CN111541543B - Information verification method, information verification device, computer equipment and storage medium - Google Patents

Information verification method, information verification device, computer equipment and storage medium Download PDF

Info

Publication number
CN111541543B
CN111541543B CN202010192500.5A CN202010192500A CN111541543B CN 111541543 B CN111541543 B CN 111541543B CN 202010192500 A CN202010192500 A CN 202010192500A CN 111541543 B CN111541543 B CN 111541543B
Authority
CN
China
Prior art keywords
user
information
password
target
target client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010192500.5A
Other languages
Chinese (zh)
Other versions
CN111541543A (en
Inventor
刘竹君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN202010192500.5A priority Critical patent/CN111541543B/en
Publication of CN111541543A publication Critical patent/CN111541543A/en
Application granted granted Critical
Publication of CN111541543B publication Critical patent/CN111541543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application relates to the technical field of passwords and discloses an information verification method, an information verification device, computer equipment and a storage medium, wherein the information verification method comprises the following steps: acquiring customer visit plan information of a user, and acquiring current first moment and position information of the user when a visit instruction triggered when the user visits the target customer is received; firstly, verifying whether the first moment is positioned in a visit time period and whether the position information of a user and the position information of a target client are in a preset distance range; and generating two different passwords based on the first moment, the fingerprint information of the target client and the fingerprint information of the user, respectively transmitting the two different passwords to the sales user and the target client, and simultaneously encrypting the password transmitted to the target client through the other password, wherein the two passwords cannot be easily obtained, and the user can be verified to visit the client successfully only when the user really visits the target client, so that whether the user really visits the client is effectively verified.

Description

Information verification method, information verification device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of cryptography, and in particular, to an information verification method, apparatus, computer device, and storage medium.
Background
At present, an enterprise has a plurality of off-line sales personnel, the quantity of the off-line sales personnel is difficult to manage, the distribution of off-line clients is wide and difficult to master, a division company in each region has a plurality of sales personnel, each sales personnel needs to visit a plurality of clients every day, regular spot check cannot cover all clients, the visiting information of the clients actually visited by the sales personnel cannot be known by the enterprise, and the enterprise cannot verify whether the sales personnel actually visited the clients through the visiting information of the sales personnel.
Disclosure of Invention
The main purpose of the application is to provide an information verification method, an information verification device, computer equipment and a storage medium, which aim to overcome the defect that whether sales personnel actually visit clients or not cannot be verified at present.
In order to achieve the above object, the present application provides an information verification method, including the steps of:
acquiring customer visit plan information of a user, wherein the customer visit plan information comprises a visit time period of the user visiting a target customer and user information of the target customer, and the user information of the target customer at least comprises position information and terminal information of the target customer;
when a visit instruction triggered when the user visits the target client is received, acquiring the current first moment and the position information of the user;
Judging whether the first moment is positioned in the visit time period, if so, judging whether the position information of the user and the target client position information are in a preset distance range;
if the target client is within the preset distance range, acquiring fingerprint information of the target client and fingerprint information of the user through a first terminal where the user is located;
generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal;
generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password, and sending the encrypted second password to a second terminal where the target client is located;
issuing a request for inputting the second password to the first terminal so as to pop up an input box for inputting the second password on the first terminal;
and receiving information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client.
Further, the step of generating a first password according to the fingerprint information of the user and the first time includes:
acquiring the number of hours and the number of minutes in the first moment;
acquiring a target position range corresponding to the hours from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
identifying the fingerprint information of the user to obtain a first fingerprint feature sequence;
selecting a target character string in a target position range from the first fingerprint feature sequence;
and splicing the target character string and the minutes according to a preset sequence to generate the first password.
Further, the step of generating a second password according to the fingerprint information of the user, the fingerprint information of the target client, and the first time includes:
acquiring the number of hours and the number of minutes in the first moment;
acquiring a first letter corresponding to the number of hours from a preset database, and acquiring a second letter corresponding to the number of minutes from the preset database; wherein, the preset database stores a plurality of mapping relations between numbers and letters;
Respectively identifying the fingerprint information of the user and the fingerprint information of the target client to obtain a corresponding first fingerprint feature sequence and a corresponding second fingerprint feature sequence;
respectively selecting characters at designated positions from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a corresponding second character string;
and splicing the first character string, the second character string, the first letter and the second letter to generate the second password.
Further, the step of splicing the first character string, the second character string, the first letter and the second letter to generate the second password includes:
comparing the time sequence of the obtained fingerprint information of the user and the fingerprint information of the target client;
according to the time sequence of acquiring the fingerprint information of the user and the fingerprint information of the target client, arranging the first character string and the second character string, and splicing the first character string and the second character string into a third character string;
comparing the number of hours and the number of minutes;
if the number of hours is larger than the number of minutes, splicing the first letter, the third character string and the second letter in sequence to generate the second password;
And if the hour number is not greater than the minute number, splicing the second letter, the third character string and the first letter in sequence to generate the second password.
Further, after the step of receiving the information input by the user in the input box and judging whether the information is the same as the second password, if so, verifying that the user is a true visiting target client, the method comprises the following steps:
sending an instruction for starting a recording function to the first terminal so as to record the visit record through the first terminal;
when a call ending instruction triggered by the user is received, controlling the first terminal to end recording so as to generate a recording file, and acquiring a current second moment;
generating a third password according to the second moment and the fingerprint information of the user;
sending a request instruction to the first terminal to request uploading of the recording file;
receiving the sound recording file uploaded by the first terminal, encrypting the sound recording file through the third password, storing the sound recording file, and generating a storage link;
and sending the storage link and the third password to the first terminal.
The application also provides an information verification device, comprising:
the first acquisition unit is used for acquiring client visit plan information of a user, wherein the client visit plan information comprises a visit time period of the user visiting a target client and the user information of the target client, and the user information of the target client at least comprises position information and terminal information of the target client;
the second acquisition unit is used for acquiring the current first moment and the position information of the user when receiving a visit instruction triggered when the user visits the target client;
the first judging unit is used for judging whether the first moment is positioned in the visit time period or not, and if so, judging whether the position information of the user and the target client position information are in a preset distance range or not;
the third acquisition unit is used for acquiring the fingerprint information of the target client and the fingerprint information of the user through the first terminal where the user is located if the third acquisition unit is in the preset distance range;
the first generation unit is used for generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal;
The second generation unit is used for generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password and sending the encrypted second password to a second terminal where the target client is located;
the issuing unit is used for issuing a request for inputting the second password to the first terminal so as to pop up an input box for inputting the second password on the first terminal;
and the verification unit is used for receiving the information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client.
Further, the first generating unit includes:
a first obtaining subunit, configured to obtain the number of hours and the number of minutes in the first time;
the second acquisition subunit is used for acquiring a target position range corresponding to the hour number from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
the first recognition subunit is used for recognizing the fingerprint information of the user to obtain a first fingerprint feature sequence;
A first selecting subunit, configured to select a target character string in a target position range from the first fingerprint feature sequence;
and the first generation subunit is used for splicing the target character string and the minutes according to a preset sequence to generate the first password.
Further, the second generating unit includes:
a third obtaining subunit, configured to obtain the number of hours and the number of minutes in the first time;
a fourth obtaining subunit, configured to obtain a first letter corresponding to the number of hours from a preset database, and obtain a second letter corresponding to the number of minutes from the preset database; wherein, the preset database stores a plurality of mapping relations between numbers and letters;
the second recognition subunit is used for respectively recognizing the fingerprint information of the user and the fingerprint information of the target client to obtain a corresponding first fingerprint feature sequence and a corresponding second fingerprint feature sequence;
the second selecting subunit is used for respectively selecting characters at the designated positions from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a corresponding second character string;
And the second generation subunit is used for splicing the first character string, the second character string, the first letter and the second letter to generate the second password.
The present application also provides a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of any of the methods described above when the computer program is executed.
The present application also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method of any of the above.
The information verification method, the information verification device, the computer equipment and the storage medium acquire current first moment and position information of the user when a visit instruction triggered when the user visits the target client is received; judging whether the first moment is positioned in the visit time period, if so, judging whether the position information of the user and the target client position information are in a preset distance range; if the target client is within the preset distance range, acquiring fingerprint information of the target client and fingerprint information of the user through a first terminal where the user is located; generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal; generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password, and sending the encrypted second password to a second terminal where the target client is located; issuing a request for inputting the second password to the first terminal so as to pop up an input box for inputting the second password on the first terminal; and receiving information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client. During verification, fingerprint information of both the user and the salesperson needs to be obtained, and verification can be completed only by data exchange of both the user and the salesperson, so that the defect that whether the salesperson actually visits the client or not cannot be verified at present is overcome.
Drawings
FIG. 1 is a schematic diagram showing steps of an information verification method according to an embodiment of the present application;
FIG. 2 is a block diagram of an information verification device according to an embodiment of the present application;
fig. 3 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present application.
The realization, functional characteristics and advantages of the present application will be further described with reference to the embodiments, referring to the attached drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Referring to fig. 1, in one embodiment of the present application, there is provided an information verification method, including the steps of:
step S1, acquiring client visit plan information of a user, wherein the client visit plan information comprises a visit time period of the user visiting a target client and user information of the target client, and the user information of the target client at least comprises position information and terminal information of the target client;
step S2, when a visit instruction triggered when the user visits the target client is received, acquiring the current first moment and the position information of the user;
Step S3, judging whether the first moment is positioned in the visit time period, if so, judging whether the position information of the user and the target client position information are in a preset distance range;
step S4, if the target client is within the preset distance range, acquiring the fingerprint information of the target client and the fingerprint information of the user through a first terminal where the user is located;
step S5, generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal;
step S6, generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password, and sending the encrypted second password to a second terminal where the target client is located;
step S7, a request for inputting the second password is issued to the first terminal, so that an input box for inputting the second password is popped up on the first terminal;
and S8, receiving information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client.
In this embodiment, the information verification method is executed by the server and is applied to verifying the authenticity of the sales personnel when visiting the client, so as to realize the assessment of the sales personnel when visiting the client. In the method, two different passwords are generated based on the first moment of starting to visit the target client, the fingerprint information of the target client and the fingerprint information of the user, the two different passwords are respectively sent to different people (sales user and target client), meanwhile, the password sent to the target client is encrypted through another password, the two passwords cannot be easily obtained, and the user can be verified to visit the target client only when actually visiting the target client; the user is prevented from being falsified, monitoring and verification are not needed manually, full-automatic processing is achieved, and verification efficiency is improved.
Specifically, as described in the step S1, the user is a sales person of the enterprise, and before the sales person visits the client, the sales person needs to fill in corresponding client visit plan information on the corresponding system and report the corresponding client visit plan information to the server for management, that is, report the client information to be visited in advance; the above-mentioned customer visiting plan information includes the visiting time period of the user visiting the target customer, the user information of the target customer includes customer location information and terminal information of the customer at least (such as the contact telephone of the customer); i.e. the sales person needs to fill in which customer will be visited at what time and where, e.g. the above-mentioned customer visit plan information is: visit time-xxxx year xx month xx day three and a half afternoon, target client-Shenzhen south mountain area south head street xx building xx room, client contact phone 159xxxxxxxx.
As described in step S2, when the user actually visits the target client, the corresponding visit instruction may be triggered by the first terminal where the user is located, for example, a start visit button set on a corresponding page on the first terminal is triggered to trigger the visit instruction, the visit instruction is sent to the server, and the server may receive the visit instruction triggered when the user visits the target client. At this time, the current first moment is acquired, namely the time when the user starts to visit the target client; and simultaneously, the position information of the user at present is obtained in real time through the first terminal.
As described in the above step S3, the user triggers the visit instruction, but the visit instruction is not necessarily in the visit period or the visit location range; therefore, after the current first moment and the position information of the user are acquired, whether the first moment is located in the visit time period or not needs to be judged, and if so, whether the position information of the user and the position information of the client are in a preset distance range or not is judged; if the first moment is not located in the visit time period, the visit time is recorded and marked as visit failure.
If the location information of the user and the client location information are within the preset distance range, it is indicated that the current user is actually near the target client, but only the user' S distance from the target client is confirmed, and the user cannot be confirmed to be actually near the visiting client, and other matters unrelated to the visiting client may be processed near the target client.
Therefore, the fingerprint information of the target client and the fingerprint information of the user need to be acquired through the first terminal where the first user is located; in general, image information may be acquired by a plurality of terminal apparatuses, respectively, and the plurality of terminal apparatuses may be mutually transmitted; the fingerprint information can only be acquired by the fingerprint identification sensor, and the mutual transmission of social software between terminals can not be performed; therefore, the fingerprint information of the target client and the fingerprint information of the user are acquired through the fingerprint identification sensor arranged on the first terminal of the sales person, so that the user and the target client can be ensured to be in the same place, and in-plane communication can be directly carried out. In this embodiment, the time sequence for acquiring the fingerprint information of the target client and the fingerprint information of the user is not limited.
In order to further improve the accuracy of verifying the user' S visiting client, as described in the above step S5, a first password is generated according to the fingerprint information of the user and the first time, where the first password is generated according to the current time and the fingerprint information of the user, and has uniqueness, and the first password is further combined with the current time, so that the first password has high uniqueness, that is, is different from the prior art, that is, only means for encrypting by the fingerprint information (in the prior art, generally, as long as the user is the same, the corresponding fingerprint is unchanged, and when the fingerprint is used as the encryption means, the corresponding password is also unchanged). In this embodiment, even the same user generates the first password each time, so that the user is prevented from cracking the password. Meanwhile, a first password is generated by combining the time information and the fingerprint information, so that the complexity of the password is improved.
Further, converting the first password into voice and sending the voice to the first terminal; the reason why the first password is converted into voice and sent to the first terminal in the application is that: if the first password is sent to the first terminal in the form of text, the first password can be sent to the target client remotely in the form of screenshot, copying and the like to inform the target client when the user and the target client are not in the same place. The first password is sent in a voice mode, the voice cannot be copied, password information cannot be directly displayed, a user cannot remotely send the first password to a target client in a screenshot mode, a copying mode and the like, and the user is prevented from doing falsification.
As described in step S6, a second password is generated according to the fingerprint information of the user, the fingerprint information of the target client, and the first time, and the second password is generated according to the current time, the fingerprint information of the target client, and the fingerprint information of the user, and has uniqueness, and the second password is combined with the current time, so that the first password has high uniqueness, that is, is different from the prior art, only by means of encrypting the fingerprint information. Therefore, even the same user and the same target client can not generate the same second password each time, and the user is prevented from cracking the password. Meanwhile, in this embodiment, a second password is generated by combining time information and fingerprint information of a plurality of different users (sales personnel and target clients), so that the complexity of the password is improved. In this embodiment, the second password is actually an authentication password, and is used as an authentication condition for finally authenticating whether the user has visited or not, and is not used as a password. The second password is sent to the second terminal of the target client, so that if the user and the target client are not in the same place, the user cannot acquire the second password.
In order to further avoid the second password from being cracked, the first password is also used for encrypting the second password; if the target client cannot acquire the first password, decryption cannot be performed to acquire the second password; the sales person cannot be informed of the second password, and the sales person cannot complete visit verification. In the embodiment, the first password and the second password are respectively sent to different people, so that the accuracy in verification is ensured, and the falsification is avoided.
Therefore, when the user and the target client are in a unified place, the user can play the voice corresponding to the first password received by the user on the first terminal to the target client, so that the target client can conveniently acquire the first password from the voice, and the first password is input to decrypt the second password to acquire the second password. Further, when the user is in the same location as the target client, the user may acquire the second password from the second terminal of the target client.
And as described in the above step S7, a request for inputting the second password is issued to the first terminal, so as to pop up an input box for inputting the second password on the first terminal. That is, the server notifies the user to input the corresponding second password in the first terminal, and the user needs to decrypt the second password in the second terminal of the target client using the first password, and then can acquire the content of the second password, so that the second password is input in the input box.
And step S8, receiving information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting client. If the user and the target client are not in the same place, the user cannot inform the target client of the first password, so that the corresponding second password cannot be obtained, and visit verification cannot be completed. In an embodiment, a preset time may also be set, and if the information input by the user in the input box is not received when the preset time arrives, the call authentication is also determined to be failed.
In an embodiment, the step S5 of generating the first password according to the fingerprint information of the user and the first time includes:
step S501, obtaining the number of hours and the number of minutes in the first moment;
step S502, obtaining a target position range corresponding to the hours from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
step S503, identifying the fingerprint information of the user to obtain a first fingerprint feature sequence;
Step S504, selecting a target character string in a target position range from the first fingerprint feature sequence;
and step S505, splicing the target character string and the minutes according to a preset sequence to generate the first password.
In this embodiment, a scheme of generating a first password according to fingerprint information of a user and the first time is specifically provided; at each instant, there is a corresponding number of hours and minutes, for example 19:28 pm, 19 hours and 28 minutes.
Storing a mapping relation between the number of hours and a position range in a preset database, wherein the position range refers to a digit range; for example, bits 5-11, bits 4-10, or bits 3, 6, 7, 12, etc. in a string of characters. When the number of hours is different, the corresponding position ranges are also different; the corresponding bit ranges are quite different in different hours, and the subsequent generation of repeated first passwords is avoided. Preferably, the mapping relationship may be automatically updated every preset time.
When the fingerprint information of the user is identified, a corresponding first fingerprint feature sequence can be obtained, and the first fingerprint feature sequence can also be called as a feature value or a fingerprint sequence of the fingerprint; for example, the first fingerprint feature sequence obtained by identifying the fingerprint information of the user is: 1079623487336458 … ….
And selecting a target character string in a target position range from the first fingerprint feature sequence, namely selecting a plurality of characters from the first fingerprint feature sequence to form a target character string. Specifically, if the target position range corresponding to the number of hours (19) is 5-8 bits, the first fingerprint feature sequence is: 1079623487336458 … …, the target string is 6234873.
Further, the first password is generated by concatenating the target character string and the number of minutes, and the order of concatenating the target character string and the number of minutes may be the order of preceding minutes, the order of succeeding minutes, or the order of interleaving the target character string and the number of minutes; in other embodiments, a preset separator or letter may be added during the above-mentioned splicing process. For example, the first password spliced by the above is 2-6234873-8.
In this embodiment, a first password is generated by combining multiple information, which not only increases the complexity of the first password, but also avoids duplication.
In an embodiment, the step S6 of generating the second password according to the fingerprint information of the user, the fingerprint information of the target client, and the first time includes:
Step S61, obtaining the number of hours and the number of minutes in the first moment;
step S62, acquiring a first letter corresponding to the number of hours from a preset database, and acquiring a second letter corresponding to the number of minutes from the preset database; wherein, the preset database stores a plurality of mapping relations between numbers and letters;
step S63, respectively identifying the fingerprint information of the user and the fingerprint information of the target client to obtain a corresponding first fingerprint feature sequence and a corresponding second fingerprint feature sequence;
step S64, respectively selecting characters at designated positions from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a corresponding second character string;
and step S65, splicing the first character string, the second character string, the first letter and the second letter to generate the second password.
In this embodiment, a scheme of generating a second password according to the fingerprint information of the user, the fingerprint information of the target client, and the first time is specifically proposed; at each instant, there is a corresponding number of hours and minutes, for example 19:28 pm, 19 hours and 28 minutes. The number of hours and minutes is a number.
And storing the mapping relation between the numbers and the letters in a preset database, wherein the letters are letters such as a, b and c. When the number of hours and the number of minutes are different, the corresponding letters are also different; the letters corresponding to the different hours and minutes are distinct, so that the subsequent generation of repeated second passwords is avoided. Preferably, the mapping relationship may be automatically updated every preset time.
When the fingerprint information of the user and the fingerprint information of the target client are identified, a first fingerprint feature sequence and a second fingerprint feature sequence corresponding to the fingerprint information can be obtained, and the fingerprint feature sequence can also be called as a feature value or a fingerprint sequence of the fingerprint; for example, the first fingerprint feature sequence obtained by identifying the fingerprint information of the user is: 1079623487336458 … …, the second fingerprint feature sequence obtained by identifying the fingerprint information of the target client is 37561985546597116 … ….
Selecting characters at a designated position from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a second character string, namely respectively selecting a plurality of characters from the first character string and the second character string; for example, the 13 th to 16 th bit characters are selected from the first fingerprint feature sequence and the second fingerprint feature sequence, and the obtained first character string and second character string are: 6458. 9711.
Further, the first character string, the second character string, the first letter and the second letter are spliced to generate the second password, and in this embodiment, the order of splicing the first character string, the second character string, the first letter and the second letter is not limited, and any splicing can be performed. In this embodiment, a second password is generated by combining multiple information, which not only increases the complexity of the second password, but also avoids duplication.
In one embodiment, the order in which the first character string, the second character string, the first letter, and the second letter are spliced is defined.
The step S65 of splicing the first string, the second string, the first letter and the second letter to generate the second password specifically includes:
step S651, comparing the time sequence of the obtained fingerprint information of the user with the time sequence of the obtained fingerprint information of the target client;
step S652, according to the time sequence of obtaining the fingerprint information of the user and the fingerprint information of the target client, arranging the first character string and the second character string, and splicing the first character string and the second character string into a third character string;
step S653, comparing the number of hours with the number of minutes;
Step S654, if the number of hours is greater than the number of minutes, sequentially splicing the first letter, the third character string and the second letter to generate the second password;
and step S655, if the number of hours is not greater than the number of minutes, splicing the second letter, the third character string and the first letter in sequence to generate the second password.
It should be understood that after successfully verifying that the user is actually visiting the target user, recording processing should be performed on the visit record of the user, so that the user can conveniently retain key information and check the user.
In one embodiment, after step S8 of receiving the information input by the user in the input box, and determining whether the information is the same as the second password, if so, verifying that the user is a true visiting target client, the method includes:
step S9, an instruction for starting a recording function is sent to the first terminal so as to record the visit record through the first terminal; the first terminal has a recording function, and the server issues corresponding control instructions to control the first terminal to start recording.
Step S10, when receiving an ending visit instruction triggered by the user, controlling the first terminal to end recording so as to generate a recording file, and acquiring a current second moment;
Step S11, generating a third password according to the second moment and the fingerprint information of the user;
in this embodiment, the third password may be generated by using the first password or the second password; for example, in one embodiment, the generating the third password includes:
acquiring the number of hours and minutes in the second moment;
acquiring a target position range corresponding to the hours from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
identifying the fingerprint information of the user to obtain a third fingerprint feature sequence;
selecting a target character string in a target position range from the third fingerprint feature sequence;
and splicing the target character string and the minutes according to a preset sequence to generate the third password.
Step S12, a request instruction is sent to the first terminal to request uploading of the recording file;
step S13, receiving the sound recording file uploaded by the first terminal, encrypting the sound recording file through the third password, storing the sound recording file, and generating a storage link;
And step S14, the storage link and the third password are sent to the first terminal. And the storage link is sent to the first terminal where the user is located, so that the user can conveniently inquire the visiting voice later and can conveniently carry out work.
Referring to fig. 2, there is further provided an information verification apparatus according to an embodiment of the present application, including:
a first obtaining unit 10, configured to obtain user's user visit plan information, where the user visit plan information includes a visit time period of the user visiting a target user and user information of the target user, and the user information of the target user includes at least location information and terminal information of the target user;
a second obtaining unit 20, configured to obtain, when a visit instruction triggered when the user visits the target client is received, a current first moment and location information of the user;
a first judging unit 30, configured to judge whether the first time is within the visit period, and if so, judge whether the location information of the user and the location information of the target client are within a preset distance range;
a third obtaining unit 40, configured to obtain, if the fingerprint information of the target client and the fingerprint information of the user are within a preset distance range, through a first terminal where the user is located;
A first generating unit 50, configured to generate a first password according to the fingerprint information of the user and the first time, and convert the first password into voice and send the voice to the first terminal;
a second generating unit 60, configured to generate a second password according to the fingerprint information of the user, the fingerprint information of the target client, and the first time, encrypt the second password with the first password, and send the encrypted second password to a second terminal where the target client is located;
a issuing unit 70, configured to issue a request for inputting the second password to the first terminal, so as to pop up an input box for inputting the second password on the first terminal;
and the verification unit 80 is configured to receive information input by the user in the input box, determine whether the information is the same as the second password, and if so, verify that the user is a real visiting target client.
Further, the first generating unit 50 includes:
a first obtaining subunit, configured to obtain the number of hours and the number of minutes in the first time;
the second acquisition subunit is used for acquiring a target position range corresponding to the hour number from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
The first recognition subunit is used for recognizing the fingerprint information of the user to obtain a first fingerprint feature sequence;
a first selecting subunit, configured to select a target character string in a target position range from the first fingerprint feature sequence;
and the first generation subunit is used for splicing the target character string and the minutes according to a preset sequence to generate the first password.
Further, the second generating unit 60 includes:
a third obtaining subunit, configured to obtain the number of hours and the number of minutes in the first time;
a fourth obtaining subunit, configured to obtain a first letter corresponding to the number of hours from a preset database, and obtain a second letter corresponding to the number of minutes from the preset database; wherein, the preset database stores a plurality of mapping relations between numbers and letters;
the second recognition subunit is used for respectively recognizing the fingerprint information of the user and the fingerprint information of the target client to obtain a corresponding first fingerprint feature sequence and a corresponding second fingerprint feature sequence;
the second selecting subunit is used for respectively selecting characters at the designated positions from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a corresponding second character string;
And the second generation subunit is used for splicing the first character string, the second character string, the first letter and the second letter to generate the second password.
Further, the second generating subunit includes:
the first comparison module is used for comparing the time sequence of acquiring the fingerprint information of the user and the fingerprint information of the target client;
the arrangement module is used for arranging the first character string and the second character string according to the time sequence of acquiring the fingerprint information of the user and the fingerprint information of the target client, and splicing the first character string and the second character string into a third character string;
the second comparison module is used for comparing the number of hours with the number of minutes;
the first generation module is used for splicing the first letter, the third character string and the second letter in sequence to generate the second password if the hour number is larger than the minute number;
and the second generation module is used for splicing the second letter, the third character string and the first letter in sequence to generate the second password if the hour number is not more than the minute number.
Further, the information verification apparatus further includes:
The first sending unit is used for sending an instruction for starting a recording function to the first terminal so as to record the visit record through the first terminal;
the control unit is used for controlling the first terminal to finish recording to generate a recording file when receiving a call ending instruction triggered by the user, and acquiring a current second moment;
a third generation unit, configured to generate a third password according to the second moment and fingerprint information of the user;
the second sending unit is used for sending a request instruction to the first terminal so as to request uploading of the recording file;
the storage unit is used for receiving the sound recording file uploaded by the first terminal, encrypting the sound recording file through the third password, storing the sound recording file, and generating a storage link;
and the sending unit is used for sending the storage link and the third password to the first terminal.
In this embodiment, the specific implementation of the units, sub-units, and modules refers to the corresponding parts in the above method embodiments, and will not be described herein again.
Referring to fig. 3, a computer device is further provided in the embodiment of the present application, where the computer device may be a server, and the internal structure of the computer device may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used to store passwords, fingerprints, etc. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an information verification method.
The processor executes the steps of the information verification method:
acquiring customer visit plan information of a user, wherein the customer visit plan information comprises a visit time period of the user visiting a target customer and user information of the target customer, and the user information of the target customer at least comprises position information and terminal information of the target customer;
when a visit instruction triggered when the user visits the target client is received, acquiring the current first moment and the position information of the user;
judging whether the first moment is positioned in the visit time period, if so, judging whether the position information of the user and the target client position information are in a preset distance range;
if the target client is within the preset distance range, acquiring fingerprint information of the target client and fingerprint information of the user through a first terminal where the user is located;
generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal;
generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password, and sending the encrypted second password to a second terminal where the target client is located;
Issuing a request for inputting the second password to the first terminal so as to pop up an input box for inputting the second password on the first terminal;
and receiving information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client.
In an embodiment, the step of generating the first password by the processor according to the fingerprint information of the user and the first time includes:
acquiring the number of hours and the number of minutes in the first moment;
acquiring a target position range corresponding to the hours from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
identifying the fingerprint information of the user to obtain a first fingerprint feature sequence;
selecting a target character string in a target position range from the first fingerprint feature sequence;
and splicing the target character string and the minutes according to a preset sequence to generate the first password.
In an embodiment, the step of generating the second password by the processor according to the fingerprint information of the user, the fingerprint information of the target client, and the first time includes:
Acquiring the number of hours and the number of minutes in the first moment;
acquiring a first letter corresponding to the number of hours from a preset database, and acquiring a second letter corresponding to the number of minutes from the preset database; wherein, the preset database stores a plurality of mapping relations between numbers and letters;
respectively identifying the fingerprint information of the user and the fingerprint information of the target client to obtain a corresponding first fingerprint feature sequence and a corresponding second fingerprint feature sequence;
respectively selecting characters at designated positions from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a corresponding second character string;
and splicing the first character string, the second character string, the first letter and the second letter to generate the second password.
In an embodiment, the step of generating the second password by the processor stitching the first string, the second string, the first letter, and the second letter includes:
comparing the time sequence of the obtained fingerprint information of the user and the fingerprint information of the target client;
according to the time sequence of acquiring the fingerprint information of the user and the fingerprint information of the target client, arranging the first character string and the second character string, and splicing the first character string and the second character string into a third character string;
Comparing the number of hours and the number of minutes;
if the number of hours is larger than the number of minutes, splicing the first letter, the third character string and the second letter in sequence to generate the second password;
and if the hour number is not greater than the minute number, splicing the second letter, the third character string and the first letter in sequence to generate the second password.
In an embodiment, the above processor receives information input by the user in the input box, and determines whether the information is the same as the second password, and if so, after the step of verifying that the user is a true visiting target client, the method includes:
sending an instruction for starting a recording function to the first terminal so as to record the visit record through the first terminal;
when a call ending instruction triggered by the user is received, controlling the first terminal to end recording so as to generate a recording file, and acquiring a current second moment;
generating a third password according to the second moment and the fingerprint information of the user;
sending a request instruction to the first terminal to request uploading of the recording file;
receiving the sound recording file uploaded by the first terminal, encrypting the sound recording file through the third password, storing the sound recording file, and generating a storage link;
And sending the storage link and the third password to the first terminal.
Those skilled in the art will appreciate that the architecture shown in fig. 3 is merely a block diagram of a portion of the architecture in connection with the present application and is not intended to limit the computer device to which the present application is applied.
An embodiment of the present application further provides a computer readable storage medium having a computer program stored thereon, where the computer program when executed by a processor implements an information verification method, specifically:
acquiring customer visit plan information of a user, wherein the customer visit plan information comprises a visit time period of the user visiting a target customer and user information of the target customer, and the user information of the target customer at least comprises position information and terminal information of the target customer;
when a visit instruction triggered when the user visits the target client is received, acquiring the current first moment and the position information of the user;
judging whether the first moment is positioned in the visit time period, if so, judging whether the position information of the user and the target client position information are in a preset distance range;
If the target client is within the preset distance range, acquiring fingerprint information of the target client and fingerprint information of the user through a first terminal where the user is located;
generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal;
generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password, and sending the encrypted second password to a second terminal where the target client is located;
issuing a request for inputting the second password to the first terminal so as to pop up an input box for inputting the second password on the first terminal;
and receiving information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client.
In an embodiment, the step of generating the first password by the processor according to the fingerprint information of the user and the first time includes:
acquiring the number of hours and the number of minutes in the first moment;
Acquiring a target position range corresponding to the hours from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
identifying the fingerprint information of the user to obtain a first fingerprint feature sequence;
selecting a target character string in a target position range from the first fingerprint feature sequence;
and splicing the target character string and the minutes according to a preset sequence to generate the first password.
In an embodiment, the step of generating the second password by the processor according to the fingerprint information of the user, the fingerprint information of the target client, and the first time includes:
acquiring the number of hours and the number of minutes in the first moment;
acquiring a first letter corresponding to the number of hours from a preset database, and acquiring a second letter corresponding to the number of minutes from the preset database; wherein, the preset database stores a plurality of mapping relations between numbers and letters;
respectively identifying the fingerprint information of the user and the fingerprint information of the target client to obtain a corresponding first fingerprint feature sequence and a corresponding second fingerprint feature sequence;
Respectively selecting characters at designated positions from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a corresponding second character string;
and splicing the first character string, the second character string, the first letter and the second letter to generate the second password.
In an embodiment, the step of generating the second password by the processor stitching the first string, the second string, the first letter, and the second letter includes:
comparing the time sequence of the obtained fingerprint information of the user and the fingerprint information of the target client;
according to the time sequence of acquiring the fingerprint information of the user and the fingerprint information of the target client, arranging the first character string and the second character string, and splicing the first character string and the second character string into a third character string;
comparing the number of hours and the number of minutes;
if the number of hours is larger than the number of minutes, splicing the first letter, the third character string and the second letter in sequence to generate the second password;
and if the hour number is not greater than the minute number, splicing the second letter, the third character string and the first letter in sequence to generate the second password.
In an embodiment, the above processor receives information input by the user in the input box, and determines whether the information is the same as the second password, and if so, after the step of verifying that the user is a true visiting target client, the method includes:
sending an instruction for starting a recording function to the first terminal so as to record the visit record through the first terminal;
when a call ending instruction triggered by the user is received, controlling the first terminal to end recording so as to generate a recording file, and acquiring a current second moment;
generating a third password according to the second moment and the fingerprint information of the user;
sending a request instruction to the first terminal to request uploading of the recording file;
receiving the sound recording file uploaded by the first terminal, encrypting the sound recording file through the third password, storing the sound recording file, and generating a storage link;
and sending the storage link and the third password to the first terminal.
In summary, in the information verification method, device, computer equipment and storage medium provided in the embodiments of the present application, when a visit instruction triggered when the user visits the target client is received, current first moment and location information of the user are obtained; judging whether the first moment is positioned in the visit time period, if so, judging whether the position information of the user and the target client position information are in a preset distance range; if the target client is within the preset distance range, acquiring fingerprint information of the target client and fingerprint information of the user through a first terminal where the user is located; generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal; generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password, and sending the encrypted second password to a second terminal where the target client is located; issuing a request for inputting the second password to the first terminal so as to pop up an input box for inputting the second password on the first terminal; and receiving information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client. During verification, fingerprint information of both the user and the salesperson needs to be obtained, and verification can be completed only by data exchange of both the user and the salesperson, so that the defect that whether the salesperson actually visits the client or not cannot be verified at present is overcome.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by hardware associated with a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided herein and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (10)

1. An information verification method, characterized by comprising the steps of:
acquiring customer visit plan information of a user, wherein the customer visit plan information comprises a visit time period of the user visiting a target customer and user information of the target customer, and the user information of the target customer at least comprises position information and terminal information of the target customer;
When a visit instruction triggered when the user visits the target client is received, acquiring the current first moment and the position information of the user;
judging whether the first moment is positioned in the visit time period, if so, judging whether the position information of the user and the target client position information are in a preset distance range;
if the target client is within the preset distance range, acquiring fingerprint information of the target client and fingerprint information of the user through a first terminal where the user is located;
generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal;
generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password, and sending the encrypted second password to a second terminal where the target client is located;
issuing a request for inputting the second password to the first terminal so as to pop up an input box for inputting the second password on the first terminal;
and receiving information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client.
2. The information authentication method according to claim 1, wherein the step of generating a first password from the fingerprint information of the user and the first time includes:
acquiring the number of hours and the number of minutes in the first moment;
acquiring a target position range corresponding to the hours from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
identifying the fingerprint information of the user to obtain a first fingerprint feature sequence;
selecting a target character string in a target position range from the first fingerprint feature sequence;
and splicing the target character string and the minutes according to a preset sequence to generate the first password.
3. The information authentication method according to claim 1, wherein the step of generating the second password from the fingerprint information of the user, the fingerprint information of the target client, and the first time, comprises:
acquiring the number of hours and the number of minutes in the first moment;
acquiring a first letter corresponding to the number of hours from a preset database, and acquiring a second letter corresponding to the number of minutes from the preset database; wherein, the preset database stores a plurality of mapping relations between numbers and letters;
Respectively identifying the fingerprint information of the user and the fingerprint information of the target client to obtain a corresponding first fingerprint feature sequence and a corresponding second fingerprint feature sequence;
respectively selecting characters at designated positions from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a corresponding second character string;
and splicing the first character string, the second character string, the first letter and the second letter to generate the second password.
4. The information authentication method of claim 3, wherein the step of concatenating the first string, the second string, the first letter, and the second letter to generate the second password comprises:
comparing the time sequence of the obtained fingerprint information of the user and the fingerprint information of the target client;
according to the time sequence of acquiring the fingerprint information of the user and the fingerprint information of the target client, arranging the first character string and the second character string, and splicing the first character string and the second character string into a third character string;
comparing the number of hours and the number of minutes;
if the number of hours is larger than the number of minutes, splicing the first letter, the third character string and the second letter in sequence to generate the second password;
And if the hour number is not greater than the minute number, splicing the second letter, the third character string and the first letter in sequence to generate the second password.
5. The information verification method according to claim 1, wherein the step of receiving information input by the user in the input box and judging whether the information is identical to the second password, and if so, verifying that the user is a true visiting target client, comprises:
sending an instruction for starting a recording function to the first terminal so as to record the visit record through the first terminal;
when a call ending instruction triggered by the user is received, controlling the first terminal to end recording so as to generate a recording file, and acquiring a current second moment;
generating a third password according to the second moment and the fingerprint information of the user;
sending a request instruction to the first terminal to request uploading of the recording file;
receiving the sound recording file uploaded by the first terminal, encrypting the sound recording file through the third password, storing the sound recording file, and generating a storage link;
and sending the storage link and the third password to the first terminal.
6. An information authentication apparatus, comprising:
the first acquisition unit is used for acquiring client visit plan information of a user, wherein the client visit plan information comprises a visit time period of the user visiting a target client and the user information of the target client, and the user information of the target client at least comprises position information and terminal information of the target client;
the second acquisition unit is used for acquiring the current first moment and the position information of the user when receiving a visit instruction triggered when the user visits the target client;
the first judging unit is used for judging whether the first moment is positioned in the visit time period or not, and if so, judging whether the position information of the user and the target client position information are in a preset distance range or not;
the third acquisition unit is used for acquiring the fingerprint information of the target client and the fingerprint information of the user through the first terminal where the user is located if the third acquisition unit is in the preset distance range;
the first generation unit is used for generating a first password according to the fingerprint information of the user and the first moment, converting the first password into voice and sending the voice to the first terminal;
The second generation unit is used for generating a second password according to the fingerprint information of the user, the fingerprint information of the target client and the first moment, encrypting the second password through the first password and sending the encrypted second password to a second terminal where the target client is located;
the issuing unit is used for issuing a request for inputting the second password to the first terminal so as to pop up an input box for inputting the second password on the first terminal;
and the verification unit is used for receiving the information input by the user in the input box, judging whether the information is the same as the second password, and if so, verifying that the user is a real visiting target client.
7. The information authentication apparatus according to claim 6, wherein the first generation unit includes:
a first obtaining subunit, configured to obtain the number of hours and the number of minutes in the first time;
the second acquisition subunit is used for acquiring a target position range corresponding to the hour number from a preset database; wherein, the preset database stores the mapping relation between the hour number and the target position range;
The first recognition subunit is used for recognizing the fingerprint information of the user to obtain a first fingerprint feature sequence;
a first selecting subunit, configured to select a target character string in a target position range from the first fingerprint feature sequence;
and the first generation subunit is used for splicing the target character string and the minutes according to a preset sequence to generate the first password.
8. The information authentication apparatus according to claim 6, wherein the second generation unit includes:
a third obtaining subunit, configured to obtain the number of hours and the number of minutes in the first time;
a fourth obtaining subunit, configured to obtain a first letter corresponding to the number of hours from a preset database, and obtain a second letter corresponding to the number of minutes from the preset database; wherein, the preset database stores a plurality of mapping relations between numbers and letters;
the second recognition subunit is used for respectively recognizing the fingerprint information of the user and the fingerprint information of the target client to obtain a corresponding first fingerprint feature sequence and a corresponding second fingerprint feature sequence;
the second selecting subunit is used for respectively selecting characters at the designated positions from the first fingerprint feature sequence and the second fingerprint feature sequence to obtain a corresponding first character string and a corresponding second character string;
And the second generation subunit is used for splicing the first character string, the second character string, the first letter and the second letter to generate the second password.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 5.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 5.
CN202010192500.5A 2020-03-18 2020-03-18 Information verification method, information verification device, computer equipment and storage medium Active CN111541543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010192500.5A CN111541543B (en) 2020-03-18 2020-03-18 Information verification method, information verification device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010192500.5A CN111541543B (en) 2020-03-18 2020-03-18 Information verification method, information verification device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111541543A CN111541543A (en) 2020-08-14
CN111541543B true CN111541543B (en) 2023-07-21

Family

ID=71978526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010192500.5A Active CN111541543B (en) 2020-03-18 2020-03-18 Information verification method, information verification device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111541543B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113949685B (en) * 2021-10-15 2023-09-29 北京房江湖科技有限公司 Interview data verification method and readable storage medium
CN116484346B (en) * 2023-06-19 2023-08-22 四川金投科技股份有限公司 Intelligent money box management system based on multidimensional information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107871232A (en) * 2017-10-19 2018-04-03 中国平安人寿保险股份有限公司 A kind of generation method and its terminal of customer visit plan
CN109241728A (en) * 2018-09-03 2019-01-18 平安普惠企业管理有限公司 Acquisition methods, device, computer equipment and the storage medium of encrypted message
CN109756343A (en) * 2019-01-31 2019-05-14 平安科技(深圳)有限公司 Authentication method, device, computer equipment and the storage medium of digital signature
CN110837917A (en) * 2019-10-01 2020-02-25 榕知科技(武汉)有限公司 Customer visit management system, method, terminal equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107871232A (en) * 2017-10-19 2018-04-03 中国平安人寿保险股份有限公司 A kind of generation method and its terminal of customer visit plan
CN109241728A (en) * 2018-09-03 2019-01-18 平安普惠企业管理有限公司 Acquisition methods, device, computer equipment and the storage medium of encrypted message
CN109756343A (en) * 2019-01-31 2019-05-14 平安科技(深圳)有限公司 Authentication method, device, computer equipment and the storage medium of digital signature
CN110837917A (en) * 2019-10-01 2020-02-25 榕知科技(武汉)有限公司 Customer visit management system, method, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN111541543A (en) 2020-08-14

Similar Documents

Publication Publication Date Title
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN110599137B (en) Electronic bill data processing method and device and computer equipment
CN110599266B (en) Electronic bill data processing method and device, computer equipment and storage medium
CN107483498A (en) Academic authentication method and system based on block chain
CN110489393A (en) Promise breaking information query method, device, computer equipment and storage medium
CN108833361B (en) Identity authentication method and device based on virtual account
JPS625544B2 (en)
CN110768784B (en) Password transmission method, device, computer equipment and storage medium
CN111541543B (en) Information verification method, information verification device, computer equipment and storage medium
CN115834253B (en) Identity verification method, identity verification system, client and server
CN110502889B (en) Login method, login device, computer readable storage medium and computer equipment
CN109587154A (en) Digital identity verification method, device, computer equipment and storage medium
CN109845183A (en) For from client device to the method for cloud storage system storing data block
CN111241555A (en) Access method and device for simulating user login, computer equipment and storage medium
US7234060B1 (en) Generation and use of digital signatures
WO2021030329A1 (en) Unified authentication system for decentralized identity platforms
KR20200064663A (en) method and system of smart electronic contracting based on block chain
US20210035018A1 (en) Apparatus for verifying integrity of AI learning data and method therefor
CN110011959B (en) Data storage method, data query method and system
CN115150109B (en) Authentication method, authentication device and related equipment
CN116366289B (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
CN112115101B (en) Method and system for determinacy deletion of data in cloud storage
CN116962021A (en) Method, device, equipment and medium for user real name authentication in financial cooperative institution
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant