CN111104653B - User operation processing method and device, electronic equipment and readable storage medium - Google Patents

User operation processing method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN111104653B
CN111104653B CN201911273082.6A CN201911273082A CN111104653B CN 111104653 B CN111104653 B CN 111104653B CN 201911273082 A CN201911273082 A CN 201911273082A CN 111104653 B CN111104653 B CN 111104653B
Authority
CN
China
Prior art keywords
account
user
application program
current operation
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911273082.6A
Other languages
Chinese (zh)
Other versions
CN111104653A (en
Inventor
杨立兴
邓小茜
程浩
叶万军
杨达
黄耿明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN201911273082.6A priority Critical patent/CN111104653B/en
Publication of CN111104653A publication Critical patent/CN111104653A/en
Application granted granted Critical
Publication of CN111104653B publication Critical patent/CN111104653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application provides a user operation processing method and device, electronic equipment and a readable storage medium. The method comprises the following steps: logging in a second account of a second application program based on account information of a first account which is logged in the first application program when a starting instruction of the second application program sent by a user in the first application program is detected; detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation; if not, processing the current operation; and if so, processing the current operation based on whether the second account completes the identity authentication. According to the scheme, the user is prevented from repeatedly logging in and authenticating identity when the basic service with lower security is provided, the operation steps are simplified on the premise of ensuring the security, the use of the user is facilitated, and the use experience of the user is improved.

Description

User operation processing method and device, electronic equipment and readable storage medium
Technical Field
The application relates to the technical field of mobile internet, in particular to a user operation processing method and device, electronic equipment and a readable storage medium.
Background
At present, financial application programs are often introduced by commercial banks for users to use, and after the users register and log in the financial application programs, the users can perform identity authentication, so that the users can enjoy financial services through operation in the financial application programs.
In order to ensure the use safety in the prior art, when the financial application program enters again after exiting every time, the financial application program still needs to log in again and perform identity authentication. In actual use, a user may only need to use basic services of the financial application, for example, to browse some common information that is irrelevant to user privacy and account security, and at this time, the user still needs to repeatedly perform login and identity authentication operations, which causes cumbersome operations and affects user experience.
Disclosure of Invention
The present application aims to solve at least one of the above technical drawbacks. The technical scheme adopted by the application is as follows:
in a first aspect, an embodiment of the present application provides a method for processing a user operation, where the method includes:
logging in a second account of a second application program based on account information of a first account which is logged in the first application program when a starting instruction of the second application program sent by a user in the first application program is detected;
detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation;
if not, processing the current operation;
and if so, processing the current operation based on whether the second account completes the identity authentication.
In a second aspect, an embodiment of the present application provides a processing apparatus operated by a user, where the apparatus includes:
the login module is used for logging in a second account of a second application program based on account information of a logged-in first account in the first application program when a starting instruction of the second application program sent by a user in the first application program is detected;
the operation detection module is used for detecting the current operation of the user on the second application program and determining whether the current operation belongs to the preset operation;
and the first processing module is used for processing the current operation when the current operation does not belong to the preset operation.
And the second processing module is used for processing the current operation based on whether the second account completes the identity authentication or not when the current operation belongs to the preset operation.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory;
a memory for storing operating instructions;
the processor is used for executing the processing method of the user operation shown in the first aspect of the application by calling the operation instruction.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the processing method for user operation shown in the first aspect of the present application.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
according to the scheme provided by the embodiment of the application, when a starting instruction of a user for a second application program sent by the user in a first application program is detected, a second account of the second application program is logged in based on account information of a first account which is logged in the first application program; detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation; if not, processing the current operation; and if so, processing the current operation based on whether the second account completes the identity authentication. The method comprises the steps that a second account of a second application program is logged in through account information of a first application program, when the current operation of a user on the second application program corresponds to core service with higher safety requirements, whether the second account completes identity authentication can be determined, and the core service is provided for the current operation based on the identity authentication; when the current operation of the second application program corresponds to the basic service with lower safety requirement, the basic service can be directly provided for the current operation of the user, repeated login and identity authentication of the user when the basic service with lower safety is provided are avoided, the operation steps are simplified on the premise of ensuring the safety, the use of the user is facilitated, and the use experience of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a processing method for user operation according to an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart of an embodiment of the present application;
fig. 3 is a schematic structural diagram of a processing device operated by a user according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 shows a schematic flowchart of a processing method for user operation according to an embodiment of the present application, and as shown in fig. 1, the method mainly includes:
and step S110, logging in a second account of the second application program based on account information of the logged-in first account in the first application program when detecting a starting instruction of the second application program sent by a user in the first application program.
In the embodiment of the application, the start-up entrance of the second application program can be embedded in the first application program, and a user can send out a start-up instruction through the trigger operation of the start-up entrance. After receiving the start instruction, the terminal device may display the related content of the second application.
The second application may be a financial type application.
In this embodiment of the application, the first account is an account that the user logs in the first application, and may log in the second application based on account information of the first account, and the second account is an account used for logging in the second application.
In this embodiment, the account information of the first account may include an account ID of the first account and information associated with the first account, such as an identification number of the user.
Step S120: detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation;
step S130: if not, processing the current operation;
step S140: and if so, processing the current operation based on whether the second account completes the identity authentication.
In the embodiment of the application, after the user logs in the second account, the user can operate in the second application program. As an example, when the second application is a financial application, the user may perform operations of browsing general information unrelated to security, performing financial transactions, purchasing financial service products, and the like within the second application.
In the embodiment of the application, the preset operation can be set according to actual needs. In a specific implementation, the core service of the second application is generally a service with a higher security requirement, such as performing a financial transaction, purchasing a financial service product, and the like, in order to ensure security, the second account needs to be authenticated to provide the services to the user, and operations corresponding to the core service with the higher security requirement may be determined as preset operations. Accordingly, some basic services provided by the second application have low requirements on security, and can be provided for the user by relying on the user credit system of the first application without user identity authentication of the second account.
In the embodiment of the application, when the current operation of the user is detected, if the current operation does not belong to the preset operation, the safety requirement of the current operation can be considered to be low, the identity verification can be performed on the second account, the service corresponding to the current operation is directly provided for the user, and the inconvenience in use of the user caused by a complicated identity authentication link is avoided.
If the current operation belongs to the preset operation, the security requirement of the current operation can be considered to be high, in order to meet the security requirement, whether the second account is subjected to identity authentication needs to be determined, and service is provided for the current operation based on whether the second account is subjected to identity authentication.
According to the method provided by the embodiment of the application, when a starting instruction of a user for a second application program sent by the user in a first application program is detected, a second account of the second application program is logged in based on account information of a first account which is logged in the first application program; detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation; if not, processing the current operation; and if so, processing the current operation based on whether the second account completes the identity authentication. The method provided by the application logs in a second account of a second application program through account information of the first application program, when the current operation of a user on the second application program corresponds to a core service with higher security requirement, whether the second account completes identity authentication can be determined, and the core service is provided for the current operation based on the identity authentication condition; when the current operation of the second application program corresponds to the basic service with lower safety requirement, the basic service can be directly provided for the current operation of the user, repeated login and identity authentication of the user when the basic service with lower safety is provided are avoided, the operation steps are simplified on the premise of ensuring the safety, the use of the user is facilitated, and the use experience of the user is improved.
In an optional manner of the embodiment of the present application, logging in a second account of a second application program based on account information of a first account that has already been logged in a first application program includes:
determining a second account of a second application program based on account information of a first account which is logged in the first application program;
determining whether the second account has completed user identity authentication;
if the login is finished, logging in a second account;
and if the user does not complete the login, acquiring the identity information of the user, and logging in a second account based on the identity information.
In this embodiment of the application, when a second application is started in a first application, account information of a first account may be acquired, and a second account is determined according to the account information of the first account, specifically, an account ID of the first account may be integrated according to a certain encoding rule to generate an account ID of the second account, where the generated account ID of the second account is unique.
In the embodiment of the application, the account ID of the second account is automatically generated based on the account information of the first account, and a user does not need to separately input an account number and a password.
In actual use, there may be a case where the user has logged in the second account from the first application program before the operation, and has completed the user identity authentication of the second account, and at this time, the user may directly log in to the second account and be able to freely use various functions in the second program.
If the second account is determined and the second account is further determined not to be subjected to user identity authentication, the identity information of the user, such as the identity card number of the user, can be obtained first, at this time, the second account can be logged in based on the identity information of the user, and after the login is completed, when the user operates in the second application program, services other than the services corresponding to the preset operation can be obtained.
In an optional manner of the embodiment of the present application, determining a second account of a second application program based on account information of a first account that has been logged in a first application program includes:
determining whether a second account associated with the first account exists in a local cache based on account information of the first account which is logged in the first application program;
if not, a second account associated with the first account is established based on predetermined rules.
In the embodiment of the application, when determining the second account based on the account information of the first account, there may be a case that the user has started the second program from the first application program and logged in the second account before the current operation, and therefore, it may be checked whether the second account associated with the first account already exists in the local cache. If it can be determined that a second user associated with the first account is not present in the local cache, a second account may be created based on predetermined rules.
In this embodiment of the present application, the predetermined rule may be an encoding rule, and the account ID of the second account is generated uniquely by encoding the account ID of the first account.
In an optional manner of the embodiment of the present application, logging in to the second account based on the identity information includes:
determining whether the identity information has an association relation with a second account;
if yes, logging in a second account based on the association relation;
if the identity information does not exist, establishing an incidence relation between the identity information and the second account, and logging in the second account based on the incidence relation.
In the embodiment of the application, if it is determined that the second account does not complete the user identity authentication, the identity information of the user can be acquired, in the specific implementation, an input interface of the identity information of the user can be displayed, and after the identity information of the user is input and submitted on the input interface, the identity information of the user can be acquired.
In specific implementation, the acquired identity information can be verified, and as the user reserves a phone number or a password in general, the identity information of the user can be verified in a short message verification or password verification mode.
When logging in the second account based on the identity information of the user, the user may have established an association relationship between the identity information and the second account in an operation before the current operation, and may directly log in the second account based on the established association relationship.
And if the identity information of the user does not have an incidence relation with the second account, establishing the incidence relation between the identity information and the second account, and logging in the second account based on the established incidence relation.
By establishing the association relationship between the second account and the identity information, the simple authentication of the user identity can be realized, the user who completes the simple authentication can operate in the second application program, and services except for the service corresponding to the preset operation can be obtained.
In actual use, after the association relationship between the identity information and the second account is established, the association relationship between the identity information and the second account can be stored in a local cache, so that the user can log in quickly when the user uses the system again.
In an optional manner of the embodiment of the present application, the method further includes:
and determining whether the identity information has an incidence relation with the first account, and if so, correspondingly storing the incidence relation between the identity information and the first account and the incidence relation between the identity information and the second account in a local cache.
In the embodiment of the application, the identity information of the user may have an association relationship with the first account, and at this time, the cached association relationship may be updated, that is, the association relationship between the identity information of the user and the first account and the association relationship between the identity information of the user and the second account are stored in the local cache correspondingly.
In an optional manner of the embodiment of the application, processing the current operation based on whether the second account completes the user authentication includes:
if the second account completes the user identity authentication, processing the current operation;
and if the second account does not finish the user identity authentication, performing the user identity authentication on the second account, and processing the current operation based on the result of the user identity authentication.
In the embodiment of the application, when the user performs the preset operation, whether the second account completes the user identity authentication or not needs to be confirmed, and when the second account completes the user identity authentication, the corresponding service can be directly provided for the preset operation of the user.
When the user identity authentication is not completed in the second account, the user identity authentication needs to be performed on the second account according to a preset user identity authentication mode, and in specific implementation, the user identity authentication mode may be: firstly, acquiring the identity data of a user, such as personal information of the user, bank card account information of the user and the like, and then performing living body authentication on the user to determine whether the current operation is performed by the user. After the user identity authentication is finished, if the authentication is successful, corresponding service can be provided for the preset operation of the user; and if the verification fails, providing corresponding service for the preset operation of the user.
In actual use, the identity data input page can be displayed to enable a user to input identity data, images of certificates such as identity cards can be collected, and then the required identity data of the user can be collected according to the collected images.
In actual use, the living body identification can be realized by scanning the face of the user.
Fig. 2 is a schematic flow chart of a specific implementation manner provided in an embodiment of the present application.
As shown in fig. 2, a page entry, i.e., a launch entry embedding a second application in a first application. And processing the user information transmitted by the third party, namely acquiring account information of the first account logged in the first application program when the second application program is started. Whether the second user has completed the user identity authentication is determined. The identity ID (authenticated user) is successfully identified, i.e., it is determined whether the second user has completed the user authentication. The back-end automatically generates a unique identity ID (simply authenticated user), i.e. based on the account information of the first account, and establishes the second account based on predetermined rules. And whether the core transaction is applied, namely whether the current operation of the second application program is a preset operation is determined. And using part of financial service product functions, namely, providing services except the services corresponding to the preset operation for the user, namely, using the second account for completing the user identity authentication. Identification and entry of the identity data, and acquisition of the identity data of the user. And the living body authentication module is used for performing living body authentication on the user. The panoramic financial service product function is used, namely, after the user identity authentication of the second account is completed, all functions of the second application program can be provided for the user.
Based on the same principle as the method shown in fig. 1, fig. 3 shows a schematic structural diagram of a user-operated processing device provided by an embodiment of the present application, and as shown in fig. 3, the user-operated processing device 20 may include:
the login module 210 is configured to, when a start instruction for the second application program issued by the user in the first application program is detected, log in a second account of the second application program based on account information of the first account that has already been logged in the first application program;
the operation detection module 220 is configured to detect a current operation of the second application program by the user, and determine whether the current operation belongs to a preset operation;
the first processing module 230 is configured to process the current operation when the current operation does not belong to the preset operation.
And a second processing module 240, configured to, when the current operation belongs to the preset operation, process the current operation based on whether the second account completes the authentication.
According to the device provided by the embodiment of the application, when a starting instruction of a user for a second application program sent by the user in a first application program is detected, a second account of the second application program is logged in based on account information of a first account which is logged in the first application program; detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation; if not, processing the current operation; and if so, processing the current operation based on whether the second account completes the identity authentication. The method comprises the steps that a second account of a second application program is logged in through account information of a first application program, when the current operation of a user on the second application program corresponds to core service with higher safety requirements, whether the second account completes identity authentication can be determined, and the core service is provided for the current operation based on the identity authentication; when the current operation of the second application program corresponds to the basic service with lower safety requirement, the basic service can be directly provided for the current operation of the user, repeated login and identity authentication of the user when the basic service with lower safety is provided are avoided, the operation steps are simplified on the premise of ensuring the safety, the use of the user is facilitated, and the use experience of the user is improved.
Optionally, the login module is specifically configured to, when logging in a second account of a second application program based on account information of a first account that has already been logged in the first application program:
determining a second account of a second application program based on account information of a first account which is logged in the first application program;
determining whether the second account has completed user identity authentication;
if the login is finished, logging in a second account;
and if the user does not complete the login, acquiring the identity information of the user, and logging in a second account based on the identity information.
Optionally, when determining the second account of the second application program based on the account information of the first account that has been logged in the first application program, the login module is specifically configured to:
determining whether a second account associated with the first account exists in a local cache based on account information of the first account which is logged in the first application program;
if not, a second account associated with the first account is established based on predetermined rules.
Optionally, the login module is specifically configured to, when logging in the second account based on the identity information:
determining whether the identity information has an association relation with a second account;
if yes, logging in a second account based on the association relation;
if the identity information does not exist, establishing an incidence relation between the identity information and the second account, and logging in the second account based on the incidence relation.
Optionally, the apparatus further comprises:
and the cache module is used for determining whether the identity information has an association relationship with the first account, and if so, storing the association relationship between the identity information and the first account and the association relationship between the identity information and the second account in a local cache correspondingly.
Optionally, the login module is specifically configured to, when logging in the second account based on the identity information:
and logging in the second account based on the identity information after verification.
Optionally, the second processing module, when processing the current operation based on whether the user identity authentication is completed by the second account, is specifically configured to:
if the second account completes the user identity authentication, processing the current operation;
and if the second account does not finish the user identity authentication, performing the user identity authentication on the second account, and processing the current operation based on the result of the user identity authentication.
It is understood that the above modules of the processing apparatus operated by the user in the embodiment have functions of implementing the corresponding steps of the processing method operated by the user in the embodiment shown in fig. 1. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above. The modules can be software and/or hardware, and each module can be implemented independently or by integrating a plurality of modules. For the functional description of each module of the processing apparatus operated by the user, reference may be specifically made to the corresponding description of the processing method operated by the user in the embodiment shown in fig. 1, and details are not repeated here.
The embodiment of the application provides an electronic device, which comprises a processor and a memory;
a memory for storing operating instructions;
and the processor is used for executing the processing method of the user operation provided by any embodiment of the application by calling the operation instruction.
As an example, fig. 4 shows a schematic structural diagram of an electronic device to which an embodiment of the present application is applicable, and as shown in fig. 4, the electronic device 2000 includes: a processor 2001 and a memory 2003. Wherein the processor 2001 is coupled to a memory 2003, such as via a bus 2002. Optionally, the electronic device 2000 may also include a transceiver 2004. It should be noted that the transceiver 2004 is not limited to one in practical applications, and the structure of the electronic device 2000 is not limited to the embodiment of the present application.
The processor 2001 is applied to the embodiment of the present application to implement the method shown in the above method embodiment. The transceiver 2004 may include a receiver and a transmitter, and the transceiver 2004 is applied to the embodiments of the present application to implement the functions of the electronic device of the embodiments of the present application to communicate with other devices when executed.
The Processor 2001 may be a CPU (Central Processing Unit), general Processor, DSP (Digital Signal Processor), ASIC (Application Specific Integrated Circuit), FPGA (Field Programmable Gate Array) or other Programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 2001 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs and microprocessors, and the like.
Bus 2002 may include a path that conveys information between the aforementioned components. The bus 2002 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 2002 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
The Memory 2003 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
Optionally, the memory 2003 is used for storing application program code for performing the disclosed aspects, and is controlled in execution by the processor 2001. The processor 2001 is configured to execute the application program code stored in the memory 2003 to implement the processing method of the user operation provided in any embodiment of the present application.
The electronic device provided by the embodiment of the application is applicable to any embodiment of the method, and is not described herein again.
Compared with the prior art, the electronic equipment provided by the embodiment of the application is characterized in that when a starting instruction of a user for a second application program sent by a first application program is detected, a second account of the second application program is logged in based on account information of a first account which is logged in the first application program; detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation; if not, processing the current operation; and if so, processing the current operation based on whether the second account completes the identity authentication. The method comprises the steps that a second account of a second application program is logged in through account information of a first application program, when the current operation of a user on the second application program corresponds to core service with higher safety requirements, whether the second account completes identity authentication can be determined, and the core service is provided for the current operation based on the identity authentication; when the current operation of the second application program corresponds to the basic service with lower safety requirement, the basic service can be directly provided for the current operation of the user, repeated login and identity authentication of the user when the basic service with lower safety is provided are avoided, the operation steps are simplified on the premise of ensuring the safety, the use of the user is facilitated, and the use experience of the user is improved.
The embodiment of the application provides a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, the program implements the processing method of the user operation shown in the above method embodiment.
The computer-readable storage medium provided in the embodiments of the present application is applicable to any of the embodiments of the foregoing method, and is not described herein again.
Compared with the prior art, the embodiment of the application provides a computer-readable storage medium, and when a starting instruction of a user for a second application program sent in a first application program is detected, a second account of the second application program is logged in based on account information of a first account which is logged in the first application program; detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation; if not, processing the current operation; and if so, processing the current operation based on whether the second account completes the identity authentication. The method comprises the steps that a second account of a second application program is logged in through account information of a first application program, when the current operation of a user on the second application program corresponds to core service with higher safety requirements, whether the second account completes identity authentication can be determined, and the core service is provided for the current operation based on the identity authentication; when the current operation of the second application program corresponds to the basic service with lower safety requirement, the basic service can be directly provided for the current operation of the user, repeated login and identity authentication of the user when the basic service with lower safety is provided are avoided, the operation steps are simplified on the premise of ensuring the safety, the use of the user is facilitated, and the use experience of the user is improved.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (9)

1. A processing method for user operation is characterized by comprising the following steps:
when a starting instruction of a second application program sent by a user in a first application program is detected, logging in a second account of the second application program based on account information of a first account which is logged in the first application program;
detecting the current operation of a user on the second application program, and determining whether the current operation belongs to a preset operation;
if not, processing the current operation;
if the current operation belongs to the second account, processing the current operation based on whether the second account completes identity verification; the method comprises the following steps: if the second account completes the user identity authentication, processing the current operation; if the second account does not finish the user identity authentication, performing the user identity authentication on the second account, and processing the current operation based on the result of the user identity authentication;
the operation corresponding to the service with higher security requirement in the second application program belongs to preset operation; the service with higher safety requirement comprises financial transaction and purchase of financial service products; and the operation corresponding to the service with lower security requirement in the second application program does not belong to the preset operation, and the service with lower security requirement comprises browsing common information irrelevant to security.
2. The method of claim 1, wherein logging in a second account of the second application based on account information of a first account already logged in the first application comprises:
determining a second account of the second application program based on account information of a first account which is logged in the first application program;
determining whether the second account has completed user identity authentication;
if the second account is finished, logging in the second account;
and if the second account is not finished, acquiring the identity information of the user, and logging in the second account based on the identity information.
3. The method of claim 2, wherein determining the second account of the second application based on the account information of the first account logged into the first application comprises:
determining whether a second account associated with a first account exists in a local cache based on account information of the first account logged in the first application program;
if not, establishing a second account associated with the first account based on a predetermined rule.
4. The method of claim 2, wherein said logging into the second account based on the identity information comprises:
determining whether the identity information is associated with the second account;
if yes, logging in the second account based on the association relation;
if the identity information does not exist, establishing an incidence relation between the identity information and the second account, and logging in the second account based on the incidence relation.
5. The method of claim 4, further comprising:
and determining whether the identity information has an association relationship with the first account, and if so, correspondingly storing the association relationship between the identity information and the first account and the association relationship between the identity information and the second account in a local cache.
6. The method of claim 2, wherein said logging into the second account based on the identity information comprises:
logging in the second account based on the identity information after verification.
7. A user-operated processing device, comprising:
the login module is used for logging in a second account of a second application program based on account information of a logged-in first account in a first application program when a starting instruction of the second application program sent by a user in the first application program is detected;
the operation detection module is used for detecting the current operation of the user on the second application program and determining whether the current operation belongs to the preset operation;
the first processing module is used for processing the current operation when the current operation does not belong to the preset operation;
the second processing module is used for processing the current operation based on whether the second account completes identity authentication or not when the current operation belongs to the preset operation; the method comprises the following steps: if the second account completes the user identity authentication, processing the current operation; if the second account does not finish the user identity authentication, performing the user identity authentication on the second account, and processing the current operation based on the result of the user identity authentication;
the operation corresponding to the service with higher security requirement in the second application program belongs to preset operation; the service with higher safety requirement comprises financial transaction and purchase of financial service products; and the operation corresponding to the service with lower security requirement in the second application program does not belong to the preset operation, and the service with lower security requirement comprises browsing common information irrelevant to security.
8. An electronic device comprising a processor and a memory;
the memory is used for storing operation instructions;
the processor is used for executing the method of any one of claims 1-6 by calling the operation instruction.
9. A computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the method of any one of claims 1-6.
CN201911273082.6A 2019-12-12 2019-12-12 User operation processing method and device, electronic equipment and readable storage medium Active CN111104653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911273082.6A CN111104653B (en) 2019-12-12 2019-12-12 User operation processing method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911273082.6A CN111104653B (en) 2019-12-12 2019-12-12 User operation processing method and device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN111104653A CN111104653A (en) 2020-05-05
CN111104653B true CN111104653B (en) 2022-03-04

Family

ID=70422347

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911273082.6A Active CN111104653B (en) 2019-12-12 2019-12-12 User operation processing method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN111104653B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111741115B (en) * 2020-06-24 2022-12-16 支付宝(杭州)信息技术有限公司 Service processing method, device and system and electronic equipment
CN112671795A (en) * 2020-12-30 2021-04-16 南方电网深圳数字电网研究院有限公司 Security protection method, device, system and storage medium based on instant messaging

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012161121A1 (en) * 2011-05-20 2012-11-29 日本放送協会 Broadcast-communication coordination receiving device and broadcast-communication coordination system
CN104518876A (en) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 Service login method and device
CN105099985A (en) * 2014-04-21 2015-11-25 百度在线网络技术(北京)有限公司 Login method and device of multiple applications
CN105306199A (en) * 2014-05-28 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method, device and system
CN105404800A (en) * 2015-10-28 2016-03-16 腾讯科技(深圳)有限公司 Account information authorization method, terminal and server
CN106874738A (en) * 2017-01-25 2017-06-20 广东欧珀移动通信有限公司 The response method and mobile terminal of a kind of touch control operation
CN106940761A (en) * 2017-03-27 2017-07-11 联想(北京)有限公司 The control method and controller of a kind of application program
CN107135218A (en) * 2017-05-04 2017-09-05 腾讯科技(深圳)有限公司 Log in state acquisition, sending method, voucher collocation method, client and server
CN107506634A (en) * 2017-07-31 2017-12-22 广东欧珀移动通信有限公司 Display methods, device, storage medium and the terminal of data
CN108011887A (en) * 2017-12-14 2018-05-08 维沃移动通信有限公司 A kind of account management method and equipment
CN108228370A (en) * 2018-01-31 2018-06-29 优酷网络技术(北京)有限公司 The Activiation method and device of user's right
CN109787959A (en) * 2018-12-18 2019-05-21 中国平安财产保险股份有限公司 A kind of account information processing method and relevant apparatus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104518875B (en) * 2013-09-27 2018-12-11 深圳市腾讯计算机系统有限公司 A kind of method that authentication and account obtain, mobile terminal
CN105933339B (en) * 2016-06-24 2019-04-12 宇龙计算机通信科技(深圳)有限公司 A kind of application login method and mobile terminal
CN107958162A (en) * 2017-12-04 2018-04-24 珠海市魅族科技有限公司 A kind of application program operation method, terminal, computer installation and storage medium
CN109272320A (en) * 2018-08-16 2019-01-25 阿里巴巴集团控股有限公司 Personal identification method, device and equipment based on user behavior characteristics
CN110516423A (en) * 2019-08-30 2019-11-29 北京东软望海科技有限公司 Management method, device, electronic equipment and the readable storage medium storing program for executing of electronic equipment

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012161121A1 (en) * 2011-05-20 2012-11-29 日本放送協会 Broadcast-communication coordination receiving device and broadcast-communication coordination system
CN104518876A (en) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 Service login method and device
CN105099985A (en) * 2014-04-21 2015-11-25 百度在线网络技术(北京)有限公司 Login method and device of multiple applications
CN105306199A (en) * 2014-05-28 2016-02-03 腾讯科技(深圳)有限公司 Identity verification method, device and system
CN105404800A (en) * 2015-10-28 2016-03-16 腾讯科技(深圳)有限公司 Account information authorization method, terminal and server
CN106874738A (en) * 2017-01-25 2017-06-20 广东欧珀移动通信有限公司 The response method and mobile terminal of a kind of touch control operation
CN106940761A (en) * 2017-03-27 2017-07-11 联想(北京)有限公司 The control method and controller of a kind of application program
CN107135218A (en) * 2017-05-04 2017-09-05 腾讯科技(深圳)有限公司 Log in state acquisition, sending method, voucher collocation method, client and server
CN107506634A (en) * 2017-07-31 2017-12-22 广东欧珀移动通信有限公司 Display methods, device, storage medium and the terminal of data
CN108011887A (en) * 2017-12-14 2018-05-08 维沃移动通信有限公司 A kind of account management method and equipment
CN108228370A (en) * 2018-01-31 2018-06-29 优酷网络技术(北京)有限公司 The Activiation method and device of user's right
CN109787959A (en) * 2018-12-18 2019-05-21 中国平安财产保险股份有限公司 A kind of account information processing method and relevant apparatus

Also Published As

Publication number Publication date
CN111104653A (en) 2020-05-05

Similar Documents

Publication Publication Date Title
US11405380B2 (en) Systems and methods for using imaging to authenticate online users
CN105323253B (en) Identity verification method and device
CN106779716B (en) Authentication method, device and system based on block chain account address
US11811777B2 (en) Multi-factor authentication using confidant verification of user identity
CN104077689A (en) Information verification method, relevant device and system
WO2018077087A1 (en) Service implementation method and apparatus
KR20160006185A (en) Two factor authentication
CN104580112B (en) A kind of service authentication method, system and server
CN105656850B (en) Data processing method, related device and system
CN110247898B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
CN105989485B (en) Service management method and device
US20220150243A1 (en) Authentication server, and non-transitory storage medium
CN106529955A (en) Payment method and device
WO2018176020A1 (en) System and method for confirming a person's identity
CN111104653B (en) User operation processing method and device, electronic equipment and readable storage medium
CN114513350A (en) Identity verification method, system and storage medium
CN103975567A (en) Dual-factor authentication method and virtual machine device
CN113836509B (en) Information acquisition method, device, electronic equipment and storage medium
KR101940310B1 (en) Apparatus for verifying website and method thereof
CN111784355B (en) Transaction security verification method and device based on edge calculation
CN107622396B (en) Self-service transaction method, system and terminal equipment
CN114139121A (en) Identity verification method and device, electronic equipment and computer readable storage medium
CN104252676A (en) System and method for using real-time communication and digital certificate to authenticate Internet bank account identity
CN113935008B (en) User authentication method, device, electronic equipment and computer readable storage medium
US12073839B2 (en) Authentication by speech at a machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220908

Address after: 25 Financial Street, Xicheng District, Beijing 100033

Patentee after: CHINA CONSTRUCTION BANK Corp.

Address before: 25 Financial Street, Xicheng District, Beijing 100033

Patentee before: CHINA CONSTRUCTION BANK Corp.

Patentee before: Jianxin Financial Science and Technology Co.,Ltd.

TR01 Transfer of patent right