displaying a 'transfer' task interface on an interface of the first terminal, sending a task execution request to the server when a confirmation operation aiming at the task interface is received, and if the identity authentication result of the first session user is authentication passing, transferring by the server and displaying a transfer result by the terminal.
In one embodiment, before performing the identity authentication, preset identity authentication information for comparing with the identity authentication information in the session information to perform the identity authentication may be collected in advance, for example, a video recorded in real time by the user may be obtained. In the process of recording the video, the first terminal extracts identity authentication information of the user in real time, such as one or more characteristics of face characteristics and voice characteristics, and sends the identity authentication information to the server for storage. When the video is recorded, the first terminal can output prompt information for indicating a user to carry out preset actions, and the preset actions can be blinking or shaking the head and the like, so that living body detection is carried out, and the identity authentication safety is improved.
In one embodiment, when the identity authentication information is collected for a plurality of times, the identity authentication information passes authentication each time or part of the identity authentication information passes, and the identity authentication result of the first session user is passed.
When the target task is a resource transfer task, the resource account corresponding to the first terminal can be used as a resource transfer-out account, and the resource account corresponding to the second terminal can be used as a resource receiving account. Since people with friends request for money transfer in daily life, many lawbreakers take advantage of the user's unsuspecting mind to commit fraud. If the user wants to make a call or confirm the identity through a video and then transfer accounts, the whole process becomes complicated. The identity authentication information is acquired in the process of video conversation or voice conversation to perform identity authentication, the authenticity is high, the conversation does not need to be interrupted, the transfer task is triggered by utilizing the conversation information, the operation efficiency of a user can be improved, the procedures of interface switching, password confirmation and the like are omitted, and the operation efficiency is improved while the operation safety is considered.
According to the task execution method, the identity authentication information corresponding to the session user is acquired from the session information in the session process to perform the identity authentication of the first session user, and the target task is triggered through the session information of the session user.
In one embodiment, a task execution method includes: and when the first target session information is detected, displaying an operation interface corresponding to the target task on a current interface, wherein the current interface comprises a session interface corresponding to the session or a display interface after exiting the session interface.
Specifically, the operation interface corresponding to the target task is an operation interface that needs to be displayed when the target task is executed or before the target task is executed. For example, the interface may be an interface for confirming whether the target task is executed or not, or an interface for inputting task parameters required for executing the target task. And the operation interface corresponding to the target task is displayed on the current interface. If the first session user just finishes the session when the target task corresponding to the first target session information is triggered, an operation interface corresponding to the target task can be displayed on a display interface after the session interface exits. And if the session is not ended and the current interface is a session interface when the target task corresponding to the first target session information is triggered, displaying an operation interface corresponding to the target task on the session interface.
As shown in fig. 3A, a conversation interface diagram for performing a real-time video conversation is shown, wherein a first conversation user is assumed to be located at the upper right corner, a counterpart conversation user is assumed to be located at the middle of a screen, and an a user is assumed to be located at the middle of the screen. In the process of carrying out the real-time video session, the first terminal detects whether the session information of the first session user contains a transfer keyword, and if the transfer keyword is detected, an operation interface corresponding to a transfer task can be displayed on the session interface. Fig. 3B and fig. 3C are schematic interface diagrams of the first terminal after the target task is triggered. In fig. 3B, an interface for confirming whether the target task is executed is shown on the session interface, and the transfer amount 60 yuan in the interface may be obtained from the session information. In fig. 3C, an interface for inputting task parameters required for executing the target task is shown on the session interface, and the user is required to input the corresponding transfer amount.
In one embodiment, displaying the operation interface corresponding to the target task on the current interface includes: displaying a task confirmation request interface corresponding to the target task on a current interface; the task execution method may further include: and when receiving a task confirmation instruction input in the task confirmation request interface, triggering the execution of the target task.
Specifically, the task confirmation request interface is used to prompt whether to confirm execution of the target task, and the mode of inputting the task confirmation instruction may be set as required. The task confirmation instruction can be input through voice, gesture or clicking operation. Triggering the execution of the target task may be sending a task execution request to the server instructing the server to execute the target task. Of course, the target task may also be performed by the first terminal. For example, if the user clicks the "confirm" control on the task confirmation request interface of FIG. 3B, a transfer request is sent to the server. Or sending a transfer request to the server after receiving the voice message of 'confirmation transfer' sent by the first session user.
In one implementation, if a task confirmation instruction is not received or a task cancellation instruction is received within a preset time, the target task is cancelled, and the preset time can be set as required. For example 30 seconds.
In one embodiment, the task execution method further comprises: and acquiring task parameter information corresponding to the target task from the session information in the session process, and generating a task execution request corresponding to the target task according to the task parameter information.
Specifically, the task parameter information is a parameter required to execute the target task. For the resource transfer task, the task parameter information can be transfer amount or account, etc. For a query balance task, the task parameter information may be an account that needs to be queried. For example, assuming that the first session user sends "I transfer you 60 dollars" in the session, "60 dollars" may be used as the transfer amount. And after the task parameter information is obtained, generating a task execution request according to the task parameter information so as to execute the target task.
In one embodiment, as shown in fig. 4, the task execution method may further include the steps of:
step S402, obtaining a session identifier corresponding to the session, and sending the session identifier and the identity authentication information of the first session user to the server, so that the server stores the identity authentication information of the first session user and the session identifier in an associated manner.
Specifically, the session identifier is used to identify the session, and the session identifier may be generated by the first terminal or generated by the server, and if the session identifier is generated by the server, the session identifier may be sent to the first terminal and the second terminal after the session identifier is generated. The session identifier may be generated according to the session time and the identifier of the session user, and for example, the session time and the identifier of the session user may be hashed by using a hash algorithm to obtain the session identifier. When the identity authentication information is sent, the session identifier is carried, so that the server can store the identity authentication information and the session identifier in a correlation manner.
Step S404, when the first target session information is detected, an identity authentication request is sent to the server, the identity authentication request carries a session identifier, the identity authentication request is used for indicating the server to obtain identity authentication information which is stored in association with the session identifier, and identity authentication is carried out on the first session user according to the identity authentication information which is stored in association, so that an identity authentication result of the first session user is obtained.
Specifically, the identity authentication request is triggered by the first target session information when the first target session information is detected. And the identity authentication request is used for requesting the server to perform identity authentication, namely, performing identity authentication on the target session user corresponding to the target task according to the associated and stored identity authentication information.
In the embodiment of the invention, the identity authentication request is sent when the first target session information is detected, so that the server can not perform authentication firstly when receiving the identity authentication information, and performs authentication after receiving the identity authentication request, thereby avoiding the need of performing identity authentication on each session by the server, and reducing the load of the server.
In one embodiment, as shown in fig. 5, the task execution method may further include the steps of:
step S502, obtaining a session identifier corresponding to the session, sending the session identifier and the identity authentication information of the first session user to the server, so that the server performs identity authentication on the first session user according to the identity authentication information to obtain an identity authentication result of the first session user, and storing the identity authentication result of the first session user in association with the session identifier.
Specifically, the session identifier is used to identify the session, and the session identifier may be generated by the first terminal or generated by the server, and if the session identifier is generated by the server, the session identifier may be sent to the first terminal and the second terminal after the session identifier is generated. The session identifier may be generated according to the session time and the identifier of the session user, and for example, the session time and the identifier of the session user may be hashed by using a hash algorithm to obtain the session identifier. When the identity authentication information is sent, the session identification is carried, the server receives the identity authentication information and then carries out identity authentication to obtain a first identity authentication result, and the identity authentication result and the session identification are stored in an associated mode.
Step S504, a task execution request is sent to the server, the task execution request includes a session identifier, and the task execution request is used for instructing the server to obtain an identity authentication result stored in association with the session identifier, and execute a target task according to the identity authentication result.
Specifically, the task execution request carries a session identifier, the task execution request is used for indicating the server to obtain an identity authentication result stored in association with the session identifier carried in the task execution request after receiving the task execution request, and when the identity authentication result is passed, the target task is executed. And when the identity authentication result is failed, the target task is not executed.
In the embodiment of the invention, because the corresponding session identification is sent when the identity authentication information is sent, the server can carry out authentication firstly when receiving the identity authentication information, and can obtain the authentication result after receiving the task execution request, thereby improving the execution efficiency of the target task.
In an embodiment, the first authentication result is authentication passing, after obtaining the authentication result, the server may send an authenticated notification message to the first terminal, and after receiving the authenticated notification message, the first terminal may detect the authentication information at the current time again, determine whether the detected authentication information at the current time matches the authentication information sent to the server, and if not, obtain new authentication information to perform authentication again. The time for acquiring the identity authentication information at the current time may be set as required, and may be acquired once every preset time interval, for example. The preset time period may be 10 seconds. In the embodiment of the invention, after the identity authentication is successful, whether the identity authentication information detected at the current moment is matched with the identity authentication information sent to the server is judged, and the authentication is carried out again when the identity authentication information is not matched, so that the first session user for identity authentication in the session process can be prevented from leaving, the newly added current user can trigger the target task, and the condition of executing the target task is caused, thereby improving the safety.
In one embodiment, before triggering the target task corresponding to the first target session information, the task execution method may further include: acquiring identity authentication information corresponding to the first target session information, wherein the identity authentication information corresponding to the first target session information is used for performing identity authentication on a target session user triggering a target task to obtain an identity authentication result of the target session user; when the identity authentication result of the target session user is authentication passing, triggering a target task corresponding to the first target session information
Specifically, the identity authentication information corresponding to the first target session information refers to identity authentication information corresponding to a target session user that triggers the target task. For example, when the first target session information is voice information, it may be a voiceprint feature corresponding to the voice information or a face feature of the target session user collected when the first target session information is collected. And after the identity authentication information corresponding to the first target session information is obtained, authenticating the target session user triggering the target task by using the identity authentication information to confirm whether the target user has the authority to trigger the target task, and triggering the target task corresponding to the first target session information when the identity authentication result of the target session user is that the target session user passes the authentication. The step of identity authentication may be performed in the first terminal, or may be performed in the server, and since the result of identity authentication of the target session user is used to determine whether to trigger the target task, the security requirement is lower compared to performing the target task, and therefore, the step of identity authentication may be performed in the first terminal. In the embodiment of the invention, if a plurality of session users are available, the identity authentication result of the first session user is obtained before the target task is triggered, and when the identity authentication result of the first session user is obtained, if any session user can trigger the target task, the target task can be triggered and executed at will, therefore, when the first target session information is received, the target session user triggering the target task can be authenticated to confirm whether the target session user outputting the first target session information has the authority to trigger the target task, and when the identity authentication result of the target session user is authenticated, the target task corresponding to the first target session information is triggered, so that the safety can be improved.
In one embodiment, as shown in fig. 6, the task execution method may further include:
step S602, detecting second target session information in the session information of the target session user, where the second target session information is used to trigger an associated task corresponding to the target task.
Specifically, the associated task is a task associated with the target task. The associated task may be a subtask of the target task or a task that has a connection with the target task. A subtask is a task that is necessary to complete a target task. The target task is a collection of individual subtasks. For example, for the transfer task, the task of inputting the transfer amount is a subtask of the transfer task. And the task of inquiring the balance is a task in connection with the transfer task. After the target task is triggered, whether second target session information triggering the associated task exists in the session can be detected. The second target session information triggering the associated task may be set as needed. The second target conversation information may be one or more of a voice, a gesture, and an expression uttered by the conversation user.
Step S604, when the second target session information is detected, an association task is triggered.
Specifically, when the second target session information is detected, the corresponding associated task is acquired, and the associated task is triggered. For example, if session information of 'I inquire balance' is detected in the transfer process, a task of inquiring the balance is triggered to inquire the balance. If "transfer 200 is detected during the transfer," 200 is "is detected, the transfer amount may be filled in at the transfer amount filling position on the transfer interface as" 200 ".
In one embodiment, after triggering the target task corresponding to the first target session information, the method further includes: and when the target task is in a triggering state, stopping triggering the non-associated task corresponding to the target task according to the session information in the session.
Specifically, the triggered state refers to that the target task is in a triggered state, and the non-associated task refers to that the task is not a task associated with the target task. If the target task is in the trigger state, if the session information triggering the non-associated task is received in the session process, the corresponding non-associated task is not triggered according to the session information. Therefore, the situation that tasks which are not related to the target task are triggered and the task execution is disordered can be avoided. For example, if the target task is a transfer task, at this time, if the session information of "call charge check" appears in the session information, the task corresponding to the session information of "call charge check" is a call charge inquiry task and is not the associated task of the target task, the call charge inquiry task is not triggered.
In one embodiment, as shown in fig. 7, in one embodiment, a task execution method is provided, and this embodiment is mainly illustrated by applying this method to the server 120 in fig. 1. The method specifically comprises the following steps:
step S702, receiving a task execution request, wherein a target task corresponding to the task execution request is triggered by first target session information, the first target session information is obtained from session information of a target session user in a session process, and the target session user is the first session user or a task authorization user corresponding to the first session user.
Specifically, the task execution request is for requesting execution of the target task. When the target task needs to be executed, the first terminal may send a task execution request to the server, and the server receives the task execution request. The task execution request carries parameters for executing the target task.
Step S704, obtaining an identity authentication result corresponding to the first session user, where the identity authentication result of the first session user is a result of performing identity authentication on the first session user according to the identity authentication information of the first session user, and the identity authentication information of the first session user is obtained from the session information in the session process.
Specifically, the identity authentication result corresponding to the first session user is obtained by authenticating the identity authentication information sent by the first terminal sending the task execution request, and the identity authentication result corresponding to the first session user may be obtained by performing identity authentication on the first session user according to the identity authentication information of the first session user before the task execution request is received, or obtained by performing identity authentication on the first session user according to the identity authentication information of the first session user after the task execution request is received.
Step S706, if the identity authentication result corresponding to the first session user is authentication pass, executing the target task according to the task execution request.
Specifically, if the first authentication result is authentication pass, the target task may be performed. For example, the task of querying the call charges is performed. Otherwise, the target task is not executed.
In one embodiment, the target task is a resource transfer task, and the session users include an initiator session user initiating a resource transfer task execution request and a resource transfer target session user. The first session is used as an initiator session user, and the resource transfer target session user refers to a user receiving resources. And when the identity authentication results corresponding to the initiator session user and the resource transfer target session user are authenticated, executing the target task according to the task execution request. That is, when the identity authentication results corresponding to the session user of the initiator and the session user of the resource transfer target are passed, the first identity authentication result is passed. For example, when transferring money, the server may obtain authentication information collected by a terminal that initiated the transfer task, and authentication information collected by a terminal that received the amount of money. Only when the identity authentication results of the transfer parties are passed, the first identity authentication result is passed authentication.
According to the task execution method, the identity authentication information corresponding to the session user in the session can be acquired to perform the identity authentication of the session user, so that the time for waiting for the user to input the identity authentication information in the target task execution process is reduced, and the target task execution efficiency is improved.
In one implementation, as shown in fig. 8, the step S704 of obtaining an authentication result corresponding to the first session user includes:
step S802, receiving a session identifier corresponding to the session and the identity authentication information of the first session user.
Specifically, the session identifier is used to identify the session, and the session identifier may be generated by the terminal or generated by the server, and if the session identifier is generated by the server, the session identifier may be sent to the first terminal and the second terminal after the session identifier is generated. When the terminal sends the identity authentication information, the terminal carries a session identifier, and the server receives the identity authentication information and the session identifier.
Step S804, storing the identity authentication information and the corresponding session identifier in an associated manner.
Specifically, after receiving the identity authentication information and the corresponding session identifier, the server stores the identity authentication information and the session identifier in an associated manner.
Step S806, when receiving the identity authentication request, extracting the session identifier from the identity authentication request, and obtaining the identity authentication information stored in association with the session identifier, where the identity authentication request is triggered by the first target session information.
Step S808, performing identity authentication on the first session user according to the identity authentication information stored in association to obtain an identity authentication result of the first session user.
Specifically, the identity authentication request carries a session identifier, and after receiving the identity authentication request, the server extracts the session identifier from the identity authentication request, and obtains identity authentication information stored in association with the session identifier to perform identity authentication, so as to obtain an identity authentication result of the first session user.
In the embodiment of the invention, the server is associated with the session identifier for storage when receiving the identity authentication information, and authentication is carried out after receiving the identity authentication request, so that the load of the server can be reduced.
In one implementation, as shown in fig. 9, the step S704 of obtaining the identity authentication result corresponding to the first session user includes:
step S902, receiving a session identifier corresponding to the session and the identity authentication information of the first session user, and performing identity authentication according to the identity authentication information of the first session user to obtain an identity authentication result of the first session user.
Specifically, the identity authentication information may be received at one time, or may be received in multiple times. If the number of times is multiple, the identity authentication can be carried out once when the identity authentication information is received once, and then the first identity authentication result is obtained by combining the identity authentication results for multiple times.
Step S904, the session identifier is stored in association with the authentication result of the first session user.
Specifically, the session identifier is used to identify the session, and the session identifier may be generated by the terminal or generated by the server, and if the session identifier is generated by the server, the session identifier may be sent to the first terminal and the second terminal after the session identifier is generated. The session identifier may be generated according to the session time and the identifier of the session user, and for example, the session time and the identifier of the session user may be hashed by using a hash algorithm to obtain the session identifier. And after receiving the identity authentication information, the server performs identity authentication to obtain an identity authentication result of the first session user, and stores the identity authentication result in association with the session identifier.
Step S906, when receiving the task execution request, extracts the session identifier from the task execution request, and obtains the identity authentication result stored in association with the session identifier as the identity authentication result corresponding to the first session user.
Specifically, the task execution request carries a session identifier, the server obtains a first identity authentication result stored in association with the session identifier carried in the task execution request after receiving the task execution request, and when the identity authentication result corresponding to the first session user is pass, the target task is executed. And when the identity authentication result corresponding to the first session user is failed, the target task is not executed.
In the embodiment of the invention, the server can perform authentication first when receiving the identity authentication information, and can acquire the first authentication result without performing authentication again when receiving the task execution request, so that the execution efficiency of the target task can be improved.
As shown in fig. 10A and 1OB, the following description will be made on the method provided by the embodiment of the present invention, assuming that a user is performing a video chat and needs to initiate a transfer task.
1. When user a wishes to conduct a video chat with user B, a video chat request is initiated, user B receives the video chat request, user a begins a video session with user B, and the boxes with arrows in fig. 10A indicate that a video chat is in progress.
2. During conversation, as shown in B1 of fig. 10A, the terminal corresponding to the user a generates a video token, i.e. generates a conversation identifier, and as shown in B2 of fig. 10A, the first terminal starts the face recognition task in a silent manner, and collects the face features of the first conversation user at three random time points. After the token and the face features are obtained, the first terminal sends the token and the face features to a background together, namely to a server.
3. When a video session is carried out, the first terminal is silent to start a voice monitoring task (C1 in fig. 10A), and whether preset task keywords such as "transfer" or "balance" exist in the voice information of the first session user is detected. If the voice information of the first session user is detected to contain two words, "transfer", the transfer task is triggered.
4. After the transfer task is triggered, as shown by C2 in fig. 10B, a box with an arrow indicates that a task confirmation request interface is displayed on the terminal.
5. When receiving a task confirmation instruction, the first terminal generates a task request, wherein the task request carries a video token and task parameters such as a transfer amount, an account number and the like.
6. As shown at D1 in fig. 10B, the first terminal sends the task request to the background, i.e., the server.
7. As shown in D2 in fig. 10B, after receiving the task request, the background performs face recognition to obtain a first authentication result, and if the first authentication result is positive, the transfer task is executed.
8. After the transfer task is triggered or the task request is sent, the transfer task is in a triggered state, as shown at C3 in fig. 10B, and the box with the arrow indicates that the transfer task is in a triggered state.
9. When the transfer task is in the triggered state, as shown in C4 in fig. 10B, the first terminal may continue to detect voice information in the session, trigger an associated task corresponding to the transfer task if the voice information triggering the associated task is detected, and not trigger an unassociated task corresponding to the target task according to the voice information if the voice information triggering the unassociated task corresponding to the transfer task is detected.
10. If the notification of the transfer end is received or the preset waiting time of the transfer task is exceeded, the first terminal can quit the transfer task and continuously detect whether the voice information triggering the task exists in the session.
As shown in fig. 11, in an embodiment, a task execution device is provided, which may be integrated in the first terminal 110, and specifically may include a first identity authentication information obtaining module 1102, a first session information detecting module 1104, and a first executing module 1106.
The first identity authentication information obtaining module 1102 is configured to obtain identity authentication information of a first session user from session information in a session process, where the first session user is a session user in the session process, and the identity authentication information of the first session user is used to perform identity authentication on the first session user.
The first session information detection module 1104 is configured to detect first target session information in session information of a target session user, where the first target session information is used to trigger a corresponding target task, and the target session user is the first session user or a task authorized user corresponding to the first session user;
the first executing module 1106 is configured to, when the first target session information is detected, execute the target task corresponding to the first target session information if the authentication result of the first session user is that the authentication is passed, where the authentication result of the first session user is a result of performing identity authentication on the first session user according to the identity authentication information of the first session user.
In an embodiment, the task execution device further includes a display module, configured to display, on a current interface when the first target session information is detected, an operation interface corresponding to the target task, where the current interface includes a session interface corresponding to the session or a display interface after exiting the session interface.
In one embodiment, the display module is used for displaying a task confirmation request interface corresponding to a target task on a current interface; the task execution device also comprises a trigger execution module used for triggering the execution of the target task when receiving the task confirmation instruction input in the task confirmation request interface.
In one embodiment, the task performing apparatus further includes:
the first session identifier acquisition module is used for acquiring a session identifier corresponding to a session, and sending the session identifier and the identity authentication information of the first session user to the server so that the server stores the identity authentication information of the first session user and the session identifier in an associated manner;
and the identity authentication sending module is used for sending an identity authentication request to the server when the first target session information is detected, wherein the identity authentication request carries the session identifier, and the identity authentication request is used for indicating the server to acquire the identity authentication information stored in association with the session identifier and carrying out identity authentication on the first session user according to the associated stored identity authentication information to obtain an identity authentication result of the first session user.
In one embodiment, the task performing apparatus further includes:
the second session identification acquisition module is used for acquiring a session identification corresponding to the session, sending the session identification and the identity authentication information of the first session user to the server, so that the server performs identity authentication on the first session user according to the identity authentication information to obtain an identity authentication result of the first session user, and storing the identity authentication result of the first session user in association with the session identification;
and the task execution request sending module is used for sending a task execution request to the server, wherein the task execution request comprises a session identifier, and the task execution request is used for indicating the server to obtain an identity authentication result stored in association with the session identifier and executing a target task according to the identity authentication result.
In one embodiment, the task performing apparatus further includes:
the task parameter information acquisition module is used for acquiring task parameter information corresponding to the target task from the session information in the session process;
and the task execution request generation module is used for generating a task execution request corresponding to the target task according to the task parameter information.
In one embodiment, the task performing apparatus further includes:
the second target session information detection module is used for detecting second target session information in the session information of the target session user, and the second target session information is used for triggering an associated task corresponding to the target task;
and the associated task triggering module is used for triggering the associated task when the second target session information is detected.
In one embodiment, the task performing apparatus further includes: and the trigger stopping module is used for stopping triggering the non-associated task corresponding to the target task according to the session information in the session when the target task is in the trigger state.
In one embodiment, the first authentication information acquisition module is configured to: acquiring conversation image data and/or conversation audio data corresponding to a first conversation user from conversation information in a conversation process;
and extracting the identity characteristic data in the conversation image data and/or the conversation audio data, and taking the identity characteristic data as the identity authentication information corresponding to the first conversation user.
In one embodiment, the task performing apparatus further includes:
the second identity authentication information back module is used for acquiring identity authentication information corresponding to the first target session information, and the identity authentication information corresponding to the first target session information is used for performing identity authentication on a target session user triggering a target task to obtain an identity authentication result of the target session user;
and the target task triggering module is used for triggering the target task corresponding to the first target session information when the identity authentication result of the target session user is authentication passing.
As shown in fig. 12, in an embodiment, a task execution device is provided, which may be integrated in the first server 120, and specifically may include a task execution request receiving module 1202, an identity authentication result obtaining module 1204, and a second execution module 1206.
A task execution request receiving module 1202, configured to receive a task execution request, where a target task corresponding to the task execution request is triggered by first target session information, the first target session information is session information of a target session user in a session process, and the target session user is the first session user or a task authorization user corresponding to the first session user;
an identity authentication result obtaining module 1204, configured to obtain an identity authentication result corresponding to the first session user, where the identity authentication result of the first session user is a result of performing identity authentication on the first session user according to identity authentication information of the first session user, and the identity authentication information of the first session user is obtained from session information in a session process;
the second executing module 1206 is configured to execute the target task according to the task execution request if the identity authentication result corresponding to the first session user is authenticated.
In one embodiment, the identity authentication result obtaining module 1204 is configured to: receiving a session identifier corresponding to the session and identity authentication information of the first session user, and performing identity authentication according to the identity authentication information of the first session user to obtain an identity authentication result of the first session user; storing the session identification and the identity authentication result of the first session user in an associated manner; when a task execution request is received, extracting a session identifier from the task execution request, and acquiring an identity authentication result which is stored in association with the session identifier as an identity authentication result corresponding to a first session user.
In one embodiment, the identity authentication result obtaining module 1204 is configured to: receiving a session identifier corresponding to a session and identity authentication information of a first session user; storing the identity authentication information of the first session user and the session identifier in an associated manner; when an identity authentication request is received, extracting a session identifier from the identity authentication request, and acquiring identity authentication information stored in association with the session identifier, wherein the identity authentication request is triggered through first target session information; and performing identity authentication on the first session user according to the identity authentication information stored in association to obtain an identity authentication result of the first session user.
In one embodiment, the target task is a resource transfer task, and the session users include an initiator session user initiating a resource transfer task execution request and a resource transfer target session user.
FIG. 13 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be the first terminal 110 in fig. 1. As shown in fig. 13, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the task execution method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a method of task execution. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
FIG. 14 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be the server 120 in fig. 1. As shown in fig. 14, the computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the task execution method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a method of task execution.
It will be appreciated by those skilled in the art that the configurations shown in fig. 13 and 14 are block diagrams of only some of the configurations relevant to the present disclosure, and do not constitute a limitation on the computing devices to which the present disclosure may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the task execution device provided in the present application may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in fig. 13. The memory of the computer device may store various program modules constituting the task performing apparatus, such as a first authentication information obtaining module 1102, a first session information detecting module 1104 and a first executing module 1106 shown in fig. 11. The computer program constituted by the respective program modules causes the processor to execute the steps in the task execution method of the respective embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 13 may obtain, through the first authentication information obtaining module 1102 in the task performing apparatus shown in fig. 11, the authentication information of the first session user from the session information in the session process, where the first session user is a session user in the session process, and the authentication information of the first session user is used for authenticating the first session user. Detecting first target session information in session information of a target session user through a first session information detection module 1104, where the first target session information is used to trigger a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user; when the first target session information is detected by the first executing module 1106, if the identity authentication result of the first session user is authenticated, the target task corresponding to the first target session information is executed, and the identity authentication result of the first session user is the result of performing identity authentication on the first session user according to the identity authentication information of the first session user.
In one embodiment, the task execution device provided in the present application may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in fig. 14. The memory of the computer device may store various program modules constituting the task execution apparatus, such as a task execution request receiving module 1202, an identity authentication result obtaining module 1204, and a second execution module 1206 shown in fig. 12. The computer program constituted by the respective program modules causes the processor to execute the steps in the task execution method of the respective embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 14 may receive a task execution request through the task execution request receiving module 1202 in the task execution apparatus shown in fig. 12, where a target task corresponding to the task execution request is triggered by first target session information, the first target session information is session information of a target session user in a session process, and the target session user is the first session user or a task authorized user corresponding to the first session user; an identity authentication result corresponding to the first session user is obtained through the identity authentication result obtaining module 1204, where the identity authentication result of the first session user is a result of performing identity authentication on the first session user according to identity authentication information of the first session user, and the identity authentication information of the first session user is obtained from session information in a session process; and executing the target task according to the task execution request by the second execution module 1206 if the identity authentication result corresponding to the first session user is authentication pass.
In one embodiment, a computer device is proposed, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: acquiring identity authentication information of a first session user from session information in a session process, wherein the first session user is a session user in the session process, and the identity authentication information of the first session user is used for performing identity authentication on the first session user; detecting first target session information in session information of a target session user, wherein the first target session information is used for triggering a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user; when the first target session information is detected, if the identity authentication result of the first session user is authentication passing, executing a target task corresponding to the first target session information, wherein the identity authentication result of the first session user is the result of performing identity authentication on the first session user according to the identity authentication information of the first session user.
In one embodiment, the computer program further causes the processor to perform the steps of: and when the first target session information is detected, displaying an operation interface corresponding to the target task on a current interface, wherein the current interface comprises a session interface corresponding to the session or a display interface after exiting the session interface.
In one embodiment, the displaying, by the processor, an operation interface corresponding to the target task on the current interface includes: displaying a task confirmation request interface corresponding to the target task on a current interface; the computer program further causes the processor to perform the steps of: and when receiving a task confirmation instruction input in the task confirmation request interface, triggering the execution of the target task.
In one embodiment, the computer program further causes the processor to perform the steps of: acquiring a session identifier corresponding to a session, and sending the session identifier and the identity authentication information of the first session user to a server so that the server stores the identity authentication information of the first session user and the session identifier in an associated manner; when the first target session information is detected, an identity authentication request is sent to the server, the identity authentication request carries a session identifier, the identity authentication request is used for indicating the server to acquire identity authentication information stored in association with the session identifier, and identity authentication is performed on the first session user according to the identity authentication information stored in association, so that an identity authentication result of the first session user is obtained.
In one embodiment, the computer program further causes the processor to perform the steps of: acquiring a session identifier corresponding to a session, sending the session identifier and identity authentication information of a first session user to a server, so that the server performs identity authentication on the first session user according to the identity authentication information to obtain an identity authentication result of the first session user, and storing the identity authentication result of the first session user in association with the session identifier; and sending a task execution request to the server, wherein the task execution request comprises a session identifier, and the task execution request is used for indicating the server to acquire an identity authentication result stored in association with the session identifier and execute the target task according to the identity authentication result.
In one embodiment, the computer program further causes the processor to perform the steps of: acquiring task parameter information corresponding to a target task from session information in a session process; and generating a task execution request corresponding to the target task according to the task parameter information.
In one embodiment, the computer program further causes the processor to perform the steps of: detecting second target session information in the session information of the target session user, wherein the second target session information is used for triggering a related task corresponding to the target task; and triggering the association task when the second target session information is detected.
In one embodiment, the computer program further causes the processor to perform the steps of: and when the target task is in a triggering state, stopping triggering the non-associated task corresponding to the target task according to the session information in the session.
In one embodiment, the obtaining, by the processor, the identity authentication information of the first session user from the session information in the session process includes: acquiring conversation image data and/or conversation audio data corresponding to a first conversation user from conversation information in a conversation process; and extracting the identity characteristic data in the conversation image data and/or the conversation audio data, and taking the identity characteristic data as the identity authentication information corresponding to the first conversation user.
In one embodiment, the computer program further causes the processor to perform the steps of: acquiring identity authentication information corresponding to the first target session information, wherein the identity authentication information corresponding to the first target session information is used for performing identity authentication on a target session user triggering a target task to obtain an identity authentication result of the target session user; and when the identity authentication result of the target session user is authentication passing, triggering the target task corresponding to the first target session information.
In one embodiment, a computer device is proposed, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: receiving a task execution request, wherein a target task corresponding to the task execution request is triggered by first target session information, the first target session information is acquired from session information of a target session user in a session process, and the target session user is a first session user or a task authorization user corresponding to the first session user; acquiring an identity authentication result corresponding to a first session user, wherein the identity authentication result of the first session user is a result of performing identity authentication on the first session user according to identity authentication information of the first session user, and the identity authentication information of the first session user is acquired from session information in a session process; and if the identity authentication result corresponding to the first session user is authentication passing, executing the target task according to the task execution request.
In one embodiment, the obtaining, by the processor, an identity authentication result corresponding to the first session user includes: receiving a session identifier corresponding to a session and identity authentication information of a first session user; storing the identity authentication information of the first session user and the session identifier in an associated manner; when an identity authentication request is received, extracting a session identifier from the identity authentication request, and acquiring identity authentication information stored in association with the session identifier, wherein the identity authentication request is triggered through first target session information; and performing identity authentication on the first session user according to the identity authentication information stored in association to obtain an identity authentication result of the first session user.
In one embodiment, the obtaining, by the processor, an identity authentication result corresponding to the first session user includes: receiving a session identifier corresponding to the session and identity authentication information of the first session user, and performing identity authentication according to the identity authentication information of the first session user to obtain an identity authentication result of the first session user; storing the session identification and the identity authentication result of the first session user in an associated manner; when a task execution request is received, extracting a session identifier from the task execution request, and acquiring an identity authentication result which is stored in association with the session identifier as an identity authentication result corresponding to a first session user.
In one embodiment, the target task is a resource transfer task, and if the identity authentication result corresponding to the first session user executed by the processor is authenticated, executing the target task according to the task execution request includes: and if the identity authentication result of the first session user and the identity authentication result corresponding to the resource transfer target party session user pass the authentication, executing the target task according to the task execution request.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which, when executed by a processor, causes the processor to perform the steps of: acquiring identity authentication information of a first session user from session information in a session process, wherein the first session user is a session user in the session process, and the identity authentication information of the first session user is used for performing identity authentication on the first session user; detecting first target session information in session information of a target session user, wherein the first target session information is used for triggering a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user; when the first target session information is detected, if the identity authentication result of the first session user is authentication passing, executing a target task corresponding to the first target session information, wherein the identity authentication result of the first session user is the result of performing identity authentication on the first session user according to the identity authentication information of the first session user.
In one embodiment, the computer program further causes the processor to perform the steps of: and when the first target session information is detected, displaying an operation interface corresponding to the target task on a current interface, wherein the current interface comprises a session interface corresponding to the session or a display interface after exiting the session interface.
In one embodiment, the displaying, by the processor, an operation interface corresponding to the target task on the current interface includes: displaying a task confirmation request interface corresponding to the target task on a current interface; the computer program further causes the processor to perform the steps of: and when receiving a task confirmation instruction input in the task confirmation request interface, triggering the execution of the target task.
In one embodiment, the computer program further causes the processor to perform the steps of: acquiring a session identifier corresponding to a session, and sending the session identifier and the identity authentication information of the first session user to a server so that the server stores the identity authentication information of the first session user and the session identifier in an associated manner; when the first target session information is detected, an identity authentication request is sent to the server, the identity authentication request carries a session identifier, the identity authentication request is used for indicating the server to acquire identity authentication information stored in association with the session identifier, and identity authentication is performed on the first session user according to the identity authentication information stored in association, so that an identity authentication result of the first session user is obtained.
In one embodiment, the computer program further causes the processor to perform the steps of: acquiring a session identifier corresponding to a session, sending the session identifier and identity authentication information of a first session user to a server, so that the server performs identity authentication on the first session user according to the identity authentication information to obtain an identity authentication result of the first session user, and storing the identity authentication result of the first session user in association with the session identifier; and sending a task execution request to the server, wherein the task execution request comprises a session identifier, and the task execution request is used for indicating the server to acquire an identity authentication result stored in association with the session identifier and execute the target task according to the identity authentication result.
In one embodiment, the computer program further causes the processor to perform the steps of: acquiring task parameter information corresponding to a target task from session information in a session process; and generating a task execution request corresponding to the target task according to the task parameter information.
In one embodiment, the computer program further causes the processor to perform the steps of: detecting second target session information in the session information of the target session user, wherein the second target session information is used for triggering a related task corresponding to the target task; and triggering the association task when the second target session information is detected.
In one embodiment, the computer program further causes the processor to perform the steps of: and when the target task is in a triggering state, stopping triggering the non-associated task corresponding to the target task according to the session information in the session.
In one embodiment, the obtaining, by the processor, the identity authentication information of the first session user from the session information in the session process includes: acquiring conversation image data and/or conversation audio data corresponding to a first conversation user from conversation information in a conversation process; and extracting the identity characteristic data in the conversation image data and/or the conversation audio data, and taking the identity characteristic data as the identity authentication information corresponding to the first conversation user.
In one embodiment, the computer program further causes the processor to perform the steps of: acquiring identity authentication information corresponding to the first target session information, wherein the identity authentication information corresponding to the first target session information is used for performing identity authentication on a target session user triggering a target task to obtain an identity authentication result of the target session user; and when the identity authentication result of the target session user is authentication passing, triggering the target task corresponding to the first target session information.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which, when executed by a processor, causes the processor to perform the steps of: receiving a task execution request, wherein a target task corresponding to the task execution request is triggered by first target session information, the first target session information is acquired from session information of a target session user in a session process, and the target session user is a first session user or a task authorization user corresponding to the first session user; acquiring an identity authentication result corresponding to a first session user, wherein the identity authentication result of the first session user is a result of performing identity authentication on the first session user according to identity authentication information of the first session user, and the identity authentication information of the first session user is acquired from session information in a session process; and if the identity authentication result corresponding to the first session user is authentication passing, executing the target task according to the task execution request.
In one embodiment, the obtaining, by the processor, an identity authentication result corresponding to the first session user includes: receiving a session identifier corresponding to a session and identity authentication information of a first session user; storing the identity authentication information of the first session user and the session identifier in an associated manner; when an identity authentication request is received, extracting a session identifier from the identity authentication request, and acquiring identity authentication information stored in association with the session identifier, wherein the identity authentication request is triggered through first target session information; and performing identity authentication on the first session user according to the identity authentication information stored in association to obtain an identity authentication result of the first session user.
In one embodiment, the obtaining, by the processor, an identity authentication result corresponding to the first session user includes: receiving a session identifier corresponding to the session and identity authentication information of the first session user, and performing identity authentication according to the identity authentication information of the first session user to obtain an identity authentication result of the first session user; storing the session identification and the identity authentication result of the first session user in an associated manner; when a task execution request is received, extracting a session identifier from the task execution request, and acquiring an identity authentication result which is stored in association with the session identifier as an identity authentication result corresponding to a first session user.
In one embodiment, the target task is a resource transfer task, and if the identity authentication result corresponding to the first session user executed by the processor is authenticated, executing the target task according to the task execution request includes: and if the identity authentication result of the first session user and the identity authentication result corresponding to the resource transfer target party session user pass the authentication, executing the target task according to the task execution request.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (22)

1. A method of task execution, the method comprising:
acquiring identity authentication information of a first session user from session information in a session process, wherein the first session user is a session user in the session process, the identity authentication information of the first session user is used for performing identity authentication on the first session user, the session is a video real-time session or a voice real-time session, the session information is at least one of session audio data or session image data in the video real-time session, or the session information is session audio data in the voice real-time session;
detecting first target session information in session information of a target session user, wherein the first target session information is used for triggering a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user;
when the first target session information is detected, if the identity authentication result of the first session user is authenticated, the step of inputting identity authentication information by the user is omitted and the target task corresponding to the first target session information is executed under the condition that the execution of the target task requires identity authentication, wherein the identity authentication result of the first session user is the result of performing identity authentication on the first session user according to the identity authentication information of the first session user.
2. The method of claim 1, further comprising:
and when the first target session information is detected, displaying an operation interface corresponding to the target task on a current interface, wherein the current interface comprises a session interface corresponding to a session or a display interface after exiting the session interface.
3. The method according to claim 2, wherein the displaying the operation interface corresponding to the target task on the current interface comprises:
displaying a task confirmation request interface corresponding to the target task on the current interface;
the method further comprises the following steps:
and when a task confirmation instruction input in the task confirmation request interface is received, triggering the execution of the target task.
4. The method of claim 1, further comprising:
acquiring a session identifier corresponding to a session, and sending the session identifier and the identity authentication information of the first session user to a server so that the server stores the identity authentication information of the first session user and the session identifier in an associated manner;
when the first target session information is detected, sending an identity authentication request to the server, wherein the identity authentication request carries the session identifier, and is used for indicating the server to acquire identity authentication information stored in association with the session identifier, and performing identity authentication on the first session user according to the identity authentication information stored in association to obtain an identity authentication result of the first session user.
5. The method of claim 1, further comprising:
acquiring a session identifier corresponding to a session, sending the session identifier and the identity authentication information of the first session user to a server, so that the server performs identity authentication on the first session user according to the identity authentication information to obtain an identity authentication result of the first session user, and storing the identity authentication result of the first session user and the session identifier in an associated manner;
and sending a task execution request to the server, wherein the task execution request comprises the session identifier, and the task execution request is used for indicating the server to acquire an identity authentication result stored in association with the session identifier and executing the target task according to the identity authentication result.
6. The method of claim 1, further comprising:
acquiring task parameter information corresponding to the target task from session information in a session process;
and generating a task execution request corresponding to the target task according to the task parameter information.
7. The method of claim 1, further comprising:
detecting second target session information in the session information of the target session user, wherein the second target session information is used for triggering an associated task corresponding to the target task;
and triggering the association task when the second target session information is detected.
8. The method of claim 1, further comprising:
and when the target task is in a triggering state, stopping triggering the non-associated task corresponding to the target task according to the session information in the session.
9. The method of claim 1, wherein the obtaining the identity authentication information of the first session user from the session information in the session process comprises:
acquiring conversation image data and/or conversation audio data corresponding to the first conversation user from conversation information in a conversation process;
and extracting the identity characteristic data in the conversation image data and/or the conversation audio data, and taking the identity characteristic data as the identity authentication information corresponding to the first conversation user.
10. The method of claim 1, further comprising:
acquiring identity authentication information corresponding to the first target session information, wherein the identity authentication information corresponding to the first target session information is used for performing identity authentication on a target session user triggering the target task to obtain an identity authentication result of the target session user;
and when the identity authentication result of the target session user is authentication passing, triggering the target task corresponding to the first target session information.
11. A task execution device, the device comprising:
the system comprises a first identity authentication information acquisition module, a second identity authentication information acquisition module and a first authentication information acquisition module, wherein the first identity authentication information acquisition module is used for acquiring identity authentication information of a first session user from session information in a session process, the first session user is a session user in the session process, the identity authentication information of the first session user is used for performing identity authentication on the first session user, the session is a video real-time session or a voice real-time session, the session information is at least one of session audio data or session image data in the video real-time session, or the session information is session audio data in the voice real-time session;
the system comprises a first session information detection module, a first task authorization module and a first session information processing module, wherein the first session information detection module is used for detecting first target session information in session information of a target session user, the first target session information is used for triggering a corresponding target task, and the target session user is the first session user or a task authorization user corresponding to the first session user;
and the first execution module is used for omitting the step of inputting the identity authentication information by the user and executing the target task corresponding to the first target session information under the condition that the execution of the target task requires the identity authentication if the identity authentication result of the first session user passes the authentication when the first target session information is detected, wherein the identity authentication result of the first session user is the result of performing the identity authentication on the first session user according to the identity authentication information of the first session user.
12. The apparatus of claim 11, further comprising:
and the display module is used for displaying the operation interface corresponding to the target task on a current interface when the first target session information is detected, wherein the current interface comprises a session interface corresponding to a session or a display interface after the session interface is exited.
13. The apparatus of claim 12, wherein the presentation module is configured to:
displaying a task confirmation request interface corresponding to the target task on the current interface;
the apparatus further comprises a trigger execution module configured to:
and when a task confirmation instruction input in the task confirmation request interface is received, triggering the execution of the target task.
14. The apparatus of claim 11, further comprising:
the first session identifier acquisition module is used for acquiring a session identifier corresponding to a session, and sending the session identifier and the identity authentication information of the first session user to a server so that the server stores the identity authentication information of the first session user and the session identifier in an associated manner;
and the identity authentication sending module is used for sending an identity authentication request to the server when the first target session information is detected, wherein the identity authentication request carries the session identifier, and is used for indicating the server to obtain identity authentication information which is stored in association with the session identifier, and performing identity authentication on the first session user according to the identity authentication information which is stored in association, so as to obtain an identity authentication result of the first session user.
15. The apparatus of claim 11, further comprising:
the second session identification acquisition module is used for acquiring a session identification corresponding to a session, sending the session identification and the identity authentication information of the first session user to a server, so that the server performs identity authentication on the first session user according to the identity authentication information to obtain an identity authentication result of the first session user, and storing the identity authentication result of the first session user and the session identification in an associated manner;
and the task execution request sending module is used for sending a task execution request to the server, wherein the task execution request comprises the session identifier, and the task execution request is used for indicating the server to obtain an identity authentication result stored in association with the session identifier and executing the target task according to the identity authentication result.
16. The apparatus of claim 11, further comprising:
the task parameter information acquisition module is used for acquiring task parameter information corresponding to the target task from session information in a session process;
and the task execution request generation module is used for generating a task execution request corresponding to the target task according to the task parameter information.
17. The apparatus of claim 11, further comprising:
the second target session information detection module is used for detecting second target session information in the session information of the target session user, wherein the second target session information is used for triggering an associated task corresponding to the target task;
and the associated task triggering module is used for triggering the associated task when the second target session information is detected.
18. The apparatus of claim 11, further comprising:
and the trigger stopping module is used for stopping triggering the non-associated task corresponding to the target task according to the session information in the session when the target task is in the trigger state.
19. The apparatus of claim 11, wherein the first authentication information obtaining module is configured to:
acquiring conversation image data and/or conversation audio data corresponding to the first conversation user from conversation information in a conversation process;
and extracting the identity characteristic data in the conversation image data and/or the conversation audio data, and taking the identity characteristic data as the identity authentication information corresponding to the first conversation user.
20. The apparatus of claim 11, further comprising:
a second identity authentication information back module, configured to obtain identity authentication information corresponding to the first target session information, where the identity authentication information corresponding to the first target session information is used to perform identity authentication on a target session user that triggers the target task, and obtain an identity authentication result of the target session user;
and the target task triggering module is used for triggering the target task corresponding to the first target session information when the identity authentication result of the target session user is authentication passing.
21. A computer arrangement comprising a memory and a processor, the memory having stored thereon a computer program that, when executed by the processor, causes the processor to carry out the steps of the task execution method of any of claims 1 to 10.
22. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, causes the processor to carry out the steps of the task execution method of any one of claims 1 to 10.
CN201810866977.XA 2018-08-01 2018-08-01 Task execution method and device, computer equipment and storage medium Active CN110166417B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810866977.XA CN110166417B (en) 2018-08-01 2018-08-01 Task execution method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810866977.XA CN110166417B (en) 2018-08-01 2018-08-01 Task execution method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110166417A CN110166417A (en) 2019-08-23
CN110166417B true CN110166417B (en) 2021-10-01

Family

ID=67645047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810866977.XA Active CN110166417B (en) 2018-08-01 2018-08-01 Task execution method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110166417B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101311953A (en) * 2007-05-25 2008-11-26 上海电虹软件有限公司 Network payment method and system based on voiceprint authentication
CN103620629A (en) * 2013-05-31 2014-03-05 华为技术有限公司 Transfer information processing method and apparatus
CN105450691A (en) * 2014-08-21 2016-03-30 阿里巴巴集团控股有限公司 Service-processing method and device, and server
CN105955565A (en) * 2016-04-20 2016-09-21 捷开通讯(深圳)有限公司 Account transferring method and mobile terminal
CN106506433A (en) * 2015-09-06 2017-03-15 中兴通讯股份有限公司 Login authentication method, certificate server, Authentication Client and login client
CN107122179A (en) * 2017-03-31 2017-09-01 阿里巴巴集团控股有限公司 The function control method and device of voice
CN108074577A (en) * 2016-11-09 2018-05-25 上海诺悦智能科技有限公司 Identity identifying method and identity authorization system
CN108173749A (en) * 2018-01-14 2018-06-15 陈崇 A kind of method of mobile payment based on big data, device and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140052633A1 (en) * 2012-08-15 2014-02-20 Ebay Inc. Payment in a chat session

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101311953A (en) * 2007-05-25 2008-11-26 上海电虹软件有限公司 Network payment method and system based on voiceprint authentication
CN103620629A (en) * 2013-05-31 2014-03-05 华为技术有限公司 Transfer information processing method and apparatus
CN105450691A (en) * 2014-08-21 2016-03-30 阿里巴巴集团控股有限公司 Service-processing method and device, and server
CN106506433A (en) * 2015-09-06 2017-03-15 中兴通讯股份有限公司 Login authentication method, certificate server, Authentication Client and login client
CN105955565A (en) * 2016-04-20 2016-09-21 捷开通讯(深圳)有限公司 Account transferring method and mobile terminal
CN108074577A (en) * 2016-11-09 2018-05-25 上海诺悦智能科技有限公司 Identity identifying method and identity authorization system
CN107122179A (en) * 2017-03-31 2017-09-01 阿里巴巴集团控股有限公司 The function control method and device of voice
CN108173749A (en) * 2018-01-14 2018-06-15 陈崇 A kind of method of mobile payment based on big data, device and mobile terminal

Also Published As

Publication number Publication date
CN110166417A (en) 2019-08-23

Similar Documents

Publication Publication Date Title
US11310230B2 (en) System for electronic authentication with live user determination
US10135820B2 (en) Server based biometric authentication
CA2945703C (en) Systems, apparatus and methods for improved authentication
JP2022532677A (en) Identity verification and management system
CN109558106A (en) The information processing terminal and method, system and storage medium for information processing
US8205249B2 (en) Method for carrying out a secure electronic transaction using a portable data support
WO2016145992A1 (en) Method and corresponding device for starting service through voice in communication software
US10078867B1 (en) Augmented reality virtual banker
US11775971B1 (en) Biometric authentication on push notification
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
CN110505201B (en) Conference information processing method, conference information processing device, computer equipment and storage medium
US20140310786A1 (en) Integrated interactive messaging and biometric enrollment, verification, and identification system
CN105656850B (en) Data processing method, related device and system
CN110311895A (en) Session authorization check method, system and the electronic equipment of identity-based verifying
US11663306B2 (en) System and method for confirming a person's identity
CN111737675A (en) Block chain-based electronic signature method and device
US9025746B2 (en) System and method for visual caller identification
CN110166417B (en) Task execution method and device, computer equipment and storage medium
CN106411523B (en) Bank card password generation method, verification method, equipment and system
US20240037529A1 (en) System and methods for detecting and implementing resource allocation in an electronic network based on non-contact instructions
CN109726636A (en) User ID authentication method and device, storage medium and electronic equipment
CN106533685B (en) Identity authentication method, device and system
CN106161365B (en) Data processing method and device and terminal
JP6559398B2 (en) Approval request method, approval request program, and bank system
WO2016058540A1 (en) Identity authentication method and apparatus and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant