CN110929237A - Identity verification system, method and device and information verification system - Google Patents

Identity verification system, method and device and information verification system Download PDF

Info

Publication number
CN110929237A
CN110929237A CN201911157431.8A CN201911157431A CN110929237A CN 110929237 A CN110929237 A CN 110929237A CN 201911157431 A CN201911157431 A CN 201911157431A CN 110929237 A CN110929237 A CN 110929237A
Authority
CN
China
Prior art keywords
identity
terminal
verification
server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911157431.8A
Other languages
Chinese (zh)
Inventor
高玉娇
杨楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Fortune Shanghai Financial Information Service Co ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN201911157431.8A priority Critical patent/CN110929237A/en
Publication of CN110929237A publication Critical patent/CN110929237A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Abstract

The embodiment of the specification provides an identity verification system, an identity verification method, an identity verification device and an information verification system, wherein the identity verification system comprises: the system comprises a first terminal, a second terminal and a third terminal, wherein the first terminal receives a touch action submitted by a mutual application member through an identity verification interface triggering a mutual application page corresponding to a mutual application order, sends an identity verification request aiming at an investigator to a server, and receives and displays an identity verification result returned by the server; the server is used for issuing an identity verification instruction to at least one of the first terminal and the second terminal according to the received identity verification request, verifying the identity of the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, and returning an identity verification result to the first terminal; and at least one of the first terminal and the second terminal which receives the identity verification instruction acquires the identity identification information by executing the identity verification instruction and uploads the identity identification information to a server.

Description

Identity verification system, method and device and information verification system
Technical Field
The embodiment of the specification relates to the technical field of data processing, in particular to an identity authentication system, an identity authentication method, an identity authentication device and an information authentication system.
Background
With the rapid development of network technology, more and more service platforms are present in the daily life of users, and users can enjoy various services provided by the service platforms, for example, transfer money or cash services by using a third party payment platform, or online insurance purchase and settlement by using a third party agent platform. In order to ensure the safety and reliability of the service enjoyed by the user through the service platform, the identity validity is verified in the process of providing various services for the user, and the user can be ensured to enjoy comprehensive and safe service.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide an identity verification system, an information verification system, two identity verification methods, two identity verification apparatuses, two computing devices, and two computer-readable storage media.
An embodiment of the present specification provides an identity authentication system, including:
the system comprises a server, a first terminal of a mutual assistance application member and a second terminal of an investigator;
the first terminal is configured to receive a touch action submitted by the mutual assistance application member through an identity verification interface triggering a mutual assistance application page corresponding to a mutual assistance application order, send an identity verification request aiming at the investigator to the server based on the touch action, and receive and display an identity verification result returned by the server aiming at the identity verification request; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
the server is configured to issue an authentication instruction to at least one of the first terminal and the second terminal according to the received authentication request, authenticate the identity of the investigator based on the identity identification information of the investigator uploaded after the authentication instruction is issued, and return the obtained authentication result to the first terminal;
and at least one of the first terminal and the second terminal which receives the identity verification instruction acquires the identity identification information by executing the identity verification instruction and uploads the identity identification information to the server.
Optionally, at least one of the first terminal and the second terminal, which receives the authentication instruction, acquires the identification information by executing the authentication instruction, and uploads the identification information to the server, where the method includes:
the second terminal analyzes the identity verification instruction issued by the server, calls a verification code generation algorithm based on an analysis result to generate a verification code, displays the verification code and uploads second identity identification information carrying the verification code to the server;
the first terminal analyzes the identity verification instruction issued by the server, generates and displays a verification code entry page based on an analysis result, receives a target verification code input by the mutual assistance application member based on the verification code entry page, and uploads first identity identification information carrying the target verification code to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
judging whether the target verification code carried in the first identity identification information is consistent with the verification code carried in the second identity identification information;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, at least one of the first terminal and the second terminal, which receives the authentication instruction, acquires the identification information by executing the authentication instruction, and uploads the identification information to the server, where the method includes:
the second terminal analyzes the identity verification instruction issued by the server, calls a verification code generation algorithm based on an analysis result to generate and display the verification code of the investigator, and uploads second identity identification information carrying the verification code and the generation time thereof to the server;
the first terminal analyzes the identity verification instruction issued by the server, generates and displays a verification code entry page based on an analysis result, receives a target verification code input by the mutual assistance application member based on the verification code entry page, and uploads first identity identification information carrying the target verification code and input time of the target verification code to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
calculating a time difference between the entry time carried in the first identity identification information and the generation time carried in the second identity identification information;
judging whether the time difference exceeds a preset input duration threshold value or not;
if not, judging whether the target verification code carried in the first identity identification information is consistent with the verification code carried in the second identity identification information;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, if the execution result after the operation of judging whether the time difference exceeds the preset input duration threshold is that the time difference exceeds the input duration threshold, the following operations are executed:
the server issues a secondary identity verification instruction to the second terminal, the second terminal analyzes the secondary identity verification instruction issued by the server, and calls an image acquisition interface to acquire the identity image of the investigator and uploads the identity image to the server based on an analysis result;
the server judges whether the image similarity between the identity image uploaded by the second terminal and a prestored reference identity image of the investigator is greater than an image similarity threshold value or not;
if the identity verification result is larger than the reference identity image, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity image and returning the verification result page to the first terminal, and displaying the verification result page after the first terminal receives the verification result page;
and if not, determining that the authentication result is that the authentication fails.
Optionally, at least one of the first terminal and the second terminal, which receives the authentication instruction, acquires the identification information by executing the authentication instruction, and uploads the identification information to the server, where the method includes:
the second terminal analyzes the identity verification instruction issued by the server, calls a position acquisition interface to acquire the geographic position information of the surveyor based on the analysis result, and uploads second identity identification information carrying the geographic position information to the server;
the first terminal analyzes the identity verification instruction issued by the server, calls an image acquisition interface to acquire a target identity image of the investigator based on an analysis result, and uploads first identity identification information carrying the target identity image to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
extracting the address information of the mutual-help application member recorded in the mutual-help application order, and calculating the coordinate distance between the reference coordinate information and the coordinate information based on the reference coordinate information corresponding to the address information and the coordinate information corresponding to the geographical position information carried by the second identity identification information;
judging whether the coordinate distance is smaller than a preset coordinate distance threshold value or not;
if the first identity identification information is smaller than the second identity identification information, extracting target identity characteristics contained in the target identity image carried in the first identity identification information;
judging whether the feature similarity of the target identity feature and a pre-stored benchmark identity feature of the investigator is greater than a preset feature similarity threshold value or not;
if the identity verification result is larger than the reference identity characteristic, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity characteristic and returning the verification result page to the second terminal, and displaying the verification result page after the second terminal receives the verification result page;
and if not, determining that the authentication result is that the authentication fails.
Optionally, at least one of the first terminal and the second terminal, which receives the authentication instruction, acquires the identification information by executing the authentication instruction, and uploads the identification information to the server, where the method includes:
the first terminal analyzes the identity verification instruction issued by the server, calls an image acquisition interface and/or a voice acquisition interface to acquire the identity image and/or the identity voice of the investigator based on the analysis result, and uploads identity identification information carrying the identity image and/or the identity voice to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
judging whether the identity image and/or the identity sound carried in the identity identification information is consistent with a pre-stored reference identity image and/or reference identity sound of the investigator;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, at least one of the first terminal and the second terminal, which receives the authentication instruction, acquires the identification information by executing the authentication instruction, and uploads the identification information to the server, where the method includes:
the second terminal analyzes the identity verification instruction issued by the server, calls an image acquisition interface to acquire the identity image of the investigator based on the analysis result, and sends identity identification information carrying the identity image to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
judging whether the image similarity between the identity image carried in the identity identification information and a pre-stored benchmark identity image of the investigator is greater than a pre-set image similarity threshold value or not;
if the identity verification result is larger than the reference identity image, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity image and returning the verification result page to the second terminal, and displaying the verification result page after the second terminal receives the verification result page;
and if not, determining that the authentication result is that the authentication fails.
Optionally, the server is further configured to generate a survey pass of the surveyor, and issue the survey pass to the first terminal when receiving a first viewing request submitted by the first terminal;
the first terminal submits the first viewing request to the server based on the first viewing touch action after receiving the first viewing touch action submitted by the pass viewing interface of the mutual help application page triggered by the mutual help application member, and receives and displays the investigation pass issued by the server.
Optionally, the server is further configured to issue the investigation pass to the second terminal when receiving a second viewing request submitted by the first terminal, and the second terminal displays the investigation pass when receiving the investigation pass issued by the server;
and after receiving a second viewing touch action submitted by the investigator through triggering a pass viewing interface of the mutual help application page, the first terminal submits the second viewing request to the server based on the second viewing touch action.
Optionally, the server is further configured to receive survey data of the mutual-help application order submitted by the second terminal when the identity verification result is that the identity verification passes, perform mutual-help verification on the mutual-help application order based on the survey data, and issue an obtained mutual-help verification result to the first terminal and the second terminal.
An embodiment of the present specification provides an information verification system, including:
the system comprises a server, a first terminal and a second terminal;
the first terminal is configured to receive the submitted touch action, send an authentication request to the server based on the touch action, and receive and display an authentication result returned by the server for the authentication request;
the server is configured to issue a verification instruction to at least one of the first terminal and the second terminal according to the received verification request, perform information verification based on identification information uploaded after the verification instruction is issued, and return the obtained verification result to the first terminal;
and at least one of the first terminal and the second terminal which receives the verification instruction acquires the identification information by executing the verification instruction and uploads the identification information to the server.
An embodiment of the present specification provides an identity authentication method, including:
receiving an identity authentication request aiming at an investigator and sent by a terminal;
based on the identity authentication request, issuing an identity authentication instruction to the terminal;
receiving the identity identification information of the investigator uploaded by the terminal;
and performing identity authentication on the investigator based on the identity identification information, and returning an obtained identity authentication result to the terminal.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether a target verification code carried in first identity identification information uploaded by the first terminal is consistent with a verification code carried in second identity identification information uploaded by the second terminal;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
calculating the time difference between the input time carried in the first identity identification information uploaded by the first terminal and the generation time carried in the second identity identification information uploaded by the second terminal;
judging whether the time difference exceeds a preset input duration threshold value or not;
if not, judging whether the target verification code carried in the first identity identification information is consistent with the verification code carried in the second identity identification information;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, if the execution result after the substep of determining whether the time difference exceeds the preset input duration threshold is that the time difference exceeds the input duration threshold, the following operations are executed:
issuing a secondary identity verification instruction to the second terminal;
judging whether the image similarity between the identity image uploaded by the second terminal and the prestored benchmark identity image of the investigator is greater than an image similarity threshold value or not;
if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, and returning the authentication result page to the first terminal;
and if not, determining that the authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
extracting address information of the mutual aid application members recorded in the mutual aid application order;
calculating the coordinate distance between the reference coordinate information and the coordinate information based on the reference coordinate information corresponding to the address information and the coordinate information corresponding to the geographical position information carried by the second identity information uploaded by the second terminal;
judging whether the coordinate distance is smaller than a preset coordinate distance threshold value or not;
if the first identity identification information is less than the second identity identification information, extracting target identity characteristics contained in a target identity image carried in the first identity identification information uploaded by the first terminal;
judging whether the feature similarity of the target identity feature and a pre-stored benchmark identity feature of the investigator is greater than a preset feature similarity threshold value or not;
if the identity verification result is larger than the reference identity characteristic, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity characteristic, and returning the verification result page to the second terminal;
and if not, determining that the authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether the identity image and/or the identity sound carried in the identity identification information uploaded by the first terminal is consistent with a prestored reference identity image and/or reference identity sound of the investigator or;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether the image similarity between the identity image carried in the identity identification information uploaded by the second terminal and the prestored reference identity image of the investigator is greater than a preset image similarity threshold value or not;
if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, and returning the authentication result page to the second terminal;
and if not, determining that the authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal, and the method further includes:
generating a survey pass for the surveyor;
and issuing the investigation pass to the first terminal when a first viewing request submitted by the first terminal is received.
Optionally, the identity authentication method further includes:
and when a second viewing request submitted by the first terminal is received, issuing the investigation pass to the second terminal.
Optionally, the identity authentication method further includes:
under the condition that the identity authentication result is that the identity authentication is passed, receiving survey data of a mutual-help application order submitted by the second terminal;
and performing mutual-aid checking on the mutual-aid application order based on the survey data, and issuing an obtained mutual-aid checking result to the first terminal and the second terminal.
An embodiment of the present specification provides an identity authentication apparatus, including:
the identity authentication request receiving module is configured to receive an identity authentication request for an investigator, which is sent by a terminal;
the identity authentication instruction issuing module is configured to issue an identity authentication instruction to the terminal based on the identity authentication request;
the identity information receiving module is configured to receive the identity information of the investigator uploaded by the terminal;
and the identity authentication module is configured to authenticate the identity of the investigator based on the identity identification information and return the obtained identity authentication result to the terminal.
An embodiment of the present specification provides another identity authentication method, including:
receiving a touch action submitted by a mutual help application member through an identity verification interface of a mutual help application page corresponding to a triggered mutual help application order;
sending an identity verification request for the investigator to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
receiving an identity verification instruction issued by the server, and acquiring identity identification information by executing the identity verification instruction and uploading the identity identification information to the server;
and receiving and displaying an authentication result returned by the server aiming at the authentication request.
Optionally, the receiving the authentication instruction issued by the server, and acquiring the identity identifier information by executing the authentication instruction and uploading the identity identifier information to the server includes:
receiving and analyzing the identity verification instruction issued by the server, and generating and displaying a verification code entry page based on an analysis result;
and receiving a target verification code input by the mutual-help application member based on the verification code entry page, and uploading first identity identification information carrying the target verification code to the server.
Optionally, the receiving the authentication instruction issued by the server, and acquiring the identity identifier information by executing the authentication instruction and uploading the identity identifier information to the server includes:
receiving and analyzing the identity verification instruction issued by the server, and generating and displaying a verification code entry page based on an analysis result;
and receiving a target verification code input by the mutual-help application member based on the verification code entry page, and uploading first identity identification information carrying the target verification code and the input time thereof to the server.
Optionally, the identity authentication method further includes:
and receiving and displaying a verification result page which is returned by the server and contains the identity image and the reference identity image of the investigator.
Optionally, the receiving the authentication instruction issued by the server, and acquiring the identity identifier information by executing the authentication instruction and uploading the identity identifier information to the server includes:
receiving and analyzing the identity verification instruction issued by the server, and calling an image acquisition interface to acquire a target identity image of the investigator based on an analysis result;
and uploading first identity identification information carrying the target identity image to the server.
Optionally, the receiving the authentication instruction issued by the server, and acquiring the identity identifier information by executing the authentication instruction and uploading the identity identifier information to the server includes:
receiving and analyzing the identity verification instruction issued by the server, and calling an image acquisition interface and/or a voice acquisition interface to acquire the identity image and/or the identity voice of the investigator based on the analysis result;
and uploading the identity identification information carrying the identity image and/or the identity sound to the server.
Optionally, the identity authentication method further includes:
after receiving a first viewing touch action submitted by the mutual help application member through triggering a pass viewing interface of the mutual help application page, submitting a first viewing request to the server based on the first viewing touch action;
and receiving and displaying the investigation pass of the investigator issued by the server.
Optionally, the identity authentication method further includes:
after receiving a second viewing touch action submitted by the investigator through triggering a pass viewing interface of the mutual help application page, submitting a second viewing request to the server based on the second viewing touch action.
Optionally, the identity authentication method further includes:
and receiving a mutual-help checking result sent by the server.
An embodiment of the present specification provides another identity authentication apparatus, including:
the touch action receiving module is configured to receive a touch action submitted by a mutual help application member through an identity verification interface of a mutual help application page corresponding to a triggered mutual help application order;
an authentication request sending module configured to send an authentication request for an investigator to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
the identity authentication instruction execution module is configured to receive an identity authentication instruction issued by the server, and acquire identity identification information by executing the identity authentication instruction and upload the identity identification information to the server;
and the identity authentication result receiving module is configured to receive and display an identity authentication result returned by the server for the identity authentication request.
An embodiment of the present specification provides a computing device, including:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving an identity authentication request aiming at an investigator and sent by a terminal;
issuing an identity verification instruction to the terminal based on the identity verification request;
receiving the identity identification information of the investigator uploaded by the terminal;
and performing identity authentication on the investigator based on the identity identification information, and returning an obtained identity authentication result to the terminal.
An embodiment of the present specification provides another computing device, including:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving a touch action submitted by a mutual help application member through an identity verification interface of a mutual help application page corresponding to a triggered mutual help application order;
sending an identity verification request for the investigator to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
receiving an identity verification instruction issued by the server, and acquiring identity identification information by executing the identity verification instruction and uploading the identity identification information to the server;
and receiving and displaying an authentication result returned by the server aiming at the authentication request.
Embodiments of the present description provide a computer-readable storage medium storing computer instructions, which when executed by a processor, implement the steps of the authentication method.
Embodiments of the present description provide another computer-readable storage medium storing computer instructions, which when executed by a processor, implement the steps of the authentication method.
An embodiment of this specification provides's authentication system surveys the in-process at the researcher to the mutual aid application member, with the help of the mutual aid application member's first terminal with the researcher's second terminal, it is right that the cooperation server carries out authentication, makes the mutual aid application member can participate in and the perception the researcher's authentication process to this promotes the mutual aid application member is to the researcher's trust degree, eliminates the mutual aid application member is right the researcher's identity is worried about, reduces mutual aid application member's in the mutual aid project consulting volume and communication cost.
Drawings
Fig. 1 is a block diagram of an architecture of an authentication system provided in an embodiment of the present specification;
FIG. 2 is a schematic diagram of a verification code display provided in an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a passcode entry page provided by an embodiment of the present description;
FIG. 4 is a block diagram of an architecture of an information verification system provided by an embodiment of the present specification;
fig. 5 is a processing flow diagram of an identity verification method provided by an embodiment of the present specification;
fig. 6 is a schematic diagram of an authentication apparatus provided in an embodiment of the present specification;
fig. 7 is a flowchart of another authentication method provided in the embodiments of the present specification;
fig. 8 is a schematic view of another authentication device provided in the embodiments of the present specification;
FIG. 9 is a block diagram of a computing device provided by embodiments of the present specification;
fig. 10 is a block diagram of another computing device provided in an embodiment of the present specification.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present description. This description may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, as those skilled in the art will be able to make and use the present disclosure without departing from the spirit and scope of the present disclosure.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, etc. may be used herein in one or more embodiments to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first can also be referred to as a second and, similarly, a second can also be referred to as a first without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
One embodiment of the present specification provides an identity authentication system, and one or more embodiments of the present specification further provide an identity authentication system, an information authentication system, two identity authentication methods, two identity authentication apparatuses, two computing devices, and two computer-readable storage media. The following detailed description and the explanation of the steps of the method are individually made with reference to the drawings of the embodiments provided in the present specification.
The embodiment of the identity authentication system provided by the specification is as follows:
referring to fig. 1, there is shown an architectural block diagram of an authentication system provided in an embodiment of the present specification, where the authentication system includes:
a server 102, a first terminal 104 of a mutual assistance application member and a second terminal 106 of an investigator;
the first terminal 104 is configured to receive a touch action submitted by the mutual assistance application member through an authentication interface triggering a mutual assistance application page corresponding to a mutual assistance application order, send an authentication request for the surveyor to the server 102 based on the touch action, and receive and display an authentication result returned by the server 102 for the authentication request; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
the server 102 is configured to issue an authentication instruction to at least one of the first terminal 104 and the second terminal 106 according to the received authentication request, perform authentication on the investigator based on the identity identification information of the investigator uploaded after the authentication instruction is issued, and return the obtained authentication result to the first terminal 104;
at least one of the first terminal 104 and the second terminal 106 receiving the authentication instruction collects the identification information by executing the authentication instruction and uploads the identification information to the server 102.
The mutual aid item in this embodiment is a mutual aid economic insurance item, and the mutual aid item may also be a mutual aid economic crowd funding item, a mutual aid economic investment item, and the like. The members participating in the mutual aid project are project members of the mutual aid project, for example, the project members participating in the mutual aid economic insurance project are project members of the mutual aid economic insurance project.
The mutual aid complementary insurance project refers to a group of members with the same requirement, the group of members mutually perform mutual aid complementary by participating in the mutual aid complementary insurance project, namely, the group of members commonly participate in the mutual aid complementary insurance project, when any project member participating in the mutual aid complementary insurance project is suffered from accidents or faces other special conditions needing help, the project member proposes a mutual aid application (claim application), if the mutual aid application is approved, other project members participating in the mutual aid complementary insurance project (all project members except the project member who proposes the mutual aid application) perform mutual aid complementary by providing mutual aid money.
Specifically, in the process of issuing mutual funds to the project members who have submitted mutual application, the mutual funds are paid by other project members in an apportionment mode, that is: the project member provides the mutual-help coordination for the project member who proposes the mutual-help application by paying a certain apportioned amount, and the mutual-help coordination insurance project is characterized by 'post-payment', namely: when any project member participating in the mutual-aid type insurance project is subjected to accident or faces other special conditions needing help, the project member who submits the mutual-aid application is mutually assisted and complemented by other project members in a certain fee paying mode.
In practical application, before deciding whether to issue mutual funds to the project members who submit mutual applications (i.e. the mutual application members), the mutual application project creates corresponding mutual application orders for the mutual applications submitted by each mutual application member, and further allocates investigators who conduct interview investigation on the mutual application members under the line for each mutual application order, and the investigators upload investigation data obtained by interview on the mutual application members, and the investigation data is used as a reference for whether to issue the mutual funds to the mutual application members. In the process of the interviewing investigation of the mutual application members by the investigator, due to the concerns of safety and privacy protection, the mutual application members may question the identity of the investigator, even if the investigator shows identification information such as an identity card or a work card, the mutual application members still may have distrust on the identity of the investigator, so that the investigation work is influenced, and meanwhile, the actual participation experience of the mutual application members participating in the mutual project is influenced.
In view of the above, in the identity verification system provided in this embodiment, in the process of the investigator investigating the mutual application member, the identity of the investigator is verified by the server 102 in cooperation with the terminal device (the first terminal 104) of the mutual application member and the terminal device (the second terminal 106) of the investigator, so that the mutual application member can participate in and perceive the identity verification process of the investigator, the trust sense of the mutual application member on the investigator is improved, and the participation experience of the mutual application member in the mutual project of performing the mutual application is improved.
In a first optional implementation manner provided in this embodiment, the server 102 issues an authentication instruction to at least one of the first terminal 104 and the second terminal 106 according to the authentication request, specifically, sends corresponding authentication instructions to the first terminal 104 and the second terminal 106 respectively; correspondingly, in the process that at least one of the first terminal 104 and the second terminal 106 receives the authentication instruction, acquires the identification information by executing the authentication instruction, and uploads the identification information to the server 102, the first terminal 104 and the second terminal 106 respectively receive the authentication instruction issued by the server 102, and acquire the identification information by executing the authentication instruction, and upload the identification information to the server 102, which is specifically implemented as follows:
the second terminal 106 analyzes the identity verification instruction issued by the server 102, invokes a verification code generation algorithm based on the analysis result to generate a verification code, displays the verification code and uploads second identity identification information carrying the verification code to the server 102;
the first terminal 104 analyzes the identity verification instruction issued by the server 102, generates and displays a verification code entry page based on an analysis result, receives a target verification code input by the mutual assistance application member based on the verification code entry page, and uploads first identity identification information carrying the target verification code to the server 102;
on this basis, after receiving the first identity identification information uploaded by the first terminal 104 and the second identity identification information uploaded by the second terminal 106, the server 102 performs identity authentication on the investigator based on the first identity identification information and the second identity identification information, specifically, performs identity authentication on the investigator by judging whether the target authentication code carried in the first identity identification information is consistent with the authentication code carried in the second identity identification information, and if so, determines that the identity authentication result of the investigator is that the authentication is passed; and if the identity authentication result is inconsistent, determining that the identity authentication result of the investigator is not authenticated.
For example, a mutual assistance application member a who applies for claim mutual assistance in a mutual assistance type insurance project, the mutual assistance application member a generates a corresponding mutual assistance application Order after applying for claim mutual assistance, in the process of processing the mutual assistance application Order of the mutual assistance application member a, namely, in the process of determining whether to issue mutual assistance money to the mutual assistance application member a according to the distributed investigator b recorded in the mutual assistance application Order, the investigator b performs a interview survey on the mutual assistance application member a, and in the interview process, the investigator b needs to be authenticated at first, and subsequent survey data is acquired under the condition that the authentication is passed;
in the process of identity verification of the investigator b, firstly, a mutual assistance application member A triggers an identity verification interface of a mutual assistance application page corresponding to a mutual assistance application Order displayed on a screen of a first mobile terminal carried by the mutual assistance application member A by using a click touch action, and after receiving a click touch action sent by the mutual assistance application member A aiming at the identity verification interface, the first mobile terminal sends an identity verification request for identity verification of the investigator b recorded in the mutual assistance application Order to a server;
secondly, after receiving an identity authentication request submitted by the first mobile terminal for authenticating the identity of the investigator b, the server respectively issues corresponding identity authentication instructions to the first mobile terminal and a second mobile terminal of the investigator b;
thirdly, after receiving the identity verification instruction issued by the server, the second mobile terminal calls a verification code generation algorithm in a mode of analyzing the identity verification instruction and executing an instruction code obtained by analysis, generates a verification code and displays the verification code on a screen, as shown in fig. 2, the purpose of displaying the verification code is to enable a mutual assistance application member a to acquire the verification code, and the second mobile terminal also needs to upload the generated verification code to the server in a form of second identity identification information;
after receiving an identity verification instruction issued by a server, a first mobile terminal renders a verification code entry page in a mode of analyzing the identity verification instruction and executing an instruction code obtained by analysis and displays the verification code entry page on a screen, as shown in fig. 3, a mutual assistance application member A inputs a verification code acquired from a second mobile terminal on the verification code entry page, and the first mobile terminal uploads the verification code input by the mutual assistance application member A to the server;
finally, after receiving the verification codes uploaded by the second mobile terminal and the first mobile terminal respectively, the server compares the verification codes uploaded by the second mobile terminal and the first mobile terminal, if the comparison result is that the verification codes uploaded by the second mobile terminal and the first mobile terminal are consistent, the fact that the investigator b passes identity verification in the interview investigation process is shown, the server returns the identity verification result to the first mobile terminal, and the first mobile terminal displays the identity verification result on a screen to remind the mutual assistance application member A of the identity authenticity of the investigator b;
if the comparison result shows that the verification codes uploaded by the two are inconsistent and the identity verification of the investigator is not passed, the server returns the identity verification result which is not passed to the first mobile terminal, and the first mobile terminal displays the identity verification result on a screen to remind the mutual-help application member A that the identity of the investigator b is in doubt.
In a second optional implementation manner provided in this embodiment, the server 102 issues an authentication instruction to at least one of the first terminal 104 and the second terminal 106 according to the authentication request, specifically, sends corresponding authentication instructions to the first terminal 104 and the second terminal 106, respectively; correspondingly, in the process that at least one of the first terminal 104 and the second terminal 106 receives the authentication instruction, acquires the identification information by executing the authentication instruction, and uploads the identification information to the server 102, the first terminal 104 and the second terminal 106 respectively receive the authentication instruction issued by the server 102, and acquire the identification information by executing the authentication instruction, and upload the identification information to the server 102, which is specifically implemented as follows:
the second terminal 106 analyzes the identity verification instruction issued by the server 102, calls a verification code generation algorithm based on the analysis result to generate and display the verification code of the investigator, and uploads second identity identification information carrying the verification code and the generation time thereof to the server 102;
the first terminal 104 analyzes the identity verification instruction issued by the server 102, generates and displays a verification code entry page based on an analysis result, receives a target verification code input by the mutual assistance application member based on the verification code entry page, and uploads first identity identification information carrying the target verification code and input time thereof to the server 102;
on this basis, after receiving the first identification information uploaded by the first terminal 104 and the second identification information uploaded by the second terminal 106, the authenticating the investigator based on the first identification information and the second identification information specifically includes:
calculating a time difference between the entry time carried in the first identity identification information and the generation time carried in the second identity identification information;
judging whether the time difference exceeds a preset input duration threshold value or not;
if the target verification code is not exceeded, the mutual assistance application member is indicated to utilize the first terminal 104 to realize the input and submission of the verification code within the specified time, and the submitted verification code is valid in a time plane, and whether the target verification code carried in the first identity identification information is consistent with the verification code carried in the second identity identification information is further judged; if the identity authentication result of the investigator is consistent with the identity authentication result of the investigator, the identity authentication result of the investigator is determined to be passed; and if the identity authentication result is inconsistent, determining that the identity authentication result of the investigator is not authenticated.
On the other hand, if the time difference exceeds the preset input duration threshold, it indicates that the mutual assistance application member does not complete the input and submission of the verification code within the specified time, and the input verification code is invalid in the time plane, on the basis, in order to improve the comprehensiveness of the identity verification performed by the investigator, under the condition that the verification code submitted by the mutual assistance application member is invalid in the time plane, the identity recognition is performed on the investigator from the image recognition plane, and the specific implementation is as follows:
the server 102 issues a secondary identity authentication instruction to the second terminal 106, the second terminal 106 analyzes the secondary identity authentication instruction issued by the server 102, and an image acquisition interface is called to acquire the identity image of the investigator and upload the identity image to the server 102 based on the analysis result; judging whether the image similarity between the identity image uploaded by the second terminal 106 and the prestored reference identity image of the investigator is greater than an image similarity threshold value;
if the identity verification result of the surveyor is determined to be passed through verification, a verification result page comprising the identity image and the reference identity image is generated and returned to the first terminal 104, and the first terminal 104 displays the verification result page after receiving the verification result page (for example, the verification result page is displayed on a screen of a first mobile terminal of a mutual application member a, wherein a survey employee card of the surveyor b is displayed on the left side of the verification result page, and a facial image of the surveyor b collected after a secondary identity verification instruction is issued is displayed on the right side of the verification result page);
and if not, determining that the identity verification result of the investigator is verification failure.
In a third optional implementation manner provided in this embodiment, the server 102 issues an authentication instruction to at least one of the first terminal 104 and the second terminal 106 according to the authentication request, specifically, sends corresponding authentication instructions to the first terminal 104 and the second terminal 106, respectively; correspondingly, in the process that at least one of the first terminal 104 and the second terminal 106 receives the authentication instruction, acquires the identification information by executing the authentication instruction, and uploads the identification information to the server 102, the first terminal 104 and the second terminal 106 respectively receive the authentication instruction issued by the server 102, and acquire the identification information by executing the authentication instruction, and upload the identification information to the server 102, which is specifically implemented as follows:
the second terminal 106 analyzes the identity verification instruction issued by the server 102, calls a position acquisition interface to acquire geographical position information of the surveyor based on an analysis result, and uploads second identity identification information carrying the geographical position information to the server 102;
the first terminal 104 analyzes the identity verification instruction issued by the server 102, calls an image acquisition interface to acquire a target identity image of the investigator based on an analysis result, and uploads first identity identification information carrying the target identity image to the server 102;
on this basis, after receiving the first identification information uploaded by the first terminal 104 and the second identification information uploaded by the second terminal 106, the authenticating the investigator based on the first identification information and the second identification information specifically includes:
extracting the address information of the mutual-help application member recorded in the mutual-help application order, and calculating the coordinate distance between the reference coordinate information and the coordinate information based on the reference coordinate information corresponding to the address information and the coordinate information corresponding to the geographical position information carried by the second identity identification information;
judging whether the coordinate distance is smaller than a preset coordinate distance threshold value or not;
if the first identity identification information is smaller than the second identity identification information, extracting target identity characteristics contained in the target identity image carried in the first identity identification information;
judging whether the feature similarity of the target identity feature and a pre-stored benchmark identity feature of the investigator is greater than a preset feature similarity threshold value or not;
if the identity verification result of the investigator is confirmed to be passed through verification, a verification result page containing the identity image and the reference identity characteristic is generated and returned to the second terminal, and the second terminal displays the verification result page after receiving the verification result page;
and if not, determining that the identity verification result of the investigator is verification failure.
For example, a mutual assistance application member a who applies for claim mutual assistance in a mutual assistance type insurance project, the mutual assistance application member a generates a corresponding mutual assistance application Order after applying for claim mutual assistance, in the process of processing the mutual assistance application Order of the mutual assistance application member a, namely, in the process of determining whether to issue mutual assistance money to the mutual assistance application member a according to the distributed investigator b recorded in the mutual assistance application Order, the investigator b performs a interview survey on the mutual assistance application member a, and in the interview process, the investigator b needs to be authenticated at first, and subsequent survey data is acquired under the condition that the authentication is passed;
in the process of identity verification of the investigator b, firstly, a mutual assistance application member A triggers an identity verification interface of a mutual assistance application page corresponding to a mutual assistance application Order displayed on a screen of a first mobile terminal carried by the mutual assistance application member A by using a click touch action, and after receiving a click touch action sent by the mutual assistance application member A aiming at the identity verification interface, the first mobile terminal sends an identity verification request for identity verification of the investigator b recorded in the mutual assistance application Order to a server;
secondly, after receiving an identity authentication request submitted by the first mobile terminal for authenticating the identity of the investigator b, the server respectively issues corresponding identity authentication instructions to the first mobile terminal and a second mobile terminal of the investigator b;
thirdly, after the second mobile terminal receives the authentication instruction issued by the server, the second mobile terminal calls the GPS interface to acquire the geographical position information in a mode of analyzing the authentication instruction and executing the instruction code obtained by analysis, namely: collecting the geographical position information of the surveyor b, packaging the collected geographical position information in second identity information and uploading the second identity information to a server;
after receiving an identity authentication instruction issued by a server, a first mobile terminal calls an image shooting interface to acquire a facial image of an investigator b in a mode of analyzing the identity authentication instruction and executing an instruction code obtained by analysis, encapsulates the acquired facial image of the investigator b in first identity identification information and uploads the first identity identification information to the server;
finally, after receiving second identity identification information uploaded by a second mobile terminal and first identity identification information uploaded by a first mobile terminal, the server extracts geographical position information of the surveyor b contained in the second identity identification information, extracts home address information of the mutual assistance application member A recorded in the Order of the mutual assistance application, and judges whether the coordinate distance between coordinate information corresponding to the geographical position information and coordinate information corresponding to the home address information is smaller than a preset coordinate distance threshold value or not through calculation and judgment to judge whether the surveyor b actually goes to the address of the mutual assistance application member A for surface access investigation or not;
if the coordinate distance between the two is smaller than a preset coordinate distance threshold value, the fact that the surveyor b actually goes to the address where the mutual-help application member A is located for visiting investigation is indicated, identity verification is further conducted on the surveyor b from the face image, specifically, facial features contained in the face image collected and uploaded by the first mobile terminal are extracted, and whether feature similarity between the extracted facial features and facial features in a survey employee card of the surveyor b stored in a database of the mutual-help insurance project in advance is larger than a feature similarity threshold value is judged;
if the number of the application data is larger than the preset number, the fact that the surveyor b passes identity verification in the face-up survey process is shown, the server returns the identity verification result to a second mobile terminal of the surveyor b, a survey employee certificate of the surveyor b is displayed on the left side of a screen of the second mobile terminal, a face image shot by a mutual application member A through a first mobile terminal is displayed on the right side of the screen, finally, the survey employee certificate and the face image displayed on the screen are displayed to the mutual application member A by the surveyor b, the identity authenticity of the surveyor b is further reminded to the mutual application member A, meanwhile, the situation that the surveyor b does not actually go to the address of the mutual application member A to conduct face-up survey and compile survey data is avoided, and the situation that the surveyor b and the mutual application member A are jointly cheated and;
if the identity authentication result is not larger than the preset identity authentication result, the fact that the identity authentication of the investigator b is not passed in the interview investigation process is indicated, the server returns the identity authentication result which is not passed to the first mobile terminal, and the first mobile terminal displays the identity authentication result on a screen to remind the mutual-help application member A that the identity of the investigator b is in doubt.
In a fourth optional implementation manner provided in this embodiment, the server 102 issues an authentication instruction to at least one of the first terminal 104 and the second terminal 106 according to the authentication request, specifically, sends a corresponding authentication instruction to the first terminal 104; correspondingly, in the process that the first terminal 104 acquires the identification information by executing the authentication instruction and uploads the identification information to the server 102, the first terminal 104 receives the authentication instruction issued by the server 102 and acquires the identification information by executing the authentication instruction and uploads the identification information to the server 102, which is specifically realized as follows:
the first terminal 104 analyzes the identity verification instruction issued by the server 102, calls an image acquisition interface and/or a voice acquisition interface to acquire the identity image and/or the identity voice of the investigator based on the analysis result, and uploads the identity identification information carrying the identity image and/or the identity voice to the server 102;
on this basis, after receiving the identity information of the surveyor uploaded by the first terminal 104, the server 102 performs identity verification on the surveyor based on the identity information, specifically, determines whether the identity image and/or the identity sound carried in the identity information are consistent with a pre-stored reference identity image and/or reference identity sound of the surveyor; if so, determining that the identity verification result of the investigator is verification pass; and if not, determining that the identity verification result of the investigator is verification failure.
In a fifth optional implementation manner provided in this embodiment, the server 102 issues an authentication instruction to at least one of the first terminal 104 and the second terminal 106 according to the authentication request, specifically, sends a corresponding authentication instruction to the second terminal 104; correspondingly, in the process that the second terminal 104 acquires the identification information by executing the authentication instruction and uploads the identification information to the server 102, the second terminal 104 receives the authentication instruction issued by the server 102 and acquires the identification information by executing the authentication instruction and uploads the identification information to the server 102, which is specifically realized as follows:
the second terminal 106 analyzes the identity verification instruction issued by the server 102, calls an image acquisition interface to acquire the identity image of the investigator based on the analysis result, and sends identity identification information carrying the identity image to the server 102;
on this basis, after receiving the identity information of the surveyor uploaded by the second terminal 106, the server 102 performs identity verification on the surveyor based on the identity information, specifically, determines whether the image similarity between the identity image carried in the identity information and a pre-stored reference identity image of the surveyor is greater than a pre-set image similarity threshold; if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, returning the authentication result page to the second terminal 106, and displaying the authentication result page after the second terminal 106 receives the authentication result page; and if not, determining that the authentication result is that the authentication fails.
The above-mentioned five optional implementation ways that provide are in the investigator is right when the mutual-aid application member carries out the interview investigation (promptly the investigator with when the mutual-aid application member sees the face) to the investigator carries out authentication, for promoting investigator authentication's comprehensiveness is right when the interview investigation on the basis that the investigator carries out authentication, still can be right before or after the interview investigation the investigator carries out authentication to this promotes the mutual-aid application member is right investigator's identity trust degree, eliminates mutual-aid application member is right investigator's identity concern reduces mutual-aid application member's consulting volume and communication cost in the mutual-aid project.
In an optional implementation manner provided by this embodiment, before an interview survey, the identity of the surveyor is verified, which is implemented by the server 102 in cooperation with the first terminal 104, specifically, the server 102 generates a survey pass (for example, a survey employee's pass) of the surveyor, and after receiving a first viewing touch action submitted by the surveyor through triggering a pass viewing interface of the mutual help application page, the first terminal submits a first viewing request to the server based on the first viewing touch action; the server 102 issues the investigation pass to the first terminal 104 when receiving the first viewing request submitted by the first terminal 104, and finally the investigation pass issued by the server 102 is received and displayed by the first terminal, so that the identity trust degree of the investigator can be improved after the mutual assistance application member views the investigation pass.
Further, before interviewing and surveying, the identity of the surveyor is verified, and the server 102 may be implemented by matching the first terminal 104 and the second terminal 106, specifically, when receiving a second viewing touch action submitted by the surveyor through triggering a pass viewing interface of the mutual application page, the first terminal 104 submits a second viewing request to the server 102 based on the second viewing touch action; when receiving a second viewing request submitted by the first terminal 104, the server 102 issues the investigation pass to the second terminal 106, and finally the second terminal 106 realizes the display of the investigation pass, and the investigation pass displayed by the second terminal 106 is displayed by the investigator to the mutual-help application member, so that the mutual-help application member can know the investigation pass displayed by the second terminal 106, and the mutual-help application member can further improve the identity trust of the investigator after viewing the investigation pass.
In specific implementation, after the identity verification of the surveyor is completed in the process of performing the interview survey on the mutual aid application member by the surveyor, and on the basis that the identity verification result of the identity verification of the surveyor is verification passed, the second terminal 106 collects the survey data of the mutual aid application order and submits the survey data to the server 102, the server 102 receives the survey data of the mutual aid application order submitted by the second terminal 106, performs the mutual aid verification on the mutual aid application order based on the survey data, and issues the obtained mutual aid verification result to the first terminal 104 and the second terminal 106.
In summary, the identity verification system performs identity verification on the investigator by means of the first terminal 104 of the mutual application member and the second terminal 106 of the investigator in the process that the investigator investigates the mutual application member, so that the mutual application member can participate in and perceive the identity verification process performed on the investigator, the trust level of the mutual application member on the investigator is improved, the identity worry of the mutual application member on the investigator is eliminated, and the consultation amount and communication cost of the mutual application member in the mutual item are reduced.
An embodiment of an information verification system provided in this specification is as follows:
referring to fig. 4, it shows an architecture block diagram of an information verification system provided by an embodiment of the present specification, where the information verification system includes:
a server 402, a first terminal 404, and a second terminal 406;
the first terminal 404 is configured to receive the submitted touch action, send an authentication request to the server 402 based on the touch action, and receive and display an authentication result returned by the server 402 for the authentication request;
the server 402 is configured to issue a verification instruction to at least one of the first terminal 404 and the second terminal 406 according to the received verification request, perform information verification based on the identification information uploaded after the verification instruction is issued, and return the obtained verification result to the first terminal 404;
at least one of the first terminal 404 and the second terminal 406 receiving the verification instruction collects the identification information by executing the verification instruction and uploads the identification information to the server 402.
Optionally, at least one of the first terminal 404 and the second terminal 406, which receives the verification instruction, acquires the identification information by executing the verification instruction, and uploads the identification information to the server 402, including:
the second terminal 406 analyzes the verification instruction issued by the server 402, invokes a verification code generation algorithm based on the analysis result to generate a verification code, displays the verification code, and uploads second identification information carrying the verification code to the server 402;
the first terminal 404 analyzes the verification instruction issued by the server 402, generates and displays a verification code entry page based on an analysis result, receives a target verification code input based on the verification code entry page, and uploads first identification information carrying the target verification code to the server 402;
correspondingly, the information verification performed by the server 402 based on the identification information uploaded after the verification instruction is issued includes:
judging whether the target verification code carried in the first identification information is consistent with the verification code carried in the second identification information;
if so, determining that the verification result is verification pass;
if not, determining that the verification result is verification failure.
Optionally, at least one of the first terminal 404 and the second terminal 406, which receives the verification instruction, acquires the identification information by executing the verification instruction, and uploads the identification information to the server 402, including:
the second terminal 406 analyzes the verification instruction issued by the server 402, calls a verification code generation algorithm based on the analysis result to generate and display a verification code, and uploads second identification information carrying the verification code and the generation time thereof to the server 402;
the first terminal 404 analyzes the verification instruction issued by the server 402, generates and displays a verification code entry page based on an analysis result, receives a target verification code input based on the verification code entry page, and uploads first identification information carrying the target verification code and input time thereof to the server 402;
correspondingly, the information verification performed by the server 402 based on the identification information uploaded after the verification instruction is issued includes:
calculating the time difference between the entry time carried in the first identification information and the generation time carried in the second identification information;
judging whether the time difference exceeds a preset input duration threshold value or not;
if not, judging whether the target verification code carried in the first identification information is consistent with the verification code carried in the second identification information;
if so, determining that the verification result is verification pass;
if not, determining that the verification result is verification failure.
Optionally, if the execution result after the operation of judging whether the time difference exceeds the preset input duration threshold is that the time difference exceeds the input duration threshold, the following operations are executed:
the server 402 issues a secondary verification instruction to the second terminal 406, and the second terminal 406 analyzes the secondary verification instruction issued by the server 402, calls an image acquisition interface to acquire an image based on an analysis result, and uploads the image to the server 402;
the server 402 determines whether the image similarity between the image uploaded by the second terminal 406 and the pre-stored reference image is greater than an image similarity threshold;
if the verification result is larger than the reference image, determining that the verification result is that the verification is passed, generating a verification result page containing the image and the reference image and returning the verification result page to the first terminal 404, and displaying the verification result page after the first terminal 404 receives the verification result page;
if not, determining that the verification result is verification failure.
Optionally, at least one of the first terminal 404 and the second terminal 406, which receives the verification instruction, acquires the identification information by executing the verification instruction, and uploads the identification information to the server 402, including:
the second terminal 406 analyzes the verification instruction issued by the server 402, calls a position acquisition interface to acquire geographical position information based on an analysis result, and uploads second identification information carrying the geographical position information to the server 402;
the first terminal 404 parses the verification instruction issued by the server 402, calls an image acquisition interface to acquire a target image based on a parsing result, and uploads first identification information carrying the target image to the server 402;
correspondingly, the information verification performed by the server 402 based on the identification information uploaded after the verification instruction is issued includes:
extracting pre-recorded address information, and calculating the coordinate distance between the reference coordinate information and the coordinate information based on the reference coordinate information corresponding to the address information and the coordinate information corresponding to the geographical position information carried by the second identification information;
judging whether the coordinate distance is smaller than a preset coordinate distance threshold value or not;
if the first identification information is smaller than the second identification information, extracting target features contained in the target image carried in the first identification information;
judging whether the feature similarity of the target feature and a pre-stored reference feature is larger than a preset feature similarity threshold value or not;
if the verification result is larger than the reference feature, determining that the verification result is that the verification is passed, generating a verification result page containing the image and the reference feature and returning the verification result page to the second terminal 406, and displaying the verification result page after the second terminal 406 receives the verification result page;
if not, determining that the verification result is verification failure.
Optionally, at least one of the first terminal 404 and the second terminal 406, which receives the verification instruction, acquires the identification information by executing the verification instruction, and uploads the identification information to the server 402, including:
the first terminal 404 analyzes the verification instruction issued by the server 402, calls an image acquisition interface and/or a sound acquisition interface to acquire images and/or sounds based on the analysis result, and uploads identification information carrying the images and/or the sounds to the server 402;
correspondingly, the information verification performed by the server 402 based on the identification information uploaded after the verification instruction is issued includes:
judging whether the image and/or the sound carried in the identification information is consistent with a pre-stored reference image and/or reference sound;
if so, determining that the verification result is verification pass;
if not, determining that the verification result is verification failure.
Optionally, at least one of the first terminal 404 and the second terminal 406, which receives the verification instruction, acquires the identification information by executing the verification instruction, and uploads the identification information to the server 402, including:
the second terminal 406 analyzes the verification instruction issued by the server 402, calls an image acquisition interface to acquire an image based on the analysis result, and sends identification information carrying the image to the server 402;
correspondingly, the information verification performed by the server 402 based on the identification information uploaded after the verification instruction is issued includes:
judging whether the image similarity between the image carried in the identification information and a pre-stored reference image is greater than a preset image similarity threshold value or not;
if the verification result is larger than the reference image, determining that the verification result is that the verification is passed, generating a verification result page containing the image and the reference image and returning the verification result page to the second terminal 406, and displaying the verification result page after the second terminal 406 receives the verification result page;
if not, determining that the verification result is verification failure.
Optionally, the server 402 is further configured to generate a pass, and issue the pass to the first terminal 404 when receiving the first viewing request submitted by the first terminal 404;
after receiving the submitted first viewing touch action, the first terminal 404 submits the first viewing request to the server 402 based on the first viewing touch action, and receives and displays the pass issued by the server 402.
Optionally, the server 402 is further configured to issue the pass to the second terminal 406 when receiving a second viewing request submitted by the first terminal 404, and the second terminal 406 displays the pass when receiving the pass issued by the server 402;
after receiving the submitted second viewing touch, the first terminal 404 submits the second viewing request to the server 402 based on the second viewing touch.
Optionally, the server 402 is further configured to receive, when the verification result is that the verification is passed, the survey data submitted by the second terminal 406, perform information verification based on the survey data, and send the obtained information verification result to the first terminal 404 and the second terminal 406.
The embodiment of the identity authentication method provided by the specification is as follows:
the embodiment of the present invention is described in a simpler way, and reference may be made to the corresponding description of the embodiment of the system for related parts.
Referring to fig. 5, a flowchart of a processing flow of an authentication method provided in an embodiment of the present specification is shown.
Step S502, receiving an identity authentication request aiming at an investigator and sent by a terminal;
step S504, based on the authentication request, issuing an authentication instruction to the terminal;
step S506, receiving the identity identification information of the investigator uploaded by the terminal;
step S508, performing identity authentication on the investigator based on the identity identification information, and returning an obtained identity authentication result to the terminal.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether a target verification code carried in first identity identification information uploaded by the first terminal is consistent with a verification code carried in second identity identification information uploaded by the second terminal;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
calculating the time difference between the input time carried in the first identity identification information uploaded by the first terminal and the generation time carried in the second identity identification information uploaded by the second terminal;
judging whether the time difference exceeds a preset input duration threshold value or not;
if not, judging whether the target verification code carried in the first identity identification information is consistent with the verification code carried in the second identity identification information;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, if the execution result after the substep of determining whether the time difference exceeds the preset input duration threshold is that the time difference exceeds the input duration threshold, the following operations are executed:
issuing a secondary identity verification instruction to the second terminal;
judging whether the image similarity between the identity image uploaded by the second terminal and the prestored benchmark identity image of the investigator is greater than an image similarity threshold value or not;
if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, and returning the authentication result page to the first terminal;
and if not, determining that the authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
extracting address information of the mutual aid application members recorded in the mutual aid application order;
calculating the coordinate distance between the reference coordinate information and the coordinate information based on the reference coordinate information corresponding to the address information and the coordinate information corresponding to the geographical position information carried by the second identity information uploaded by the second terminal;
judging whether the coordinate distance is smaller than a preset coordinate distance threshold value or not;
if the first identity identification information is less than the second identity identification information, extracting target identity characteristics contained in a target identity image carried in the first identity identification information uploaded by the first terminal;
judging whether the feature similarity of the target identity feature and a pre-stored benchmark identity feature of the investigator is greater than a preset feature similarity threshold value or not;
if the identity verification result is larger than the reference identity characteristic, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity characteristic, and returning the verification result page to the second terminal;
and if not, determining that the authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether the identity image and/or the identity sound carried in the identity identification information uploaded by the first terminal is consistent with a prestored reference identity image and/or reference identity sound of the investigator or;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether the image similarity between the identity image carried in the identity identification information uploaded by the second terminal and the prestored reference identity image of the investigator is greater than a preset image similarity threshold value or not;
if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, and returning the authentication result page to the second terminal;
and if not, determining that the authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal, and the identity authentication method further includes:
generating a survey pass for the surveyor;
and issuing the investigation pass to the first terminal when a first viewing request submitted by the first terminal is received.
Optionally, the identity authentication method further includes:
and when a second viewing request submitted by the first terminal is received, issuing the investigation pass to the second terminal.
Optionally, the identity authentication method further includes:
under the condition that the identity authentication result is that the identity authentication is passed, receiving survey data of a mutual-help application order submitted by the second terminal;
and performing mutual-aid checking on the mutual-aid application order based on the survey data, and issuing an obtained mutual-aid checking result to the first terminal and the second terminal.
The embodiment of the identity authentication device provided by the specification is as follows:
in the above embodiment, an identity authentication method is provided, and correspondingly, an identity authentication apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 6, a schematic diagram of an authentication apparatus provided in the present embodiment is shown.
Since the apparatus embodiments are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to the corresponding description of the method embodiments provided above for relevant portions. The device embodiments described below are merely illustrative.
This specification provides an authentication apparatus comprising:
an authentication request receiving module 602 configured to receive an authentication request for an investigator sent by a terminal;
an authentication instruction issuing module 604 configured to issue an authentication instruction to the terminal based on the authentication request;
an identity information receiving module 606 configured to receive the identity information of the investigator uploaded by the terminal;
an authentication module 608 configured to authenticate the investigator based on the identification information and return the obtained authentication result to the terminal.
Optionally, the terminal includes a first terminal and a second terminal; accordingly, the identity verification module 608 includes:
the verification code judging submodule is configured to judge whether a target verification code carried in first identity identification information uploaded by the first terminal is consistent with a verification code carried in second identity identification information uploaded by the second terminal; if so, determining that the identity authentication result is that the authentication is passed; if not, determining that the identity authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; accordingly, the identity verification module 608 includes:
the time difference calculation sub-module is configured to calculate the time difference between the entry time carried in the first identity identification information uploaded by the first terminal and the generation time carried in the second identity identification information uploaded by the second terminal;
the time difference judging submodule is configured to judge whether the time difference exceeds a preset input duration threshold value;
if not, operating a target verification code judgment submodule; the target verification code judging submodule is configured to judge whether a target verification code carried in the first identity identification information is consistent with a verification code carried in the second identity identification information; if so, determining that the identity authentication result is that the authentication is passed; if not, determining that the identity authentication result is that the authentication fails.
Optionally, if the judgment result output by the time difference judgment submodule after operation is that the time difference exceeds the input duration threshold, the operation is performed
The secondary identity authentication instruction issuing sub-module is configured to issue a secondary identity authentication instruction to the second terminal;
the identity image similarity judging submodule is configured to judge whether the image similarity between the identity image uploaded by the second terminal and the prestored benchmark identity image of the investigator is greater than an image similarity threshold value; if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, and returning the authentication result page to the first terminal; and if not, determining that the authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; accordingly, the identity verification module 608 includes:
the address information extraction sub-module is configured to extract the address information of the mutual assistance application member recorded in the mutual assistance application order;
the coordinate distance calculation submodule is configured to calculate the coordinate distance between the reference coordinate information and the coordinate information based on the reference coordinate information corresponding to the address information and the coordinate information corresponding to the geographical position information carried by the second identity information uploaded by the second terminal;
the coordinate distance judging submodule is configured to judge whether the coordinate distance is smaller than a preset coordinate distance threshold value;
if the number of the target identity characteristics is less than the number of the target identity characteristics, operating a target identity characteristic extraction submodule and a target identity characteristic judgment submodule;
the target identity characteristic extraction submodule is configured to extract target identity characteristics contained in a target identity image carried in first identity identification information uploaded by the first terminal;
the target identity characteristic judgment submodule is configured to judge whether the feature similarity of the target identity characteristic and a pre-stored benchmark identity characteristic of the investigator is greater than a pre-set feature similarity threshold value; if the identity verification result is larger than the reference identity characteristic, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity characteristic, and returning the verification result page to the second terminal; and if not, determining that the authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; accordingly, the identity verification module 608 includes:
the identity judgment sub-module is configured to judge whether the identity image and/or the identity sound carried in the identity identification information uploaded by the first terminal is consistent with a pre-stored reference identity image and/or reference identity sound of the investigator; if so, determining that the identity authentication result is that the authentication is passed; if not, determining that the identity authentication result is that the authentication fails.
Optionally, the terminal includes a first terminal and a second terminal; accordingly, the identity verification module 608 includes:
the identity image judging submodule is configured to judge whether the image similarity between the identity image carried in the identity identification information uploaded by the second terminal and the prestored reference identity image of the investigator is greater than a preset image similarity threshold value or not; if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, and returning the authentication result page to the second terminal; and if not, determining that the authentication result is that the authentication fails.
Optionally, the identity authentication apparatus further includes:
a survey pass generation module configured to generate a survey pass of the surveyor;
the first investigation pass issuing module is configured to issue the investigation pass to the first terminal when receiving a first viewing request submitted by the first terminal.
Optionally, the identity authentication apparatus further includes:
and the second investigation pass issuing module is configured to issue the investigation pass to the second terminal when receiving a second viewing request submitted by the first terminal.
Optionally, the identity authentication apparatus further includes:
the survey data receiving module is configured to receive survey data of the mutual help application order submitted by the second terminal under the condition that the identity verification result is that the identity verification passes;
and the mutual-help checking result issuing module is configured to perform mutual-help checking on the mutual-help application order based on the survey data and issue the obtained mutual-help checking result to the first terminal and the second terminal.
Another embodiment of the identity authentication method provided in this specification is as follows:
the embodiment of the method is described to be simpler, and related parts please refer to the corresponding descriptions of the system embodiment and the method embodiment provided above.
Referring to fig. 7, it shows a flowchart of another authentication method process provided in the embodiments of the present specification.
Step S702, receiving a touch action submitted by a mutual aid application member through an identity verification interface of a mutual aid application page corresponding to a triggered mutual aid application order;
step S704, an identity authentication request for the investigator is sent to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
step S706, receiving an identity verification instruction issued by the server, and acquiring identity identification information by executing the identity verification instruction and uploading the identity identification information to the server;
step S708, receiving and displaying an authentication result returned by the server for the authentication request.
Optionally, the receiving the authentication instruction issued by the server, and acquiring the identity identifier information by executing the authentication instruction and uploading the identity identifier information to the server includes:
receiving and analyzing the identity verification instruction issued by the server, and generating and displaying a verification code entry page based on an analysis result;
and receiving a target verification code input by the mutual-help application member based on the verification code entry page, and uploading first identity identification information carrying the target verification code to the server.
Optionally, the receiving the authentication instruction issued by the server, and acquiring the identity identifier information by executing the authentication instruction and uploading the identity identifier information to the server includes:
receiving and analyzing the identity verification instruction issued by the server, and generating and displaying a verification code entry page based on an analysis result;
and receiving a target verification code input by the mutual-help application member based on the verification code entry page, and uploading first identity identification information carrying the target verification code and the input time thereof to the server.
Optionally, the identity authentication method further includes:
and receiving and displaying a verification result page which is returned by the server and contains the identity image and the reference identity image of the investigator.
Optionally, the receiving the authentication instruction issued by the server, and acquiring the identity identifier information by executing the authentication instruction and uploading the identity identifier information to the server includes:
receiving and analyzing the identity verification instruction issued by the server, and calling an image acquisition interface to acquire a target identity image of the investigator based on an analysis result;
and uploading first identity identification information carrying the target identity image to the server.
Optionally, the receiving the authentication instruction issued by the server, and acquiring the identity identifier information by executing the authentication instruction and uploading the identity identifier information to the server includes:
receiving and analyzing the identity verification instruction issued by the server, and calling an image acquisition interface and/or a voice acquisition interface to acquire the identity image and/or the identity voice of the investigator based on the analysis result;
and uploading the identity identification information carrying the identity image and/or the identity sound to the server.
Optionally, the identity authentication method further includes:
after receiving a first viewing touch action submitted by the mutual help application member through triggering a pass viewing interface of the mutual help application page, submitting a first viewing request to the server based on the first viewing touch action;
and receiving and displaying the investigation pass of the investigator issued by the server.
Optionally, the identity authentication method further includes:
after receiving a second viewing touch action submitted by the investigator through triggering a pass viewing interface of the mutual help application page, submitting a second viewing request to the server based on the second viewing touch action.
Optionally, the identity authentication method further includes:
and receiving a mutual-help checking result sent by the server.
Another embodiment of an identity verification apparatus provided in this specification is as follows:
in the above embodiment, another authentication method is provided, and correspondingly, another authentication apparatus is also provided, which is described below with reference to the accompanying drawings.
Referring to fig. 8, there is shown a schematic diagram of another authentication device provided in the present embodiment.
Since the apparatus embodiments are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to the corresponding description of the method embodiments provided above for relevant portions. The device embodiments described below are merely illustrative.
This specification provides another authentication apparatus comprising:
a touch action receiving module 802, configured to receive a touch action submitted by a mutual assistance application member through an identity verification interface of a mutual assistance application page corresponding to a triggered mutual assistance application order;
an authentication request sending module 804 configured to send an authentication request for the investigator to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
an identity authentication instruction execution module 806 configured to receive an identity authentication instruction issued by the server, and acquire identity identification information by executing the identity authentication instruction and upload the identity identification information to the server;
an authentication result receiving module 808 configured to receive and display an authentication result returned by the server for the authentication request.
Optionally, the identity verification instruction execution module 806 is specifically configured to:
receiving and analyzing the identity verification instruction issued by the server, and generating and displaying a verification code entry page based on an analysis result;
and receiving a target verification code input by the mutual-help application member based on the verification code entry page, and uploading first identity identification information carrying the target verification code to the server.
Optionally, the identity verification instruction execution module 806 is specifically configured to:
receiving and analyzing the identity verification instruction issued by the server, and generating and displaying a verification code entry page based on an analysis result;
and receiving a target verification code input by the mutual-help application member based on the verification code entry page, and uploading first identity identification information carrying the target verification code and the input time thereof to the server.
Optionally, the identity verification instruction execution module 806 is further configured to:
and receiving and displaying a verification result page which is returned by the server and contains the identity image and the reference identity image of the investigator.
Optionally, the identity verification instruction execution module 806 is specifically configured to:
receiving and analyzing the identity verification instruction issued by the server, and calling an image acquisition interface to acquire a target identity image of the investigator based on an analysis result;
and uploading first identity identification information carrying the target identity image to the server.
Optionally, the identity verification instruction execution module 806 is specifically configured to:
receiving and analyzing the identity verification instruction issued by the server, and calling an image acquisition interface and/or a voice acquisition interface to acquire the identity image and/or the identity voice of the investigator based on the analysis result;
and uploading the identity identification information carrying the identity image and/or the identity sound to the server.
Optionally, the identity authentication apparatus further includes:
the mutual-help application page display module is configured to display a first view touch action on a pass view interface of a mutual-help application page;
and the investigation pass receiving module is configured to receive and display the investigation pass of the investigator issued by the server.
Optionally, the identity authentication apparatus further includes:
and the second viewing request submitting module is configured to submit a second viewing request to the server based on a second viewing touch action after receiving the second viewing touch action submitted by the investigator through a pass viewing interface triggering the mutual help application page.
Optionally, the identity authentication apparatus further includes:
and the mutual-help checking result receiving module is configured to receive the mutual-help checking result sent by the server.
The present specification provides an embodiment of a computing device as follows:
FIG. 9 is a block diagram illustrating a configuration of a computing device 900 provided according to one embodiment of the present description. Components of the computing device 900 include, but are not limited to, a memory 910 and a processor 920. The processor 920 is coupled to the memory 910 via a bus 930, and a database 950 is used to store data.
Computing device 900 also includes access device 940, access device 940 enabling computing device 900 to communicate via one or more networks 960. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. Access device 940 may include one or more of any type of network interface (e.g., a Network Interface Card (NIC)) whether wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 900, as well as other components not shown in FIG. 9, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 9 is for purposes of example only and is not limiting as to the scope of the description. Those skilled in the art may add or replace other components as desired.
Computing device 900 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), a mobile phone (e.g., smartphone), a wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 900 may also be a mobile or stationary server.
The present specification provides a computing device comprising a memory 910, a processor 920, and computer instructions stored on the memory and executable on the processor, the processor 920 being configured to execute the following computer-executable instructions:
receiving an identity authentication request aiming at an investigator and sent by a terminal;
based on the identity authentication request, issuing an identity authentication instruction to the terminal;
receiving the identity identification information of the investigator uploaded by the terminal;
and performing identity authentication on the investigator based on the identity identification information, and returning an obtained identity authentication result to the terminal.
Another computing device embodiment provided herein is as follows:
FIG. 10 is a block diagram illustrating a configuration of a computing device 1000 provided according to one embodiment of the present description. The components of the computing device 1000 include, but are not limited to, memory 1010 and a processor 1020. The processor 1020 is coupled to the memory 1010 via a bus 1030 and the database 1050 is used to store data.
Computing device 1000 also includes access device 1040, access device 1040 enabling computing device 1000 to communicate via one or more networks 1060. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. Access device 1040 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 1000 and other components not shown in FIG. 10 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 10 is for purposes of example only and is not limiting as to the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 1000 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), a mobile phone (e.g., smartphone), a wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 1000 may also be a mobile or stationary server.
This specification provides another computing device comprising a memory 1010, a processor 1020, and computer instructions stored on the memory and executable on the processor, the processor 1020 for executing the computer-executable instructions of:
receiving a touch action submitted by a mutual help application member through an identity verification interface of a mutual help application page corresponding to a triggered mutual help application order;
sending an identity verification request for the investigator to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
receiving an identity verification instruction issued by the server, and acquiring identity identification information by executing the identity verification instruction and uploading the identity identification information to the server;
and receiving and displaying an authentication result returned by the server aiming at the authentication request.
This specification provides one example of a computer-readable storage medium, comprising:
one embodiment of the present description provides a computer-readable storage medium storing computer instructions that, when executed by a processor, perform the steps of the method of identity verification.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium and the technical solution of the above-mentioned authentication method belong to the same concept, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the above-mentioned authentication method.
Another example computer-readable storage medium provided in this specification is as follows:
one embodiment of the present description provides another computer-readable storage medium storing computer instructions that, when executed by a processor, perform the steps of the another method of identity verification.
The above is an illustrative scheme of another computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium and the technical solution of the other authentication method belong to the same concept, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the other authentication method.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts, but those skilled in the art should understand that the present embodiment is not limited by the described acts, because some steps may be performed in other sequences or simultaneously according to the present embodiment. Further, those skilled in the art should also appreciate that the embodiments described in this specification are preferred embodiments and that acts and modules referred to are not necessarily required for an embodiment of the specification.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are intended only to aid in the description of the specification. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the embodiments and the practical application, to thereby enable others skilled in the art to best understand and utilize the embodiments. The specification is limited only by the claims and their full scope and equivalents.

Claims (36)

1. An identity verification system comprising:
the system comprises a server, a first terminal of a mutual assistance application member and a second terminal of an investigator;
the first terminal is configured to receive a touch action submitted by the mutual assistance application member through an identity verification interface triggering a mutual assistance application page corresponding to a mutual assistance application order, send an identity verification request aiming at the investigator to the server based on the touch action, and receive and display an identity verification result returned by the server aiming at the identity verification request; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
the server is configured to issue an authentication instruction to at least one of the first terminal and the second terminal according to the received authentication request, authenticate the identity of the investigator based on the identity identification information of the investigator uploaded after the authentication instruction is issued, and return the obtained authentication result to the first terminal;
and at least one of the first terminal and the second terminal which receives the identity verification instruction acquires the identity identification information by executing the identity verification instruction and uploads the identity identification information to the server.
2. The identity verification system of claim 1, wherein at least one of the first terminal and the second terminal receiving the identity verification instruction collects the identification information and uploads the identification information to the server by executing the identity verification instruction, comprising:
the second terminal analyzes the identity verification instruction issued by the server, calls a verification code generation algorithm based on an analysis result to generate a verification code, displays the verification code and uploads second identity identification information carrying the verification code to the server;
the first terminal analyzes the identity verification instruction issued by the server, generates and displays a verification code entry page based on an analysis result, receives a target verification code input by the mutual assistance application member based on the verification code entry page, and uploads first identity identification information carrying the target verification code to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
judging whether the target verification code carried in the first identity identification information is consistent with the verification code carried in the second identity identification information;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
3. The identity verification system of claim 1, wherein at least one of the first terminal and the second terminal receiving the identity verification instruction collects the identification information and uploads the identification information to the server by executing the identity verification instruction, comprising:
the second terminal analyzes the identity verification instruction issued by the server, calls a verification code generation algorithm based on an analysis result to generate and display the verification code of the investigator, and uploads second identity identification information carrying the verification code and the generation time thereof to the server;
the first terminal analyzes the identity verification instruction issued by the server, generates and displays a verification code entry page based on an analysis result, receives a target verification code input by the mutual assistance application member based on the verification code entry page, and uploads first identity identification information carrying the target verification code and input time of the target verification code to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
calculating a time difference between the entry time carried in the first identity identification information and the generation time carried in the second identity identification information;
judging whether the time difference exceeds a preset input duration threshold value or not;
if not, judging whether the target verification code carried in the first identity identification information is consistent with the verification code carried in the second identity identification information;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
4. The identity authentication system according to claim 3, wherein if the execution result after the operation of determining whether the time difference exceeds the preset input duration threshold is that the time difference exceeds the input duration threshold, the following operations are executed:
the server issues a secondary identity verification instruction to the second terminal, the second terminal analyzes the secondary identity verification instruction issued by the server, and calls an image acquisition interface to acquire the identity image of the investigator and uploads the identity image to the server based on an analysis result;
the server judges whether the image similarity between the identity image uploaded by the second terminal and a prestored reference identity image of the investigator is greater than an image similarity threshold value or not;
if the identity verification result is larger than the reference identity image, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity image and returning the verification result page to the first terminal, and displaying the verification result page after the first terminal receives the verification result page;
and if not, determining that the authentication result is that the authentication fails.
5. The identity verification system of claim 1, wherein at least one of the first terminal and the second terminal receiving the identity verification instruction collects the identification information and uploads the identification information to the server by executing the identity verification instruction, comprising:
the second terminal analyzes the identity verification instruction issued by the server, calls a position acquisition interface to acquire the geographic position information of the surveyor based on the analysis result, and uploads second identity identification information carrying the geographic position information to the server;
the first terminal analyzes the identity verification instruction issued by the server, calls an image acquisition interface to acquire a target identity image of the investigator based on an analysis result, and uploads first identity identification information carrying the target identity image to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
extracting the address information of the mutual-help application member recorded in the mutual-help application order, and calculating the coordinate distance between the reference coordinate information and the coordinate information based on the reference coordinate information corresponding to the address information and the coordinate information corresponding to the geographical position information carried by the second identity identification information;
judging whether the coordinate distance is smaller than a preset coordinate distance threshold value or not;
if the first identity identification information is smaller than the second identity identification information, extracting target identity characteristics contained in the target identity image carried in the first identity identification information;
judging whether the feature similarity of the target identity feature and a pre-stored benchmark identity feature of the investigator is greater than a preset feature similarity threshold value or not;
if the identity verification result is larger than the reference identity characteristic, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity characteristic and returning the verification result page to the second terminal, and displaying the verification result page after the second terminal receives the verification result page;
and if not, determining that the authentication result is that the authentication fails.
6. The identity verification system of claim 1, wherein at least one of the first terminal and the second terminal receiving the identity verification instruction collects the identification information and uploads the identification information to the server by executing the identity verification instruction, comprising:
the first terminal analyzes the identity verification instruction issued by the server, calls an image acquisition interface and/or a voice acquisition interface to acquire the identity image and/or the identity voice of the investigator based on the analysis result, and uploads identity identification information carrying the identity image and/or the identity voice to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
judging whether the identity image and/or the identity sound carried in the identity identification information is consistent with a pre-stored reference identity image and/or reference identity sound of the investigator;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
7. The identity verification system of claim 1, wherein at least one of the first terminal and the second terminal receiving the identity verification instruction collects the identification information and uploads the identification information to the server by executing the identity verification instruction, comprising:
the second terminal analyzes the identity verification instruction issued by the server, calls an image acquisition interface to acquire the identity image of the investigator based on the analysis result, and sends identity identification information carrying the identity image to the server;
correspondingly, the server performs identity verification on the investigator based on the identity identification information of the investigator uploaded after the identity verification instruction is issued, including:
judging whether the image similarity between the identity image carried in the identity identification information and a pre-stored benchmark identity image of the investigator is greater than a pre-set image similarity threshold value or not;
if the identity verification result is larger than the reference identity image, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity image and returning the verification result page to the second terminal, and displaying the verification result page after the second terminal receives the verification result page;
and if not, determining that the authentication result is that the authentication fails.
8. The identity verification system of claim 1, the server further configured to generate a survey pass for the surveyor, and to issue the survey pass to the first terminal upon receiving a first viewing request submitted by the first terminal;
the first terminal submits the first viewing request to the server based on the first viewing touch action after receiving the first viewing touch action submitted by the pass viewing interface of the mutual help application page triggered by the mutual help application member, and receives and displays the investigation pass issued by the server.
9. The identity verification system of claim 8, wherein the server is further configured to issue the survey pass to the second terminal upon receiving a second viewing request submitted by the first terminal, and the second terminal displays the survey pass upon receiving the survey pass issued by the server;
and after receiving a second viewing touch action submitted by the investigator through triggering a pass viewing interface of the mutual help application page, the first terminal submits the second viewing request to the server based on the second viewing touch action.
10. The identity verification system of claim 9, wherein the server is further configured to receive survey data of the mutual-help application order submitted by the second terminal, perform mutual-help verification on the mutual-help application order based on the survey data, and issue an obtained mutual-help verification result to the first terminal and the second terminal, if the identity verification result is that verification is passed.
11. An information verification system comprising:
the system comprises a server, a first terminal and a second terminal;
the first terminal is configured to receive the submitted touch action, send an authentication request to the server based on the touch action, and receive and display an authentication result returned by the server for the authentication request;
the server is configured to issue a verification instruction to at least one of the first terminal and the second terminal according to the received verification request, perform information verification based on identification information uploaded after the verification instruction is issued, and return the obtained verification result to the first terminal;
and at least one of the first terminal and the second terminal which receives the verification instruction acquires the identification information by executing the verification instruction and uploads the identification information to the server.
12. An identity verification method comprising:
receiving an identity authentication request aiming at an investigator and sent by a terminal;
based on the identity authentication request, issuing an identity authentication instruction to the terminal;
receiving the identity identification information of the investigator uploaded by the terminal;
and performing identity authentication on the investigator based on the identity identification information, and returning an obtained identity authentication result to the terminal.
13. The authentication method according to claim 12, the terminal comprising a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether a target verification code carried in first identity identification information uploaded by the first terminal is consistent with a verification code carried in second identity identification information uploaded by the second terminal;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
14. The authentication method according to claim 12, the terminal comprising a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
calculating the time difference between the input time carried in the first identity identification information uploaded by the first terminal and the generation time carried in the second identity identification information uploaded by the second terminal;
judging whether the time difference exceeds a preset input duration threshold value or not;
if not, judging whether the target verification code carried in the first identity identification information is consistent with the verification code carried in the second identity identification information;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
15. The identity verification method according to claim 14, wherein if the execution result after the substep of determining whether the time difference exceeds the preset input duration threshold is that the time difference exceeds the input duration threshold, the following operations are performed:
issuing a secondary identity verification instruction to the second terminal;
judging whether the image similarity between the identity image uploaded by the second terminal and the prestored benchmark identity image of the investigator is greater than an image similarity threshold value or not;
if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, and returning the authentication result page to the first terminal;
and if not, determining that the authentication result is that the authentication fails.
16. The authentication method according to claim 12, the terminal comprising a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
extracting address information of the mutual aid application members recorded in the mutual aid application order;
calculating the coordinate distance between the reference coordinate information and the coordinate information based on the reference coordinate information corresponding to the address information and the coordinate information corresponding to the geographical position information carried by the second identity information uploaded by the second terminal;
judging whether the coordinate distance is smaller than a preset coordinate distance threshold value or not;
if the first identity identification information is less than the second identity identification information, extracting target identity characteristics contained in a target identity image carried in the first identity identification information uploaded by the first terminal;
judging whether the feature similarity of the target identity feature and a pre-stored benchmark identity feature of the investigator is greater than a preset feature similarity threshold value or not;
if the identity verification result is larger than the reference identity characteristic, determining that the identity verification result is passed, generating a verification result page containing the identity image and the reference identity characteristic, and returning the verification result page to the second terminal;
and if not, determining that the authentication result is that the authentication fails.
17. The authentication method according to claim 12, the terminal comprising a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether the identity image and/or the identity sound carried in the identity identification information uploaded by the first terminal is consistent with a prestored reference identity image and/or reference identity sound of the investigator or;
if so, determining that the identity authentication result is that the authentication is passed;
if not, determining that the identity authentication result is that the authentication fails.
18. The authentication method according to claim 12, the terminal comprising a first terminal and a second terminal; correspondingly, the identity verification of the investigator based on the identity information includes:
judging whether the image similarity between the identity image carried in the identity identification information uploaded by the second terminal and the prestored reference identity image of the investigator is greater than a preset image similarity threshold value or not;
if the identity authentication result is larger than the reference identity image, determining that the identity authentication result is passed, generating an authentication result page containing the identity image and the reference identity image, and returning the authentication result page to the second terminal;
and if not, determining that the authentication result is that the authentication fails.
19. The authentication method of claim 12, the terminals comprising a first terminal and a second terminal, the method further comprising:
generating a survey pass for the surveyor;
and issuing the investigation pass to the first terminal when a first viewing request submitted by the first terminal is received.
20. The identity verification method of claim 19, further comprising:
and when a second viewing request submitted by the first terminal is received, issuing the investigation pass to the second terminal.
21. The identity verification method of claim 20, further comprising:
under the condition that the identity authentication result is that the identity authentication is passed, receiving survey data of a mutual-help application order submitted by the second terminal;
and performing mutual-aid checking on the mutual-aid application order based on the survey data, and issuing an obtained mutual-aid checking result to the first terminal and the second terminal.
22. An authentication apparatus comprising:
the identity authentication request receiving module is configured to receive an identity authentication request for an investigator, which is sent by a terminal;
the identity authentication instruction issuing module is configured to issue an identity authentication instruction to the terminal based on the identity authentication request;
the identity information receiving module is configured to receive the identity information of the investigator uploaded by the terminal;
and the identity authentication module is configured to authenticate the identity of the investigator based on the identity identification information and return the obtained identity authentication result to the terminal.
23. An identity verification method comprising:
receiving a touch action submitted by a mutual help application member through an identity verification interface of a mutual help application page corresponding to a triggered mutual help application order;
sending an identity verification request for the investigator to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
receiving an identity verification instruction issued by the server, and acquiring identity identification information by executing the identity verification instruction and uploading the identity identification information to the server;
and receiving and displaying an authentication result returned by the server aiming at the authentication request.
24. The identity authentication method of claim 23, wherein the receiving an identity authentication command issued by the server and acquiring identity identification information by executing the identity authentication command and uploading the identity identification information to the server comprises:
receiving and analyzing the identity verification instruction issued by the server, and generating and displaying a verification code entry page based on an analysis result;
and receiving a target verification code input by the mutual-help application member based on the verification code entry page, and uploading first identity identification information carrying the target verification code to the server.
25. The identity authentication method of claim 23, wherein the receiving an identity authentication command issued by the server and acquiring identity identification information by executing the identity authentication command and uploading the identity identification information to the server comprises:
receiving and analyzing the identity verification instruction issued by the server, and generating and displaying a verification code entry page based on an analysis result;
and receiving a target verification code input by the mutual-help application member based on the verification code entry page, and uploading first identity identification information carrying the target verification code and the input time thereof to the server.
26. An authentication method according to claim 25 further comprising:
and receiving and displaying a verification result page which is returned by the server and contains the identity image and the reference identity image of the investigator.
27. The identity authentication method of claim 23, wherein the receiving an identity authentication command issued by the server and acquiring identity identification information by executing the identity authentication command and uploading the identity identification information to the server comprises:
receiving and analyzing the identity verification instruction issued by the server, and calling an image acquisition interface to acquire a target identity image of the investigator based on an analysis result;
and uploading first identity identification information carrying the target identity image to the server.
28. The identity authentication method of claim 23, wherein the receiving an identity authentication command issued by the server and acquiring identity identification information by executing the identity authentication command and uploading the identity identification information to the server comprises:
receiving and analyzing the identity verification instruction issued by the server, and calling an image acquisition interface and/or a voice acquisition interface to acquire the identity image and/or the identity voice of the investigator based on the analysis result;
and uploading the identity identification information carrying the identity image and/or the identity sound to the server.
29. An authentication method according to claim 23 further comprising:
after receiving a first viewing touch action submitted by the mutual help application member through triggering a pass viewing interface of the mutual help application page, submitting a first viewing request to the server based on the first viewing touch action;
and receiving and displaying the investigation pass of the investigator issued by the server.
30. An authentication method according to claim 29 further comprising:
after receiving a second viewing touch action submitted by the investigator through triggering a pass viewing interface of the mutual help application page, submitting a second viewing request to the server based on the second viewing touch action.
31. An authentication method according to claim 30 further comprising:
and receiving a mutual-help checking result sent by the server.
32. An authentication apparatus comprising:
the touch action receiving module is configured to receive a touch action submitted by a mutual help application member through an identity verification interface of a mutual help application page corresponding to a triggered mutual help application order;
an authentication request sending module configured to send an authentication request for an investigator to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
the identity authentication instruction execution module is configured to receive an identity authentication instruction issued by the server, and acquire identity identification information by executing the identity authentication instruction and upload the identity identification information to the server;
and the identity authentication result receiving module is configured to receive and display an identity authentication result returned by the server for the identity authentication request.
33. A computing device, comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving an identity authentication request aiming at an investigator and sent by a terminal;
issuing an identity verification instruction to the terminal based on the identity verification request;
receiving the identity identification information of the investigator uploaded by the terminal;
and performing identity authentication on the investigator based on the identity identification information, and returning an obtained identity authentication result to the terminal.
34. A computing device, comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving a touch action submitted by a mutual help application member through an identity verification interface of a mutual help application page corresponding to a triggered mutual help application order;
sending an identity verification request for the investigator to a server based on the touch action; wherein the investigator is assigned by a mutual aid project after the mutual aid application member submits the mutual aid application order;
receiving an identity verification instruction issued by the server, and acquiring identity identification information by executing the identity verification instruction and uploading the identity identification information to the server;
and receiving and displaying an authentication result returned by the server aiming at the authentication request.
35. A computer readable storage medium storing computer instructions which, when executed by a processor, carry out the steps of the authentication method of any one of claims 12 to 21.
36. A computer readable storage medium storing computer instructions which, when executed by a processor, carry out the steps of the authentication method of any one of claims 23 to 31.
CN201911157431.8A 2019-11-22 2019-11-22 Identity verification system, method and device and information verification system Pending CN110929237A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911157431.8A CN110929237A (en) 2019-11-22 2019-11-22 Identity verification system, method and device and information verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911157431.8A CN110929237A (en) 2019-11-22 2019-11-22 Identity verification system, method and device and information verification system

Publications (1)

Publication Number Publication Date
CN110929237A true CN110929237A (en) 2020-03-27

Family

ID=69850791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911157431.8A Pending CN110929237A (en) 2019-11-22 2019-11-22 Identity verification system, method and device and information verification system

Country Status (1)

Country Link
CN (1) CN110929237A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184972A (en) * 2020-09-09 2021-01-05 支付宝(杭州)信息技术有限公司 Service passing processing method and device
CN112633091A (en) * 2020-12-09 2021-04-09 北京博瑞彤芸科技股份有限公司 Method and system for verifying real meeting
CN114495226A (en) * 2022-01-25 2022-05-13 成都鼎桥通信技术有限公司 Identity identification method, device and equipment based on wireless law enforcement recorder

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580117A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机系统有限公司 Authentication method, device and system
CN104767717A (en) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 Identity authentication method and device
CN106453278A (en) * 2016-09-23 2017-02-22 财付通支付科技有限公司 Information verification method and verification platform
CN106846506A (en) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and system that Information Authentication is carried out based on message identification code
CN107729847A (en) * 2017-10-20 2018-02-23 阿里巴巴集团控股有限公司 A kind of certificate verification, auth method and device
CN109660531A (en) * 2018-12-10 2019-04-19 武汉大晟极科技有限公司 A kind of auth method, server and customer service terminal
CN109873823A (en) * 2019-02-22 2019-06-11 北京市商汤科技开发有限公司 Verification method and device, electronic equipment and storage medium
CN110225002A (en) * 2019-05-21 2019-09-10 平安科技(深圳)有限公司 Business handling method and Related product
US20190279183A1 (en) * 2017-05-11 2019-09-12 Alibaba Group Holding Limited Identity authentication method, device, and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580117A (en) * 2013-10-28 2015-04-29 深圳市腾讯计算机系统有限公司 Authentication method, device and system
CN104767717A (en) * 2014-01-03 2015-07-08 腾讯科技(深圳)有限公司 Identity authentication method and device
CN106453278A (en) * 2016-09-23 2017-02-22 财付通支付科技有限公司 Information verification method and verification platform
CN106846506A (en) * 2017-01-25 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and system that Information Authentication is carried out based on message identification code
US20190279183A1 (en) * 2017-05-11 2019-09-12 Alibaba Group Holding Limited Identity authentication method, device, and system
CN107729847A (en) * 2017-10-20 2018-02-23 阿里巴巴集团控股有限公司 A kind of certificate verification, auth method and device
CN109660531A (en) * 2018-12-10 2019-04-19 武汉大晟极科技有限公司 A kind of auth method, server and customer service terminal
CN109873823A (en) * 2019-02-22 2019-06-11 北京市商汤科技开发有限公司 Verification method and device, electronic equipment and storage medium
CN110225002A (en) * 2019-05-21 2019-09-10 平安科技(深圳)有限公司 Business handling method and Related product

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184972A (en) * 2020-09-09 2021-01-05 支付宝(杭州)信息技术有限公司 Service passing processing method and device
CN112184972B (en) * 2020-09-09 2022-06-14 支付宝(杭州)信息技术有限公司 Service passing processing method and device
CN112633091A (en) * 2020-12-09 2021-04-09 北京博瑞彤芸科技股份有限公司 Method and system for verifying real meeting
CN112633091B (en) * 2020-12-09 2021-11-16 北京博瑞彤芸科技股份有限公司 Method and system for verifying real meeting
CN114495226A (en) * 2022-01-25 2022-05-13 成都鼎桥通信技术有限公司 Identity identification method, device and equipment based on wireless law enforcement recorder
CN114495226B (en) * 2022-01-25 2024-03-22 成都鼎桥通信技术有限公司 Identity recognition method, device and equipment based on wireless law enforcement recorder

Similar Documents

Publication Publication Date Title
CN113327374B (en) Shared charging equipment returning method and device
CN107292150B (en) User identity confirmation method and device in security information processing
CN110098932B (en) Electronic document signing method based on safe electronic notarization technology
US20170372304A1 (en) Systems, devices and methods for remote authentication of a user
CN110929237A (en) Identity verification system, method and device and information verification system
CN105868970B (en) authentication method and electronic equipment
CN103443813A (en) Authenticating transactions using a mobile device identifier
CN110225002B (en) Business handling method and related product
TW201531952A (en) Generating barcode and authenticating based on barcode
CN106850693B (en) Real-name authentication method and real-name authentication system
CN105989485B (en) Service management method and device
CN108510233A (en) Long-range face label match attend a banquet method, electronic device and computer readable storage medium
US20210314317A1 (en) Biometric One Touch System
CN111145014A (en) Business handling method and device
CN108512660B (en) Virtual card verification method
CN111737675A (en) Block chain-based electronic signature method and device
KR20170052126A (en) Method for Non-faced Multi-authenticating for Creating Financial Information
CN106604281A (en) Method and equipment for determining stability of mobile phone number
CN110738503A (en) Identity verification method and device
EP3229190A1 (en) Payment verification method, apparatus and system
CN113162770A (en) Online signature method and system
CN113052605A (en) Transaction authorization method and device and virtual reality equipment
CN110766388B (en) Virtual card generation method and system and electronic equipment
CN104735067A (en) O2O real name registration admittance system and method
CN111681009B (en) Multi-platform centralized authentication and authorization system and method, authentication and authorization and service device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211213

Address after: Room 602, No. 618, Wai Road, Huangpu District, Shanghai 200010

Applicant after: Ant fortune (Shanghai) Financial Information Service Co.,Ltd.

Address before: 801-11, Section B, 8th floor, 556 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province, 310013

Applicant before: Alipay (Hangzhou) Information Technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327