CN111539752A - Identity authentication method and device, storage medium and electronic equipment - Google Patents

Identity authentication method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN111539752A
CN111539752A CN202010354990.4A CN202010354990A CN111539752A CN 111539752 A CN111539752 A CN 111539752A CN 202010354990 A CN202010354990 A CN 202010354990A CN 111539752 A CN111539752 A CN 111539752A
Authority
CN
China
Prior art keywords
identity authentication
authentication
identity
authenticated
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010354990.4A
Other languages
Chinese (zh)
Inventor
吴沅宣
刘安珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010354990.4A priority Critical patent/CN111539752A/en
Publication of CN111539752A publication Critical patent/CN111539752A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Abstract

The application provides an identity authentication method, an identity authentication device, a storage medium and electronic equipment, and relates to the technical field of information security. The identity authentication method comprises the following steps: acquiring information to be authenticated of an identity authentication requester; determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (comparative tracking identity) authentication mode and a pedestrian public security networking check authentication mode on an identity card network; and authenticating the information to be authenticated by utilizing the currently usable identity authentication mode, and feeding back an authentication result to the identity authentication requester. By using the method, high availability and high stability can be achieved during identity authentication.

Description

Identity authentication method and device, storage medium and electronic equipment
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method and an apparatus for identity authentication, a storage medium, and an electronic device.
Background
At present, when commercial banks perform identity authentication online, supplementary face recognition is mostly performed by using a human public security networking check mode and an online or outsourcing face recognition technology, so that authentication of people and certificates in one is achieved. Wherein, the networking of people's public security is checked and is referred to: the public security department provides an identity authentication interface for each commercial bank through a Chinese people bank (hereinafter referred to as a bank), and the commercial bank can compare names and identity card numbers through the identity authentication interface and obtain face photos retained by the public security department.
However, once the networking inspection channel of the public security of the people goes down/fails, the identity authentication cannot be performed at all, and the people have a certain service time and cannot perform the identity authentication by using the interface at night, so that the availability and the stability of the authentication method are low.
Disclosure of Invention
In order to solve the technical problems in the prior art, the present application provides an identity authentication method, an identity authentication device, a storage medium, and an electronic device, which can achieve high availability and high stability during identity authentication.
The embodiment of the application provides an identity authentication method, which comprises the following steps:
acquiring information to be authenticated of an identity authentication requester;
determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (comparative tracking identity) authentication mode and a pedestrian public security networking check authentication mode on an identity card network;
and authenticating the information to be authenticated by utilizing the currently usable identity authentication mode, and feeding back an authentication result to the identity authentication requester.
Optionally, before the currently usable identity authentication manner is selected, the method further includes:
and when the identity authentication requester performs identity authentication within a preset time, acquiring an authentication result of the identity authentication performed by the identity authentication requester last time and feeding back the authentication result to the identity authentication requester.
Optionally, the information to be authenticated includes the identity information of the identity authentication requester and a face photo to be authenticated.
Optionally, when it is determined that the currently usable identity authentication method is the CTID authentication method, the authenticating the information to be authenticated by using the currently usable identity authentication method specifically includes:
and acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode.
Optionally, when it is determined that the currently usable identity authentication manner is the manway public security networking verification authentication manner, the authenticating the information to be authenticated by using the currently usable identity authentication manner specifically includes:
and acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the to-be-authenticated face photo to acquire an authentication result.
Optionally, the comparing the human face picture with the to-be-authenticated human face picture specifically includes:
and comparing the pedestrian face photo with the to-be-authenticated face photo by using a face recognition technology in a bank.
The present application further provides an identity authentication apparatus, the apparatus comprising: an acquisition unit, a determination unit and an authentication unit;
the acquiring unit is used for acquiring information to be authenticated of the identity authentication requester;
the determining unit is used for determining the currently available identity authentication mode, wherein the identity authentication mode comprises an identity card online function certificate CTID authentication mode and a pedestrian public security networking check authentication mode;
and the authentication unit is used for authenticating the information to be authenticated by using the currently available identity authentication mode and feeding back an authentication result to the identity authentication requester.
Optionally, the apparatus further comprises: a cache unit:
the cache unit is used for acquiring the authentication result of the identity authentication performed by the identity authentication requester at the last time and feeding the authentication result back to the identity authentication requester when the identity authentication requester performs the identity authentication within the preset time.
Optionally, the authentication unit is specifically configured to:
when the currently usable identity authentication mode is determined to be the CTID authentication mode, acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode;
and when the currently usable identity authentication mode is determined to be the pedestrian public security networking check authentication mode, acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the face photo to be authenticated to acquire an authentication result.
Optionally, the authentication unit may compare the human face picture with the to-be-authenticated human face picture by using a human face recognition technology inside a bank.
Embodiments of the present application further provide a storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for identity authentication as described above is implemented.
The embodiment of the application also provides electronic equipment, wherein the electronic equipment is used for running the program, and the identity authentication method is executed when the program runs.
The technical scheme provided by the application has the following advantages at least:
the method provided by the embodiment of the application obtains the information to be authenticated of the identity authentication requester, and then determines the currently usable identity authentication mode, wherein the identity authentication mode comprises an identity card online function certificate CTID authentication mode and a pedestrian public security networking check authentication mode. And authenticating the information to be authenticated by using the currently available identity authentication mode, and feeding back an authentication result to the identity authentication requester. Because the method can select the current available identity authentication mode, the CTID authentication mode can be used for providing the identity authentication service when the pedestrian public security networking check channel cannot provide the identity authentication service, and high availability and high stability are further achieved during identity authentication.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an identity authentication method according to an embodiment of the present application;
fig. 2 is a schematic diagram of an identity authentication apparatus according to an embodiment of the present application;
fig. 3 is a schematic diagram of another identity authentication apparatus provided in an embodiment of the present application;
fig. 4 is a schematic diagram of an identity authentication process provided in an embodiment of the present application;
fig. 5 is a schematic view of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The High Availability (High Availability) described in the embodiments of the present application specifically refers to: a system is described that is specially designed to reduce downtime while maintaining a high degree of availability of its services. In short, when some part or all of the system stops working due to failure, a method is adopted to enable the system to recover working as soon as possible.
The first embodiment is as follows:
the embodiment of the present application provides an Identity authentication method, which uses a CTID (Cyber Trusted Identity, an online function certificate of an Identity card) technology as a candidate, and is used in cooperation with a public security networking check to implement Identity authentication, and the CTID technology is first described below.
CTID: commonly called as network certificate, and is called as Identity card online function certificate (CTID, Cyber Trusted Identity). The method is simple in terms of 'virtual version of the identity card', and based on identity card making data by means of the internet modern technology and the biological characteristic identification technology, an electronic mapping file uniquely corresponding to an entity identity card chip is issued through an 'internet + credible identity authentication platform' supported by the national issuing and modifying committee. The data source of the network certificate CTID is authoritative, the signing platform is authoritative, and the data transmission is safe.
The method provided by the embodiment of the application is specifically described below with reference to the accompanying drawings.
Referring to fig. 1, the figure is a flowchart of a method for identity authentication provided in an embodiment of the present application.
The method comprises the following steps:
s101: and acquiring to-be-authenticated information of the identity authentication requester.
And acquiring to-be-authenticated information of the identity authentication requester through an identity authentication system of the bank.
In the application scenario of the embodiment of the application, the identity authentication means that the authenticity of the information to be authenticated of the identity authentication requester is authenticated. In some embodiments, the information to be authenticated includes identity information of an identity authentication requester and a picture of a face to be authenticated. At this time, the identity authentication specifically means that whether the actual object corresponding to the identity information is the identity authentication requester is authenticated, that is, whether the identity authentication requester uses the identity information of another person is identified.
Further, when the identity authentication requester performs identity authentication within a preset time, an authentication result of the identity authentication performed by the identity authentication requester at the previous time is obtained and fed back to the identity authentication requester.
The preset time may be a recent period of time, and in some embodiments, the preset time may be set to a last day, a last week, and the like, and the embodiment of the present application is not particularly limited.
Namely, after the identity authentication requester performs identity authentication, the record of the result of the identity authentication is stored, and when the identity authentication requester determines to perform identity authentication again through the identity information, the last authentication result stored in the preset time can be directly obtained, so that the fast and efficient identity authentication is realized.
It can be understood that, when the last authentication result does not exist, the identity authentication requester is characterized to perform identity authentication for the first time or not perform identity authentication in a short period, and at this time, the identity authentication is performed by adopting an identity authentication mode.
S102: and determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (computer telephony integration) authentication mode of an online function certificate of the identity card and a pedestrian public security networking verification authentication mode.
The method provided by the embodiment of the application can realize selection between two identity authentication modes. And when one identity authentication mode can not provide the service, selecting another identity authentication mode to complete the service.
In some embodiments, the CTID authentication mode may be used as a supplementary mode to the manway public security networking verification authentication mode, and when both the identity authentication modes are available, the manway public security networking verification authentication mode is preferentially used; and when the authentication mode of the pedestrian public security networking check is unavailable, selecting to use the CTID authentication mode.
In other embodiments, because the result feedback of the manway public security networking verification authentication mode is relatively slow, in order to improve the efficiency of identity authentication, when both the two identity authentication modes are available, the CTID authentication mode can be preferentially used; and when the CTID authentication mode is unavailable, selecting to use a public security networking verification authentication mode.
S103: and authenticating the information to be authenticated by using the currently available identity authentication mode, and feeding back an authentication result to the identity authentication requester.
When the currently usable identity authentication mode is determined to be the CTID authentication mode, the face photo to be verified and the identity information can be sent to the CTID authentication service, the CTID authentication mode is further utilized to obtain a checking result of the identity information and a comparison result of the face photo to be authenticated, and then an identity authentication result is fed back.
When the currently usable identity authentication mode is determined to be a pedestrian public security networking check authentication mode, acquiring a pedestrian face photo corresponding to identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the face photo to be authenticated to acquire an authentication result.
In some embodiments, when the human face photo is compared with the human face photo to be authenticated, the human face photo and the human face photo to be authenticated may be compared by using a human face recognition technology inside a bank. The embodiment of the present application does not specifically limit the face recognition technology used in the bank.
The method provided by the embodiment of the application is utilized to firstly obtain the information to be authenticated of the identity authentication requester, then determine the currently usable identity authentication mode, authenticate the information to be authenticated by utilizing the currently usable identity authentication mode, and feed back the authentication result to the identity authentication requester. Because the method can select the current available identity authentication mode, the identity authentication service can be provided by using the CTID authentication mode when the pedestrian public security networking check channel cannot provide the identity authentication service, and high availability and high stability are further achieved during identity authentication.
Example two:
based on the method for identity authentication provided by the above embodiment, the embodiment of the present application further provides a method for identity authentication, which is specifically described below with reference to the accompanying drawings.
Referring to fig. 2, this figure is a schematic diagram of an identity authentication apparatus according to an embodiment of the present application.
The device of the embodiment of the application comprises: an acquisition unit 201, a determination unit 202, and an authentication unit 203.
The obtaining unit 201 is configured to obtain information to be authenticated of an identity authentication requester.
In some embodiments, the information to be authenticated includes identity information of an identity authentication requester and a picture of a face to be authenticated.
The determining unit 202 is configured to determine currently available identity authentication manners, where the identity authentication manners include an identity card online function certificate CTID authentication manner and a pedestrian public security networking verification authentication manner.
The authentication unit 203 is configured to authenticate information to be authenticated by using a currently available identity authentication method, and feed back an authentication result to the identity authentication requester.
Further, the authentication unit 203 is specifically configured to:
when the currently usable identity authentication mode is determined to be the CTID authentication mode, acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode;
and when the currently usable identity authentication mode is determined to be the pedestrian public security networking check authentication mode, acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the face photo to be authenticated to acquire an authentication result.
Optionally, the authentication unit 203 may compare the human face picture with the to-be-authenticated human face picture by using a human face recognition technology inside a bank.
Referring to fig. 3, this figure is a schematic view of another identity authentication apparatus provided in this embodiment of the present application.
This authentication apparatus differs from the authentication apparatus shown in fig. 2 in that: a cache unit 204 is also included.
The cache unit 204 is configured to, when the identity authentication requester performs identity authentication within a preset time, obtain an authentication result of the identity authentication performed by the identity authentication requester last time and feed the authentication result back to the identity authentication requester.
Referring to fig. 4, this figure is a schematic diagram of an identity authentication process provided in an embodiment of the present application.
The acquiring unit 201 acquires identity information of an identity authentication requester and a picture of a face to be authenticated.
When determining that the authentication result of the identity authentication performed by the identity authentication requester at the previous time is stored in the cache unit 204, the determining unit 202 directly obtains the authentication result and feeds the authentication result back to the identity authentication requester.
When the cache unit 204 has no previous authentication result, the determination unit determines the currently available identity authentication mode.
The authentication unit 203 may specifically include a CTID authentication unit 203a and a human networking check unit 203b, which are respectively configured to provide two different identity authentication manners.
By using the device provided by the embodiment of the application, the information to be authenticated of the identity authentication requester is acquired through the acquisition unit, then the currently usable identity authentication mode is determined through the determination unit, then the authentication unit authenticates the information to be authenticated by using the currently usable identity authentication mode, and the authentication result is fed back to the identity authentication requester. Because the device can select the current available identity authentication mode, the CTID authentication mode can be used for providing the identity authentication service when the pedestrian public security networking check channel cannot provide the identity authentication service, and high availability and high stability are further achieved during identity authentication.
The identity authentication device comprises a processor and a memory, wherein the acquisition unit, the determination unit, the authentication unit and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more, and the above identity authentication method is realized by adjusting kernel parameters.
The embodiment of the invention also provides a storage medium, wherein a program is stored on the storage medium, and the program realizes the identity authentication method when being executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein the identity authentication method is executed when the program runs.
The embodiment of the invention also provides electronic equipment which is specifically described below by combining the attached drawings.
Referring to fig. 5, the figure is a schematic view of an electronic device provided in an embodiment of the present application.
The electronic device 50 comprises at least one processor 501, and at least one memory 502, a bus 503 connected to the processor 501; the processor 501 and the memory 502 complete communication with each other through the bus 503; the processor 501 is used to call program instructions in the memory 502 to perform the above-described method of identity authentication. The electronic device 50 in the present application may be a server, a PC, a PAD, a mobile phone, and the like, which is not particularly limited in this embodiment.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
acquiring information to be authenticated of an identity authentication requester;
determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (comparative tracking identity) authentication mode and a pedestrian public security networking check authentication mode on an identity card network;
and authenticating the information to be authenticated by utilizing the currently usable identity authentication mode, and feeding back an authentication result to the identity authentication requester.
Optionally, the method further includes:
and when the identity authentication requester performs identity authentication within a preset time, acquiring an authentication result of the identity authentication performed by the identity authentication requester last time and feeding back the authentication result to the identity authentication requester.
Optionally, the information to be authenticated includes the identity information of the identity authentication requester and a face photo to be authenticated.
Optionally, when it is determined that the currently usable identity authentication method is the CTID authentication method, the authenticating the information to be authenticated by using the currently usable identity authentication method specifically includes:
and acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode.
Optionally, when it is determined that the currently usable identity authentication manner is the manway public security networking verification authentication manner, the authenticating the information to be authenticated by using the currently usable identity authentication manner specifically includes:
and acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the to-be-authenticated face photo to acquire an authentication result.
Optionally, the comparing the human face picture with the to-be-authenticated human face picture specifically includes:
and comparing the pedestrian face photo with the to-be-authenticated face photo by using a face recognition technology in a bank.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a device includes one or more processors (CPUs), memory, and a bus. The device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method of identity authentication, the method comprising:
acquiring information to be authenticated of an identity authentication requester;
determining the currently usable identity authentication mode, wherein the identity authentication mode comprises a CTID (comparative tracking identity) authentication mode and a pedestrian public security networking check authentication mode on an identity card network;
and authenticating the information to be authenticated by utilizing the currently usable identity authentication mode, and feeding back an authentication result to the identity authentication requester.
2. The method of claim 1, wherein prior to selecting the currently available authentication mode, the method further comprises:
and when the identity authentication requester performs identity authentication within a preset time, acquiring an authentication result of the identity authentication performed by the identity authentication requester last time and feeding back the authentication result to the identity authentication requester.
3. The method according to claim 1, wherein the information to be authenticated comprises identity information of the identity authentication requester and a picture of a face to be authenticated.
4. The method according to claim 3, wherein when it is determined that the currently available identity authentication method is the CTID authentication method, the authenticating the information to be authenticated by using the currently available identity authentication method specifically includes:
and acquiring a checking result of the identity information and a comparison result of the face photo to be authenticated by using the CTID authentication mode.
5. The method according to claim 3, wherein when it is determined that the currently available identity authentication method is the manway public security networking verification authentication method, the authenticating the information to be authenticated by using the currently available identity authentication method specifically includes:
and acquiring a pedestrian face photo corresponding to the identity information by using the pedestrian public security networking check authentication mode, and comparing the pedestrian face photo with the to-be-authenticated face photo to acquire an authentication result.
6. The method according to claim 5, wherein the comparing the human face picture with the human face picture to be authenticated specifically comprises:
and comparing the pedestrian face photo with the to-be-authenticated face photo by using a face recognition technology in a bank.
7. An apparatus for identity authentication, the apparatus comprising: an acquisition unit, a determination unit and an authentication unit;
the acquiring unit is used for acquiring information to be authenticated of the identity authentication requester;
the determining unit is used for determining the currently available identity authentication mode, wherein the identity authentication mode comprises an identity card online function certificate CTID authentication mode and a pedestrian public security networking check authentication mode;
and the authentication unit is used for authenticating the information to be authenticated by using the currently available identity authentication mode and feeding back an authentication result to the identity authentication requester.
8. The apparatus of claim 7, further comprising: a cache unit:
the cache unit is used for acquiring the authentication result of the identity authentication performed by the identity authentication requester at the last time and feeding the authentication result back to the identity authentication requester when the identity authentication requester performs the identity authentication within the preset time.
9. A storage medium, having stored thereon a computer program which, when executed by a processor, carries out the method of identity authentication of any one of claims 1-6.
10. An electronic device, wherein the electronic device is configured to run a program, and wherein the program is configured to execute the method for authenticating according to any one of claims 1 to 6 when running.
CN202010354990.4A 2020-04-29 2020-04-29 Identity authentication method and device, storage medium and electronic equipment Pending CN111539752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010354990.4A CN111539752A (en) 2020-04-29 2020-04-29 Identity authentication method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010354990.4A CN111539752A (en) 2020-04-29 2020-04-29 Identity authentication method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN111539752A true CN111539752A (en) 2020-08-14

Family

ID=71975988

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010354990.4A Pending CN111539752A (en) 2020-04-29 2020-04-29 Identity authentication method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN111539752A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046562A (en) * 2015-09-10 2015-11-11 腾讯科技(深圳)有限公司 Risk control system and risk control data acquisition method
CN108173870A (en) * 2018-01-15 2018-06-15 广州大白互联网科技有限公司 A kind of net for authentication demonstrate,proves generation method and system
CN110334489A (en) * 2019-07-12 2019-10-15 广州大白互联网科技有限公司 A kind of unified single sign-on system and method
CN110557366A (en) * 2019-07-15 2019-12-10 安徽继远软件有限公司 Identity authentication system and method based on cross-network transmission and CTID (computer telephony integration) network card authentication
WO2020024929A1 (en) * 2018-08-03 2020-02-06 华为技术有限公司 Method for upgrading service application range of electronic identity card, and terminal device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046562A (en) * 2015-09-10 2015-11-11 腾讯科技(深圳)有限公司 Risk control system and risk control data acquisition method
CN108173870A (en) * 2018-01-15 2018-06-15 广州大白互联网科技有限公司 A kind of net for authentication demonstrate,proves generation method and system
WO2020024929A1 (en) * 2018-08-03 2020-02-06 华为技术有限公司 Method for upgrading service application range of electronic identity card, and terminal device
CN110334489A (en) * 2019-07-12 2019-10-15 广州大白互联网科技有限公司 A kind of unified single sign-on system and method
CN110557366A (en) * 2019-07-15 2019-12-10 安徽继远软件有限公司 Identity authentication system and method based on cross-network transmission and CTID (computer telephony integration) network card authentication

Similar Documents

Publication Publication Date Title
TWI682651B (en) Authentication method, authentication data processing method and device based on blockchain
CN108665946B (en) Service data access method and device
US20210328992A1 (en) Computer readable storage media for tiered connection pooling and methods and systems for utilizing same
CA3020059C (en) Method and device for registering biometric identity and authenticating biometric identity
US10812477B2 (en) Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
US11838425B2 (en) Systems and methods for maintaining decentralized digital identities
CN105553919B (en) A kind of identity identifying method and device
CN105207996B (en) Account merging method and device
US8719911B2 (en) Methods, systems, and computer program products for authenticating an identity of a user by generating a confidence indicator of the identity of the user based on a combination of multiple authentication techniques
CN105592011B (en) Account login method and device
AU2018323233A1 (en) Resource transfer method, fund payment method and apparatus, and electronic device
EP3413255A1 (en) Electronic payment service processing method and device, and electronic payment method and device
CN107040560B (en) Service processing method and device based on service platform
CN109086596B (en) Authentication method, device and system for application program
CN108964925A (en) A kind of document authentication device, method, device, equipment and readable medium
CN111881483B (en) Resource account binding method, device, equipment and medium based on blockchain
CN110032846B (en) Identity data anti-misuse method and device and electronic equipment
CN109409110A (en) A kind of electronic document signature method, device, equipment and readable medium
US20220067036A1 (en) Systems and methods for a federated directory service
US10778673B2 (en) Methods for randomized multi-factor authentication with biometrics and devices thereof
US20230222243A1 (en) Method and system for managing access to entity identity data
CN112052434A (en) Electronic file verification method and device, electronic equipment and readable storage medium
CN111539752A (en) Identity authentication method and device, storage medium and electronic equipment
CN113836331A (en) Image query method, device and storage medium
CN109561123B (en) Token caching method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200814

RJ01 Rejection of invention patent application after publication