CN110601961B - User identity authentication method and system - Google Patents

User identity authentication method and system Download PDF

Info

Publication number
CN110601961B
CN110601961B CN201910860604.6A CN201910860604A CN110601961B CN 110601961 B CN110601961 B CN 110601961B CN 201910860604 A CN201910860604 A CN 201910860604A CN 110601961 B CN110601961 B CN 110601961B
Authority
CN
China
Prior art keywords
target
terminal
target object
server
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910860604.6A
Other languages
Chinese (zh)
Other versions
CN110601961A (en
Inventor
蔡慧芨
谭悦伟
黄梓群
李斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910860604.6A priority Critical patent/CN110601961B/en
Publication of CN110601961A publication Critical patent/CN110601961A/en
Application granted granted Critical
Publication of CN110601961B publication Critical patent/CN110601961B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The application discloses a user identity authentication method and a system, wherein the method comprises the following steps: the first terminal determines attribute information of a target main body and sends the attribute information to a first server; the first server determines identification information of a target page based on the attribute information of the target main body; the first server sends the identification information of the target page to the first terminal; the first terminal determines a target object corresponding to the target main body and sends identification information of the target page to a second terminal corresponding to the target object; thereby determining target information of the target object; and the second terminal sends an identity verification request of the target object to a second server so as to verify the validity of the target object. By adopting the technical scheme, the identity authentication of the enterprise legal person can be completed without setting the enterprise legal person as an enterprise WeChat manager in the process of applying for the enterprise WeChat account, and the workload of the enterprise legal person is reduced.

Description

User identity authentication method and system
Technical Field
The present application relates to the field of internet communication technologies, and in particular, to a method and a system for user authentication.
Background
The enterprise WeChat is an office communication tool, and has a chat function similar to WeChat, and additionally has a public fee telephone function and a mail function; in the aspect of functional application, the enterprise WeChat can also be used for announcement, attendance checking, leave asking and reimbursement. In addition, the enterprise WeChat is added with office scene functions such as receipt message and rest. In conclusion, the enterprise WeChat can help the enterprise to improve the working efficiency.
In the prior art, when an enterprise needs to apply for an enterprise WeChat account, an enterprise legal person needs to be added to an enterprise WeChat message book and set as an administrator, and then the enterprise legal person can submit legal person verification information; for enterprise legal people, the workload of the enterprise legal people is increased; therefore, the popularization and the application of the enterprise WeChat application program are also influenced.
Therefore, it is necessary to provide a user authentication method and system, which can reduce the workload of enterprise legal people in the process of applying for enterprise wechat accounts.
Disclosure of Invention
The application provides a user identity verification method and a user identity verification system, which can reduce the workload of enterprise legal people in the process of applying for an enterprise wechat account.
In one aspect, the present application provides a user identity authentication method, including:
the method comprises the steps that a first terminal determines attribute information of a target main body and sends the attribute information of the target main body to a first server;
the first server determines identification information of a target page based on the attribute information of the target main body;
the first server sends the identification information of the target page to the first terminal;
the first terminal determines a target object corresponding to the target main body;
the first terminal sends the identification information of the target page to a second terminal corresponding to the target object;
the second terminal determines the target information of the target object based on the identification information of the target page;
the second terminal sends an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object;
and the second server verifies the validity of the target object based on the identity verification request of the target object.
In another aspect, a method for user authentication is provided, the method including:
determining attribute information of a target main body, and sending the attribute information of the target main body to a first server;
receiving identification information of the target page, which is sent by the first server and determined based on the attribute information of the target subject;
determining a target object corresponding to the target subject;
sending the identification information of the target page to a second terminal corresponding to the target object; enabling the second terminal to determine the target information of the target object based on the identification information of the target page; sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object.
In another aspect, a method for user authentication is provided, the method including:
receiving identification information of a target page sent by a first terminal; the identification information of the target page is determined by a first server based on the attribute information of a target main body and sent to the first terminal, and the attribute information of the target main body is determined by the first terminal and sent to the first server; the local terminal is a terminal corresponding to a target object, and the target object is an object corresponding to the target subject determined by the first terminal;
determining target information of the target object based on the identification information of the target page;
sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object.
In another aspect, a user authentication terminal is provided, where the terminal includes:
the attribute information sending module is used for determining the attribute information of a target main body and sending the attribute information of the target main body to a first server;
a first identification information receiving module, configured to receive identification information of the target page, which is sent by the first server and determined based on the attribute information of the target main body;
the target object determining module is used for determining a target object corresponding to the target main body;
the second identification information sending module is used for sending the identification information of the target page to a second terminal corresponding to the target object; enabling the second terminal to determine the target information of the target object based on the identification information of the target page; sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object.
In another aspect, a user authentication terminal is provided, where the terminal includes:
the second identification information receiving module is used for receiving the identification information of the target page sent by the first terminal; the identification information of the target page is determined by a first server based on the attribute information of a target main body and sent to the first terminal, and the attribute information of the target main body is determined by the first terminal and sent to the first server; the local terminal is a terminal corresponding to a target object, and the target object is an object corresponding to the target subject determined by the first terminal;
the target information determining module is used for determining the target information of the target object based on the identification information of the target page;
an identity authentication request sending module, configured to send an identity authentication request of the target object to a second server, where the identity authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object.
In another aspect, a user authentication system is provided, the system including a first terminal, a second terminal, a first server and a second server,
the first terminal is used for determining the attribute information of a target main body and sending the attribute information of the target main body to a first server; determining a target object corresponding to the target subject; sending the identification information of the target page to a second terminal corresponding to the target object;
the second terminal is used for determining the target information of the target object based on the identification information of the target page; sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object;
the first server is used for determining the identification information of the target page based on the attribute information of the target main body; sending the identification information of the target page to the first terminal;
and the second server is used for verifying the legality of the target object based on the identity verification request of the target object.
Another aspect provides a user authentication terminal, the terminal comprising a processor and a memory, the memory storing at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the user authentication method as described above.
Another aspect provides a computer readable storage medium having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by a processor to implement the user authentication method as described above.
The user identity authentication method and the user identity authentication system have the following technical effects:
the method comprises the steps that a first terminal determines attribute information of a target main body and sends the attribute information of the target main body to a first server, so that identification information of a target page is determined; the first terminal determines a target object corresponding to the target main body; sending the identification information of the target page to a second terminal corresponding to the target object; thereby determining target information of the target object; and the second terminal sends an identity verification request of the target object to a second server so as to verify the validity of the target object. By adopting the technical scheme, the identity authentication of the enterprise legal person can be completed without setting the enterprise legal person as an enterprise WeChat manager in the process of applying for the enterprise WeChat account, and the workload of the enterprise legal person is reduced.
Drawings
In order to more clearly illustrate the technical solutions and advantages of the embodiments of the present application or the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of a system provided by an embodiment of the present application;
fig. 2 is a schematic flowchart of a user authentication method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a method for determining, by a second terminal, target information of a target object according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a method for verifying the validity of the target object by the second server according to an embodiment of the present application;
fig. 5 is a schematic display interface diagram of a target page generated by a first terminal according to an embodiment of the present application;
fig. 6 is a schematic diagram of a selectable verification link sending manner in a display interface of a first terminal according to an embodiment of the present application;
fig. 7 is a schematic diagram of verification prompt information of a display interface of a second terminal according to an embodiment of the present application;
fig. 8 is a schematic diagram of a verification page displayed by the second terminal through the enterprise wechat application according to an embodiment of the present application;
fig. 9 is a schematic diagram of a verification page displayed by the second terminal through the wechat application according to the embodiment of the present application;
fig. 10 is a schematic structural diagram of a blockchain system according to an embodiment of the present disclosure;
FIG. 11 is a block diagram according to an embodiment of the present disclosure;
fig. 12 is a schematic flowchart of another user authentication method provided in an embodiment of the present application;
fig. 13 is a schematic flowchart of another user authentication method provided in the embodiment of the present application;
fig. 14 is a schematic structural diagram of a user authentication terminal according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of another user authentication terminal according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Referring to fig. 1, fig. 1 is a schematic diagram of a system according to an embodiment of the present disclosure, and as shown in fig. 1, the system may include at least a first terminal 01, a second terminal 02, a first server 03, and a second server 04.
Specifically, the first terminal 01 may include a smart phone, a tablet computer, a notebook computer, a digital assistant, a smart wearable device, a vehicle-mounted terminal, and other types of physical devices, and may also include software running in the physical devices, for example, the first terminal 01 may include an enterprise wechat and a wechat application.
Specifically, the second terminal 02 may include a smart phone, a tablet computer, a notebook computer, a digital assistant, a smart wearable device, a vehicle-mounted terminal, and other types of physical devices, and may also include software running in the physical devices, for example, the second terminal 02 may include an enterprise wechat and a wechat application.
Specifically, the first server 03 may include an independently operating server, or a distributed server, or a server cluster composed of a plurality of servers. The first server 03 may comprise a network communication unit, a processor, a memory, etc. The first server 03 may provide a background service for the first terminal 01. For example, the first server 03 may be a background server of the enterprise wechat application.
Specifically, the second server 04 may include a server operating independently, or a distributed server, or a server cluster composed of a plurality of servers. The second server 04 may comprise a network communication unit, a processor, a memory, etc. The second server 04 may provide a background service for the second terminal 02. For example, the second server 04 may be a background server of the WeChat application.
The following describes a user authentication method based on the above system, and fig. 2 is a schematic flow chart of a user authentication method provided in an embodiment of the present application, and the present specification provides the method operation steps as described in the embodiment or the flow chart, but may include more or less operation steps based on conventional or non-creative labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. In practice, the system or server product may be implemented in a sequential or parallel manner (e.g., parallel processor or multi-threaded environment) according to the embodiments or methods shown in the figures. Specifically, as shown in fig. 2, the method may include:
s201: the first terminal determines the attribute information of the target main body and sends the attribute information of the target main body to the first server.
In this embodiment of the present specification, the first terminal may be a terminal corresponding to an enterprise WeChat manager, and the enterprise WeChat manager may be a person other than an enterprise legal person in an enterprise; the target subject may include, but is not limited to, an enterprise and a company, and the attribute information of the target subject may include information such as a type, a full name, a short name, and the like corresponding to the target subject; the first server may provide a background service for the first terminal.
In some embodiments, the first server may be a backend server of an enterprise WeChat Application (app).
In an embodiment of this specification, the determining, by the first terminal, the attribute information of the target subject may include:
the first terminal determines attribute information of a target subject in response to an input operation on a display interface. The input operation may be an input operation of a user corresponding to the first terminal, and specifically, the user corresponding to the first terminal may be an enterprise wechat manager.
In a specific embodiment, as shown in fig. 5, a display interface of the first terminal displays attribute information of a target subject, where the target subject is an enterprise, and the attribute information of the target subject includes a full name and short name information of the enterprise. In the figure, the whole name and the abbreviation of the enterprise can be called 'legal testing enterprise'. When the enterprise WeChat manager is a legal person, after the main body information and the legal representative information are filled, the 'go to WeChat verification identity' in the display interface can be directly clicked to verify the identity of the legal person; when the enterprise WeChat manager is a member other than a legal person, after the main body information and the name of the legal person are filled in, the 'forward to enterprise legal person' in the display interface can be clicked to carry out legal person identity verification.
S203: and the first server determines the identification information of the target page based on the attribute information of the target main body.
In this specification, the identification information of the target page may be a code (vocode) of the target page, and the code is unique with respect to the target page. The first server may generate the code of the target page according to the attribute information of the target subject.
S205: the first server sends the identification information of the target page to the first terminal;
in an embodiment of this specification, the sending, by the first server, the identification information of the target page to the first terminal may include:
and the first server sends the code of the target page to the first terminal.
S207: the first terminal determines a target object corresponding to the target main body;
in an embodiment of this specification, the determining, by the first terminal, the target object corresponding to the target subject may include:
and the first terminal determines a target object corresponding to the target main body and identification information of the target object. The target object may be a legal representative of an enterprise (hereinafter, referred to as a legal person), and the identification information of the target object may be name and/or identification number information of the legal person of the enterprise. As shown in fig. 5, the display interface of the first terminal may display the name XXX of the corporate identity.
In an embodiment of this specification, the determining, by the first terminal, the target object corresponding to the target subject may include:
and the first terminal determines a target object corresponding to the target main body based on the attribute information of the target main body.
In a specific embodiment, as shown in fig. 5, the first terminal may determine the target object corresponding to the target subject by responding to a trigger operation of the user on the "forward to enterprise legal person" flag in the display interface.
S209: the first terminal sends the identification information of the target page to a second terminal corresponding to the target object;
in this embodiment of the present specification, before the step of sending, by the first terminal, the identification information of the target page to the second terminal corresponding to the target object, the method may further include:
and the first terminal determines a second terminal corresponding to the target object based on the identification information of the target object.
In an embodiment of this specification, the second terminal includes a first application corresponding to the first server, and the sending, by the first terminal, the identification information of the target page to the second terminal corresponding to the target object may include:
and the first terminal responds to the triggering operation of the first position in the first display interface and sends the identification information of the target page to the first application program in the second terminal.
In some embodiments, the first application may be an enterprise WeChat app.
In an embodiment of this specification, the second terminal includes a second application corresponding to the second server, and sending, by the first terminal, the identification information of the target page to the second terminal corresponding to the target object includes:
and the first terminal responds to the triggering operation of a second position in the first display interface and sends the identification information of the target page to a second application program in the second terminal.
In some embodiments, the second application may be a WeChat app.
In this specification embodiment, the first terminal may perform information interaction with the second terminal through the wechat or enterprise wechat app.
In a specific embodiment, the first display interface of the first terminal is as shown in fig. 6, wherein the first location is a "send by WeChat Enterprise" flag, and the second location is a "send by WeChat" flag; after the user triggers the first location or the second location at the first terminal, as shown in fig. 7, the display interface of the second terminal may display verification invitation information, the title of which may be "invite you to verify" corporate information of corporate test enterprise ".
When the first terminal side user triggers the first position to be the mark of sending through enterprise WeChat, and the second terminal side user triggers the verification invitation information, the second terminal opens the verification information through enterprise WeChat app, the display interface is shown in figure 8, and after filling in the information of the legal person, the second terminal side user verifies the identity of the legal person by triggering the mark of 'going to WeChat verification identity'. And after the second terminal side triggers a mark of 'go to WeChat authentication identity', the second terminal jumps to a page of a second application program (WeChat app) from a display interface of the first application program, so that the second application program sends an authentication request of the legal person to a corresponding second server.
When the first terminal side user triggers the second position to be the mark of sending through the WeChat, and the second terminal side user triggers the verification invitation information, the second terminal opens the verification information through the WeChat app, the display interface of the second terminal is shown in fig. 9, after the second terminal side user fills in the legal person information, the mark of submitting of the display interface is triggered, and the WeChat app of the second terminal sends the filled information to a second server (WeChat background server) to perform legal person identity authentication.
S2011: the second terminal determines the target information of the target object based on the identification information of the target page;
in this embodiment of the present specification, as shown in fig. 3, the determining, by the second terminal, the target information of the target object based on the identification information of the target page may include:
s20111: the second terminal displays the target page based on the identification information of the target page;
s20113: and the second terminal responds to the input operation on the target page and determines the target information of the target object.
In some embodiments, the target information of the target object may include information such as a name, an identification number, and the like of a legal person. When the target page comprises identification information of a target object, for example, the target page comprises the name of a legal person, the second terminal responds to the input operation on the target page and determines the identification number information of the target object.
S2013: the second terminal sends an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object;
in an embodiment of this specification, the second terminal includes a second application corresponding to the second server, and when the first terminal sends the identification information of the target page to the first application in the second terminal in response to the triggering operation at the first location in the first display interface, the sending, by the second terminal, the authentication request of the target object to the second server may include:
the first application program in the second terminal responds to the trigger operation of a preset position in a second display interface, and the page of the second application program in the second terminal is pulled;
and the second application program in the second terminal sends an authentication request of the target object to the second server.
In this embodiment of the present specification, when the first terminal sends the identification information of the target page to the second application program in the second terminal in response to a triggering operation at a second location in the first display interface, the sending, by the second terminal, the authentication request of the target object to the second server may include:
and the second application program in the second terminal sends an authentication request of the target object to the second server.
S2015: and the second server verifies the validity of the target object based on the identity verification request of the target object.
In this embodiment, as shown in fig. 4, the verifying, by the second server, the validity of the target object based on the authentication request of the target object may include:
s20151: the second server acquires standard information of the target object based on the identity authentication request of the target object;
s20153: the second server compares the target information of the target object with standard information;
s20155: and when the comparison result of the target information of the target object and the standard information is consistent, the second server determines that the target object is legal.
In an embodiment of the present specification, when a comparison result between the target information of the target object and the standard information is inconsistent, the second server determines that the target object is illegal, and sends verification failure information to the second terminal.
In the embodiment of the specification, the identity authentication of the enterprise legal person can be realized on the premise of not setting the enterprise legal person as an enterprise wechat manager, so that the workload of the enterprise legal person in the process of applying for the enterprise wechat account is reduced.
In an embodiment of this specification, after the step of determining, by the second server, that the target object is legal, the method may further include:
the second server sends a comparison result that the target object is legal to a second application program in the second terminal;
the second application program in the second terminal pulls the current page of the first application program in the second terminal based on the comparison result that the target object is legal;
and the first application program in the second terminal responds to the trigger operation of the preset position in the current page and sends the information corresponding to the current page to the first server.
In some embodiments, the predetermined location may be a location corresponding to the "submit" flag in fig. 8, so that the first server may further review the enterprise data based on the information of the current page.
In an embodiment of the present specification, the method may further include:
the second server stores standard information of the target object based on a blockchain system, wherein the blockchain system comprises a plurality of nodes, and a point-to-point network is formed among the nodes.
In some embodiments, the blockchain system may be the structure shown in fig. 10, a Peer-To-Peer (P2P) network is formed among a plurality of nodes, and the P2P Protocol is an application layer Protocol operating on top of a Transmission Control Protocol (TCP). In the blockchain system, any machine such as a server and a terminal can be added to become a node, and the node comprises a hardware layer, a middle layer, an operating system layer and an application layer.
The functions of each node in the blockchain system shown in fig. 10 include:
1) routing, a basic function that a node has, is used to support communication between nodes.
Besides the routing function, the node may also have the following functions:
2) the application is used for being deployed in a block chain, realizing specific services according to actual service requirements, recording data related to the realization functions to form recording data, carrying a digital signature in the recording data to represent a source of task data, and sending the recording data to other nodes in the block chain system, so that the other nodes add the recording data to a temporary block when the source and integrity of the recording data are verified successfully.
3) And the Block chain comprises a series of blocks (blocks) which are mutually connected according to the generated chronological order, new blocks cannot be removed once being added into the Block chain, and recorded data submitted by nodes in the Block chain system are recorded in the blocks.
In some embodiments, the Block Structure (Block Structure) may be the Structure shown in fig. 11, where each Block includes a hash value of the Block storing the transaction record (hash value of the Block) and a hash value of a previous Block, and the blocks are connected by the hash values to form a Block chain. The block may include information such as a time stamp at the time of block generation. A Block chain (Block chain), which is essentially a decentralized database, is a series of data blocks associated by using cryptography, and each data Block contains related information for verifying the validity (anti-counterfeiting) of the information and generating a next Block.
As can be seen from the technical solutions provided by the embodiments of the present specification, the first terminal of the embodiments of the present specification determines the attribute information of the target subject, and sends the attribute information of the target subject to the first server, so as to determine the identification information of the target page; the first terminal determines a target object corresponding to the target main body; sending the identification information of the target page to a second terminal corresponding to the target object; thereby determining target information of the target object; and the second terminal sends an identity verification request of the target object to a second server so as to verify the validity of the target object. By adopting the technical scheme, the identity authentication of the enterprise legal person can be completed without setting the enterprise legal person as an enterprise WeChat manager in the process of applying for the enterprise WeChat account, and the workload of the enterprise legal person is reduced.
A specific embodiment of a user identity authentication method in this specification is described below with a first terminal as an execution subject, and fig. 12 is a schematic flow chart of the user identity authentication method provided in this embodiment of the present application, and specifically, with reference to fig. 12, the method may include:
s1201: determining attribute information of a target main body, and sending the attribute information of the target main body to a first server;
s1203: receiving identification information of the target page, which is sent by the first server and determined based on the attribute information of the target subject;
s1205: determining a target object corresponding to the target subject;
s1207: sending the identification information of the target page to a second terminal corresponding to the target object; enabling the second terminal to determine the target information of the target object based on the identification information of the target page; sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object.
In some embodiments, the second terminal includes a first application corresponding to the first server, and the sending the identification information of the target page to the second terminal corresponding to the target object may include:
and responding to the triggering operation of the first position in the first display interface, and sending the identification information of the target page to the first application program in the second terminal.
In some embodiments, the second terminal includes a second application corresponding to the second server, and the sending the identification information of the target page to the second terminal corresponding to the target object may include:
and responding to the triggering operation of the second position in the first display interface, and sending the identification information of the target page to a second application program in the second terminal.
An embodiment of the present specification provides a user identity authentication terminal, where the terminal includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or a set of instructions, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by the processor to implement the user identity authentication method described above.
A specific embodiment of a user authentication method in this specification is described below with a second terminal as an execution subject, and fig. 13 is a schematic flow chart of the user authentication method provided in the embodiment of the present application, and specifically, with reference to fig. 13, the method may include:
s1301: receiving identification information of a target page sent by a first terminal; the identification information of the target page is determined by a first server based on the attribute information of a target main body and sent to the first terminal, and the attribute information of the target main body is determined by the first terminal and sent to the first server; the local terminal is a terminal corresponding to a target object, and the target object is an object corresponding to the target subject determined by the first terminal;
s1303: determining target information of the target object based on the identification information of the target page;
in some embodiments, the determining the target information of the target object based on the identification information of the target page may include:
displaying the target page based on the identification information of the target page;
and determining target information of the target object in response to the input operation on the target page.
S1305: sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object.
In some embodiments, the local terminal includes a second application corresponding to the second server, and the sending the authentication request of the target object to the second server may include:
the first application program in the local terminal responds to the trigger operation of a preset position in a second display interface, and the page of the second application program in the second terminal is pulled;
and the second application program in the local terminal sends an authentication request of the target object to the second server.
In some embodiments, the sending the authentication request of the target object to the second server may include:
and the second application program in the local terminal sends an authentication request of the target object to the second server.
In some embodiments, the method may further comprise:
a second application program in the local terminal pulls a current page of a first application program in the second terminal based on a comparison result that the target object is legal;
and the first application program in the local terminal responds to the triggering operation of the preset position in the current page and sends the information corresponding to the current page to the first server.
An embodiment of the present specification provides a user identity authentication terminal, where the terminal includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or a set of instructions, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by the processor to implement the user identity authentication method described above.
In the embodiments of the present disclosure, the memory may be used to store software programs and modules, and the processor executes various functional applications and data processing by operating the software programs and modules stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system, application programs needed by functions and the like; the storage data area may store data created according to use of the apparatus, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide the processor access to the memory.
The present specification embodiments provide a computer readable storage medium having stored therein at least one instruction, at least one program, code set, or instruction set, which is loaded and executed by a processor to implement a user authentication method as described above.
An embodiment of the present application further provides a user authentication terminal, as shown in fig. 14, where the terminal may include:
an attribute information sending module 1410, configured to determine attribute information of a target subject, and send the attribute information of the target subject to a first server;
a first identification information receiving module 1420, configured to receive identification information of the target page, which is sent by the first server and determined based on the attribute information of the target subject;
a target object determining module 1430, configured to determine a target object corresponding to the target subject;
a second identification information sending module 1440, configured to send the identification information of the target page to a second terminal corresponding to the target object; enabling the second terminal to determine the target information of the target object based on the identification information of the target page; sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object.
In some embodiments, the second terminal includes a first application corresponding to the first server, and the second identification information sending module may include:
and the first identification information sending unit is used for responding to the triggering operation of the first position in the first display interface and sending the identification information of the target page to the first application program in the second terminal.
In some embodiments, the second terminal includes a second application corresponding to the second server, and the second identification information transmission module may include:
and the second identification information sending unit is used for responding to the triggering operation of a second position in the first display interface and sending the identification information of the target page to a second application program in the second terminal.
The terminal and the method embodiments in the terminal embodiment are based on the same inventive concept.
An embodiment of the present application further provides a user authentication terminal, as shown in fig. 15, where the terminal may include:
a second identification information receiving module 1510, configured to receive identification information of a target page sent by the first terminal; the identification information of the target page is determined by a first server based on the attribute information of a target main body and sent to the first terminal, and the attribute information of the target main body is determined by the first terminal and sent to the first server; the local terminal is a terminal corresponding to a target object, and the target object is an object corresponding to the target subject determined by the first terminal;
a target information determining module 1520, configured to determine target information of the target object based on the identification information of the target page;
an identity authentication request sending module 1530, configured to send an identity authentication request of the target object to a second server, where the identity authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object.
In some embodiments, the target information determination module may include:
the target page display unit is used for displaying the target page based on the identification information of the target page;
and the target information determining unit is used for responding to the input operation on the target page and determining the target information of the target object.
In some embodiments, the local terminal includes a second application corresponding to the second server, and the authentication request transmission module may include:
the page pulling unit is used for enabling the first application program in the local terminal to respond to the triggering operation of a preset position in a second display interface and pull the page of the second application program in the second terminal;
and the first authentication request sending unit is used for enabling a second application program in the local terminal to send the authentication request of the target object to the second server.
In some embodiments, the authentication request sending module may include:
and the second authentication request sending unit is used for enabling a second application program in the local terminal to send the authentication request of the target object to the second server.
In some embodiments, the terminal may further include:
the current page pulling module is used for enabling a second application program in the local terminal to pull a current page of a first application program in the second terminal based on a comparison result that the target object is legal;
and the information sending module is used for enabling a first application program in the local terminal to respond to the triggering operation of the preset position in the current page and send the information corresponding to the current page to the first server.
The terminal and the method embodiments in the terminal embodiment are based on the same inventive concept.
In another aspect of the present application, there is provided a user authentication system, which includes a first terminal, a second terminal, a first server and a second server,
the first terminal is used for determining the attribute information of a target main body and sending the attribute information of the target main body to a first server; determining a target object corresponding to the target subject; sending the identification information of the target page to a second terminal corresponding to the target object;
the second terminal is used for determining the target information of the target object based on the identification information of the target page; sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object;
the first server is used for determining the identification information of the target page based on the attribute information of the target main body; sending the identification information of the target page to the first terminal;
and the second server is used for verifying the legality of the target object based on the identity verification request of the target object.
As can be seen from the embodiments of the user identity authentication method, apparatus, server, terminal, storage medium, or system provided by the present application, in an embodiment of the present description, a first terminal determines attribute information of a target subject, and sends the attribute information of the target subject to a first server, so as to determine identification information of a target page; the first terminal determines a target object corresponding to the target main body; sending the identification information of the target page to a second terminal corresponding to the target object; thereby determining target information of the target object; and the second terminal sends an identity verification request of the target object to a second server so as to verify the validity of the target object. By adopting the technical scheme, the identity authentication of the enterprise legal person can be completed without setting the enterprise legal person as an enterprise WeChat manager in the process of applying for the enterprise WeChat account, and the workload of the enterprise legal person is reduced.
It should be noted that: the sequence of the embodiments of the present application is only for description, and does not represent the advantages and disadvantages of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Especially, for the embodiments of the terminal, the system and the storage medium, since they are basically similar to the method embodiments, the description is relatively simple, and the relevant points can be referred to the partial description of the method embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (12)

1. A user identity authentication method is applied to a first application program for applying for an account of a target subject, and comprises the following steps:
the method comprises the steps that a first terminal determines attribute information of a target main body and sends the attribute information of the target main body to a first server;
the first server determines identification information of a target page based on the attribute information of the target main body;
the first server sends the identification information of the target page to the first terminal;
the first terminal determines a target object corresponding to the target main body;
the first terminal sends the identification information of the target page to a second terminal corresponding to the target object;
the second terminal determines the target information of the target object in the target page based on the identification information of the target page and displays the attribute information of the target main body so that the target object can verify the attribute information;
the second terminal sends an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object;
the second server verifies the validity of the target object based on the identity verification request of the target object;
the second server sends a comparison result that the target object is legal to a second application program in the second terminal;
the second application program in the second terminal pulls the current page of the first application program in the second terminal based on the comparison result that the target object is legal;
the first application program in the second terminal responds to the triggering operation of the preset position in the current page and sends the information corresponding to the current page to the first server; the first application program and the second application program are associated application programs.
2. The method of claim 1, wherein the second server verifying the validity of the target object based on the target object's authentication request comprises:
the second server acquires standard information of the target object based on the identity authentication request of the target object;
the second server compares the target information of the target object with standard information;
and when the comparison result of the target information of the target object and the standard information is consistent, the second server determines that the target object is legal.
3. The method of claim 2, further comprising:
the second server stores standard information of the target object based on a blockchain system, wherein the blockchain system comprises a plurality of nodes, and a point-to-point network is formed among the nodes.
4. A user identity authentication method is applied to a first application program for applying for an account of a target subject, and comprises the following steps:
determining attribute information of a target main body, and sending the attribute information of the target main body to a first server;
receiving identification information of the target page, which is sent by the first server and determined based on the attribute information of the target subject;
determining a target object corresponding to the target subject;
sending the identification information of the target page to a second terminal corresponding to the target object; enabling the second terminal to determine the target information of the target object in the target page based on the identification information of the target page, and displaying the attribute information of the target main body so that the target object can verify the attribute information; sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; the second server verifies the validity of the target object based on the identity verification request of the target object, and sends a comparison result that the target object is valid to a second application program in the second terminal; so that the second application program in the second terminal pulls the current page of the first application program in the second terminal based on the comparison result that the target object is legal; the first application program in the second terminal responds to the trigger operation of the preset position in the current page and sends the information corresponding to the current page to the first server; the first application program and the second application program are associated application programs.
5. The method of claim 4, wherein the second terminal includes a first application corresponding to the first server, and wherein sending the identification information of the target page to the second terminal corresponding to the target object comprises:
and responding to the triggering operation of the first position in the first display interface, and sending the identification information of the target page to the first application program in the second terminal.
6. The method of claim 4, wherein the second terminal includes a second application corresponding to the second server, and wherein sending the identification information of the target page to the second terminal corresponding to the target object comprises:
and responding to the triggering operation of the second position in the first display interface, and sending the identification information of the target page to a second application program in the second terminal.
7. A user identity authentication method is applied to a first application program for applying for an account of a target subject, and comprises the following steps:
receiving identification information of a target page sent by a first terminal; the identification information of the target page is determined by a first server based on the attribute information of a target main body and sent to the first terminal, and the attribute information of the target main body is determined by the first terminal and sent to the first server; the local terminal is a terminal corresponding to a target object, and the target object is an object corresponding to the target subject determined by the first terminal;
determining target information of the target object in the target page based on the identification information of the target page, and displaying attribute information of the target main body so that the target object verifies the attribute information;
sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; so that the second server verifies the validity of the target object based on the authentication request of the target object;
receiving a comparison result that a target object sent to a second application program in the local terminal by the second server is legal;
the second application program in the local terminal pulls the current page of the first application program in the local terminal based on the comparison result that the target object is legal;
the first application program in the local terminal responds to the triggering operation of a preset position in the current page and sends information corresponding to the current page to the first server; the first application program and the second application program are associated application programs.
8. The method of claim 7, wherein determining the target information of the target object based on the identification information of the target page comprises:
displaying the target page based on the identification information of the target page;
and determining target information of the target object in response to the input operation on the target page.
9. The method of claim 7, wherein the local terminal comprises a second application corresponding to the second server, and wherein sending the authentication request for the target object to the second server comprises:
the first application program in the local terminal responds to the trigger operation of a preset position in the second display interface and pulls a page of the second application program in the second terminal;
and the second application program in the local terminal sends an authentication request of the target object to the second server.
10. A user identity authentication system is applied to a first application program for applying for an account of a target subject and comprises a first terminal, a second terminal, a first server and a second server,
the first terminal is used for determining the attribute information of a target main body and sending the attribute information of the target main body to a first server; determining a target object corresponding to the target subject; sending the identification information of the target page to a second terminal corresponding to the target object;
the second terminal is used for determining the target information of the target object in the target page based on the identification information of the target page and displaying the attribute information of the target main body so that the target object can verify the attribute information; sending an authentication request of the target object to a second server, wherein the authentication request of the target object carries target information of the target object; the second application program pulls the current page of the first application program in the second terminal based on the comparison result that the target object is legal; the first application program responds to the triggering operation of a preset position in the current page and sends information corresponding to the current page to the first server; the first application program and the second application program are related application programs;
the first server is used for determining the identification information of the target page based on the attribute information of the target main body; sending the identification information of the target page to the first terminal;
the second server is used for verifying the validity of the target object based on the identity verification request of the target object; and sending a comparison result that the target object is legal to a second application program in the second terminal.
11. A user authentication terminal, the terminal comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement a user authentication method according to any one of claims 1 to 3, 4 to 6, or 7 to 9.
12. A computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement a method of user identity verification according to any one of claims 1 to 3, 4 to 6, or 7 to 9.
CN201910860604.6A 2019-09-11 2019-09-11 User identity authentication method and system Active CN110601961B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910860604.6A CN110601961B (en) 2019-09-11 2019-09-11 User identity authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910860604.6A CN110601961B (en) 2019-09-11 2019-09-11 User identity authentication method and system

Publications (2)

Publication Number Publication Date
CN110601961A CN110601961A (en) 2019-12-20
CN110601961B true CN110601961B (en) 2021-10-01

Family

ID=68858921

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910860604.6A Active CN110601961B (en) 2019-09-11 2019-09-11 User identity authentication method and system

Country Status (1)

Country Link
CN (1) CN110601961B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105407074A (en) * 2014-09-11 2016-03-16 腾讯科技(深圳)有限公司 Authentication method, apparatus and system
CN108076079A (en) * 2016-11-09 2018-05-25 阿里巴巴集团控股有限公司 A kind of user information obtains system, method and device
CN108717633A (en) * 2018-05-31 2018-10-30 腾讯科技(深圳)有限公司 Virtual card data processing method, system, device, computer equipment and storage medium
CN109660484A (en) * 2017-10-10 2019-04-19 爱信诺征信有限公司 A kind of enterprise's real name identification method and certificate server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2200251A1 (en) * 2008-12-19 2010-06-23 BRITISH TELECOMMUNICATIONS public limited company System for web-site verification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105407074A (en) * 2014-09-11 2016-03-16 腾讯科技(深圳)有限公司 Authentication method, apparatus and system
CN108076079A (en) * 2016-11-09 2018-05-25 阿里巴巴集团控股有限公司 A kind of user information obtains system, method and device
CN109660484A (en) * 2017-10-10 2019-04-19 爱信诺征信有限公司 A kind of enterprise's real name identification method and certificate server
CN108717633A (en) * 2018-05-31 2018-10-30 腾讯科技(深圳)有限公司 Virtual card data processing method, system, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN110601961A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
CN110428257B (en) Password cracking task processing method, equipment and storage medium
CN108551437B (en) Method and apparatus for authenticating information
CN111478967B (en) Request processing method and device
CN108833521A (en) Information push method, device, system, computer equipment and storage medium
CN111507717B (en) Data processing method, device, block node and computer readable storage medium
CN112069550B (en) Electronic contract evidence-storing system based on intelligent contract mode
CN111211911B (en) Collaborative signature method, device, equipment and system
CN107920094A (en) Data capture method, device, server and the network equipment
CN108259618A (en) The data interactive processing method and device of a kind of synchronization
CN109818957B (en) Intelligent contract calling method, device and system based on visual interface
CN109617694B (en) Application program publishing method and device
CN109710695A (en) The identification of transactions requests validity and initiating method, device, equipment and medium
CN111324661A (en) User cooperation method, device and medium based on block chain
CN113011864A (en) Two-dimensional code generation and verification method, device, equipment and readable medium
CN111488372A (en) Data processing method, device and storage medium
CN113468599A (en) File storage certificate method, device, system, equipment and storage medium
CN110351276A (en) Data processing method, equipment and computer readable storage medium
CN112749217A (en) Method, system and storage medium for determining target object adding channel
CN109150981B (en) Block chain network networking method, device, equipment and computer readable storage medium
CN110351364A (en) Date storage method, equipment and computer readable storage medium
CN110062044A (en) Distributed application program downloads verification method, equipment and storage medium
CN110601961B (en) User identity authentication method and system
CN115426106B (en) Identity authentication method, device and system, electronic equipment and storage medium
CN112015651A (en) Data processing method and device
CN105871982A (en) Content pushing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant