CN111582874B - Identity verification method and device - Google Patents

Identity verification method and device Download PDF

Info

Publication number
CN111582874B
CN111582874B CN202010383085.1A CN202010383085A CN111582874B CN 111582874 B CN111582874 B CN 111582874B CN 202010383085 A CN202010383085 A CN 202010383085A CN 111582874 B CN111582874 B CN 111582874B
Authority
CN
China
Prior art keywords
transaction
user
information
project
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010383085.1A
Other languages
Chinese (zh)
Other versions
CN111582874A (en
Inventor
周仕君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ant Shengxin Shanghai Information Technology Co ltd
Original Assignee
Ant Shengxin Shanghai Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ant Shengxin Shanghai Information Technology Co ltd filed Critical Ant Shengxin Shanghai Information Technology Co ltd
Priority to CN202211145843.1A priority Critical patent/CN115439129A/en
Priority to CN202010383085.1A priority patent/CN111582874B/en
Publication of CN111582874A publication Critical patent/CN111582874A/en
Application granted granted Critical
Publication of CN111582874B publication Critical patent/CN111582874B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/761Proximity, similarity or dissimilarity measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the specification provides an identity verification method and an identity verification device, wherein the identity verification method comprises the following steps: acquiring an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process; judging whether the user is a project member of the project or not according to the identity characteristic image; the participating users in the project establish identity binding relations with the project members in a mode of identity registration for the project members and mark the identity states of the project members; if so, determining a target participating user having an identity binding relationship with the user in the project under the condition that the user is marked as an offline state in the project; and sending an identity verification result aiming at the user to at least one of the target participant user and the transaction participant.

Description

Identity verification method and device
Technical Field
The embodiment of the specification relates to the technical field of internet, in particular to an identity verification method and device.
Background
With the development of the internet, help methods for users in an offline state are more and more diversified, in real life, after the users go out, the users may lose contact with family members due to self conditions or accidents, and meanwhile, self-rescue ability of the users is weak, so that when the users are in the offline state, corresponding help needs to be obtained, so that the users can be recovered, however, most of current help methods need participation of strangers, and therefore a more effective and safer scheme needs to be provided.
Disclosure of Invention
In view of this, the embodiments of the present specification provide an identity verification method. One or more embodiments of the present disclosure also relate to an identity verification apparatus, a computing device, and a computer-readable storage medium to solve the technical problems of the prior art.
In a first aspect of embodiments of the present specification, there is provided an identity verification method, including:
acquiring an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process;
judging whether the user is a project member of the project or not according to the identity characteristic image; the method comprises the following steps that a participating user in a project establishes an identity binding relationship with a project member in a mode of identity registration for the project member, and marks the identity state of the project member;
if so, determining a target participating user having an identity binding relationship with the user in the project under the condition that the user is marked as an offline state in the project;
and sending an identity verification result aiming at the user to at least one of the target participant user and the transaction participant.
Optionally, if the determination result of the step of determining whether the user is a member of the project according to the identity feature image is yes, and if the user is marked as an offline state in the project, before the step of determining that a target participating user in the project that has an identity binding relationship with the user is executed, the method further includes:
acquiring transaction information uploaded by a transaction terminal of the transaction participant in the transaction process;
judging whether the transaction amount contained in the transaction information is larger than a preset transaction amount threshold value in the item;
if the transaction amount is larger than the preset value, generating first transaction interruption information based on a first judgment result of the amount judgment, and taking the first transaction interruption data as transaction result data;
and if not, performing transaction processing based on the transaction information to generate a transaction order, and taking order information in the transaction order as the transaction result data.
Optionally, after the step of obtaining the transaction information uploaded by the transaction terminal of the transaction participant in the transaction process is executed and before the step of determining whether the transaction amount included in the transaction information is greater than the transaction amount threshold preset in the item is executed, the method further includes:
determining the scene type of the transaction according to the transaction information;
judging whether a target authorization scene type which is the same as the scene type exists in the authorization scene types preset for the user in the project;
if yes, executing the step of judging whether the transaction amount is smaller than a transaction amount threshold value preset in the item according to the transaction amount contained in the transaction information;
and if the second transaction interruption information does not exist, generating second transaction interruption information based on a second judgment result of the scene judgment, and taking the second transaction interruption information as the transaction result data.
Optionally, the sending the identity verification result for the user to at least one of the target participant user and the transaction participant comprises:
determining position information of the transaction terminal and participant information of the transaction participants based on the equipment identification of the transaction terminal contained in the transaction information;
generating help seeking information aiming at the user according to the position information, the participant information and the transaction result information;
sending a help-seeking notification aiming at the user in the loss-of-contact state to the target participating user based on the help-seeking information.
Optionally, the sending an identity verification result for the user to at least one of the target participant user and the transaction participant comprises:
acquiring contact information of the target participating user;
generating help seeking information for the user based on the contact information and the transaction result information;
and issuing a help-seeking notice aiming at the loss of contact state of the user to the transaction terminal according to the help-seeking information.
Optionally, the determining, according to the identity feature image, whether the user is a project member of a project includes:
carrying out image recognition on the identity characteristic image to obtain the identity characteristic of the user;
comparing the identity characteristics with member characteristics corresponding to member characteristic images of the project members prestored in the project to obtain characteristic similarity;
and judging whether the user is a project member of the project or not by judging whether the feature similarity is larger than a preset similarity threshold or not.
Optionally, the identity registration for the project member is implemented by the following method:
acquiring a member registration request submitted by a participating user;
taking the characteristic image carried in the member registration request as a member characteristic image, and storing the member characteristic image in a characteristic image library of the project;
based on the identity relationship information carried in the member registration request, the member characteristic image and the participating user are subjected to identity binding;
and sending a registration completion instruction aiming at the member registration request under the condition that the identity binding is successful.
Optionally, before the step of obtaining the identity characteristic image of the user collected by the user and the transaction participant in the transaction process is executed, the method further includes:
obtaining a transaction authorization request submitted by the user in the project;
generating a transaction authorization protocol for the target item member to carry out transaction authorization to the user based on transaction authorization information which is carried in the transaction authorization request and is submitted aiming at a transaction authorization option; the transaction authorization protocol comprises at least one authorization scenario type and/or transaction amount threshold value authorized by the target item member to the user;
and sending an authorization completion instruction aiming at the transaction authorization request based on the transaction authorization protocol.
Optionally, in a case that the user is a child, the sending an identity verification result for the user to at least one of the target participant user and the transaction participant includes:
acquiring contact information of the target participating user, and determining position information of the transaction terminal and participant information of the transaction participants based on the equipment identifier of the transaction terminal contained in the transaction information;
generating help seeking information aiming at the children according to the contact information, the position information, the participant information and the transaction result information;
and sending a help-seeking notice aiming at the state that the child is lost to be connected to the transaction terminal and the target participating user according to the help-seeking information.
Optionally, the identity feature image includes at least one of the following: face images, iris images and fingerprint images.
In a second aspect of embodiments of the present specification, there is provided an identity verification apparatus, comprising:
the acquisition module is configured to acquire an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process;
the judging module is configured to judge whether the user is a project member of a project according to the identity characteristic image; the method comprises the following steps that a participating user in a project establishes an identity binding relationship with a project member in a mode of identity registration for the project member, and marks the identity state of the project member;
if yes, running a determining module, wherein the determining module is configured to determine a target participant user in the project, which has an identity binding relationship with the user, under the condition that the user is marked as an offline state in the project;
a sending module configured to send an identity verification result for the user to at least one of the target participant user and the transaction participant.
In a third aspect of embodiments of the present specification, there is provided a computing device comprising:
a memory and a processor;
the memory to store computer-executable instructions, the processor to execute the computer-executable instructions:
acquiring an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process;
judging whether the user is a project member of the project or not according to the identity characteristic image; the participating users in the project establish identity binding relations with the project members in a mode of identity registration for the project members and mark the identity states of the project members;
if so, determining a target participating user having an identity binding relationship with the user in the project under the condition that the user is marked as an offline state in the project;
and sending an identity verification result aiming at the user to at least one of the target participant user and the transaction participant.
In a fourth aspect of embodiments of the present specification, there is provided a computer-readable storage medium storing computer-executable instructions that, when executed by a processor, perform the steps of the identity verification method.
The specification provides an identity verification method, which comprises the steps of carrying out identity recognition on a user by acquiring an identity characteristic image of the user, acquired by the user and a transaction participant in a transaction process, and judging whether the user is a project member of a project; under the condition that the user is a project member of the project, whether the user is marked as an offline state in the project is further judged, whether the user is the identity verification of the offline state in the transaction process is realized, under the condition that the user is marked as the offline state, a target participating user in the project, which has the identity binding relationship with the user, is determined, and an identity verification result aiming at the user is sent to at least one of the target participating user and the transaction participating party, so that the target participating user and/or the transaction participating party can track the user in the offline state according to the transaction carried out by the user, and meanwhile, the user in the offline state can enjoy transaction service, and thus the help of substances is obtained.
Drawings
FIG. 1 is a process flow diagram of a method for identity verification provided in one embodiment of the present description;
FIG. 2 is a flowchart illustrating a process of an identity verification method applied to a face-brushing payment scenario according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of an identity verification device provided in one embodiment of the present description;
fig. 4 is a block diagram of a computing device according to an embodiment of the present disclosure.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present specification. This description may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, as those skilled in the art will be able to make and use the present disclosure without departing from the spirit and scope of the present disclosure.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, etc. may be used herein in one or more embodiments to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first can also be referred to as a second and, similarly, a second can also be referred to as a first without departing from the scope of one or more embodiments of the present description. The word "if," as used herein, may be interpreted as "at … …" or "when … …" or "in response to a determination," depending on the context.
In the present specification, an identity verification method is provided, and one or more embodiments of the present specification relate to an identity verification apparatus, a computing device, and a computer-readable storage medium, which are described in detail in the following embodiments one by one.
The embodiment of the identity verification method provided by the specification is as follows:
fig. 1 shows a processing flow chart of an identity verification method provided according to an embodiment of the present specification, which includes steps S102 to S108.
Step S102, acquiring the identity characteristic image of the user, which is acquired by the user and a transaction participant in the transaction process.
In practical application, after the old people, children or disabled people go out, the old people, children or disabled people may lose contact with the family due to self conditions or accidents, meanwhile, the self-rescue ability of the old people, children or disabled people is weak, and therefore when the old people are in an offline state, the old people and the disabled people need to be helped correspondingly, so that the old people and the disabled people can be retrieved.
Specifically, the user is a buyer in a transaction process, the transaction participant is a merchant who owns the physical store, and in the transaction process of the transaction between the buyer and the merchant, for example, in the process of payment, an identification feature image of the buyer needs to be acquired to identify the buyer, and in the case that the identification passes, account information associated with the buyer is acquired to pay.
Optionally, the identity feature image includes at least one of the following: any one of the identity characteristic images can uniquely identify a user, and the user does not need to provide additional information, so that the payment process is simplified, the user can still pay under the condition that the user cannot use the mobile terminal or forgets key information, in addition, the user can be identified by acquiring other unique identification characteristics of the user, and further payment is finished, such as voiceprint characteristics and the like, without limitation.
For example, after purchasing mineral water in a convenience store, the user u performs face brushing payment on a face brushing payment machine for the purchased mineral water, uses the price p1 of the mineral water, the merchant code c1 and the machine code d1 of the face brushing payment machine as purchase information, and uploads the face image and the purchase information of the user u collected by the face brushing payment machine to the service end.
And step S104, judging whether the user is a project member of the project or not according to the identity characteristic image.
And on the basis of acquiring the identity characteristic image of the user, identifying the identity of the user and judging whether the user is a project member in the project.
Specifically, the participating users in the project establish an identity binding relationship with the project members by means of identity registration for the project members, and mark the identity states of the project members.
The project refers to a project which can perform identity verification on a user and provide assistance for the user in an offline state; the participating user refers to the participating user of the project, and in practical application, the participating user registers the identity of a parent closely related to the identity of the participating user, such as the old, children or the disabled, in the project to enable the participating user to become a project member in the project, so that the parent can provide help for the parent in the transaction process through the project under the condition that the parent is in an unconnected state.
The project member refers to a member participating in the project in an identity registration mode, so that under the condition that the project member is in an offline state, required articles can be acquired through the project in the transaction process, and corresponding help can be acquired.
On the basis of acquiring an identity characteristic image of a user, identifying the user according to the identity characteristic image, and judging whether the user is a project member of a project, specifically, comparing the acquired identity characteristic image of the user with a member characteristic image prestored in the project, and then determining whether the user is a project member of the project according to a comparison result of the comparison of the similarity, so that the user is prevented from actively providing identity information for proving the identity of the user, the project experience of the user is improved, and the information security of the user is also ensured.
Carrying out image recognition on the identity characteristic image to obtain the identity characteristic of the user;
comparing the identity characteristics with member characteristics corresponding to member characteristic images of the project members prestored in the project to obtain characteristic similarity;
and judging whether the user is a project member of the project or not by judging whether the feature similarity is larger than a preset similarity threshold or not.
In specific implementation, the image recognition of the identity characteristic image means that the identity characteristic of the user in the identity characteristic image is recognized, the identity characteristic of the user is obtained after the image recognition is completed, the recognized identity characteristic of the user is compared with the similarity of member characteristics of member characteristic images of project members prestored in a project in sequence to obtain the characteristic similarity, specifically, the characteristic similarity can be represented by a percentage value (0% -100%), and the higher the percentage value is, the higher the similarity is, namely, the probability that the user is a project member of the project is the maximum.
In practical application, according to past comparison experience, a similarity threshold value is preset in a project, if the characteristic similarity is larger than the preset similarity threshold value, the probability that a user is a project member of the project is high, the user is determined to be the project member of the project, and the following step S106 is executed; if the feature similarity is not greater than the preset similarity threshold, which indicates that the probability that the user is a project member of the project is not large, the identity image features of the user may be collected again, or it may be directly determined that the user is not a project member of the project, which is not limited herein.
According to the above example, after receiving the face image of the user u uploaded by the face-brushing payment machine, the server identifies the face of the face image to obtain the face features of the user u, compares the face features of the user u with the face features of member face images prestored in the project in sequence, obtains the feature similarity of 95%, and determines that the feature similarity is greater than the preset similarity threshold if the preset similarity threshold is 90%, which indicates that the user u is a project member of the project and determines that the user u is the project member of the project.
In a specific implementation, a participating user in a project registers identity for a project member, a member feature image of the project member needs to be prestored, and the project member and the participating user are bound in identity, so as to perform identity verification on the project member, and help is sought for the participating user bound in identity with the project member according to an identity verification result obtained by the identity verification, in an optional implementation manner provided in the embodiment of the present specification, the identity registration for the project member is specifically implemented by the following manner:
acquiring a member registration request submitted by a participating user;
taking the characteristic image carried in the member registration request as a member characteristic image, and storing the member characteristic image in a characteristic image library of the project;
based on the identity relationship information carried in the member registration request, the member characteristic image and the participating user are subjected to identity binding;
and sending a registration completion instruction aiming at the member registration request under the condition that the identity binding is successful.
In practical application, a participating user submits a member registration request to a server by operating a client, and in the process of identity registration of the participating user for a project member, a feature image of the project member needs to be submitted, and the feature image can be acquired in the process of identity registration in an image acquisition mode or actively uploaded by the participating user, without limitation.
In addition, in the process of identity registration for the project member, identity relationship information between the project member and the participating user, such as son, daughter, father, mother, and the like, needs to be submitted, and the project member and the participating user are identity bound through the identity relationship information in a manner of binding the member feature image with the participating user, where the specific identity binding manner is various, such as establishing an identity binding relationship table, or adding a binding tag, and the like, and is not limited herein.
And after the member characteristic image carried in the member registration request is stored and the member characteristic image and the participating user are subjected to identity binding, namely the identity registration of the project member is finished, sending a registration completion instruction aiming at the member registration request.
Further, on the basis that the participating user registers the identity of the project member, transaction authorization needs to be performed on the project member, so that the project member performs a transaction in a transaction authorization range of the participating user to protect resource security of the participating user, in an optional implementation manner provided by the embodiment of the present specification, before the step of acquiring the identity characteristic image of the user, acquired by the user and a transaction participating party during a transaction process, is performed, the method further includes:
obtaining a transaction authorization request submitted by the user in the project;
generating a transaction authorization protocol for the target project member to carry out transaction authorization to the user based on transaction authorization information which is carried in the transaction authorization request and is submitted aiming at a transaction authorization option; the transaction authorization protocol comprises at least one authorization scenario type and/or transaction amount threshold value authorized for the user;
and sending an authorization completion instruction aiming at the transaction authorization request based on the transaction authorization protocol.
In practical application, besides the above-mentioned operation on the client and submission of the member registration request to the server, the participating user can also select a transaction authorization option by operating the client and submit the transaction authorization request, and after the server obtains the submitted transaction authorization request, the server generates a transaction authorization protocol according to transaction authorization information carried in the transaction authorization request.
Specifically, the transaction authorization protocol includes at least one authorization scenario type and/or transaction amount threshold value authorized by a target participating user to the user, where the authorization scenario type refers to a type of an entity store of a merchant, such as a scenario type of a supermarket, a convenience store, a restaurant, a clothing store, and the like; the transaction amount threshold value is the consumption amount of the highest consumption of a single pen authorized to the user; in addition, the transaction authorization protocol can also comprise an authorization account for authorizing the transaction to the user; the target participating user refers to a participating user who has an identity binding relationship with the user in the project.
It should be noted that, due to the particularity of the group to which the user belongs, the user is likely not to open a payment channel for online payment, so that, when the user is a project member of a project, the user uses a transaction account of a target participant user bound to the user for performing identity transaction in the transaction process, and is limited to the authorization of the target participant user to the transaction of the user in the transaction process, so as to prevent the user from having an unwise consumption and causing a loss of the target participant user.
Further, on the basis of judging whether the user is the item member of the item, judging whether the transaction meets the transaction conditions preset in the item, namely judging whether the transaction meets the authorization conditions contained in the transaction authorization protocol according to the transaction information uploaded by the transaction terminal of the transaction participant in the transaction process, if so, performing corresponding transaction processing according to the transaction information, if not, indicating that the transaction is not authorized, interrupting the transaction, thereby further ensuring the security of the transaction, in an optional implementation manner provided by the embodiment of the specification, if the step of judging whether the user is the item member of the item according to the identity characteristic image is yes, and under the condition that the user is marked as an unlink state in the item, determining that the target user in the item, which has an identity binding relationship with the user, participates in the item before executing the step, further comprising:
acquiring transaction information uploaded by a transaction terminal of the transaction participant in the transaction process;
judging whether the transaction amount contained in the transaction information is larger than a preset transaction amount threshold value in the item;
if the transaction amount is larger than the authorized amount, first transaction interruption information is generated based on a first judgment result of the amount judgment, and the first transaction interruption data is used as transaction result data;
if the transaction amount is not larger than the authorized amount, transaction processing is carried out based on the transaction information, a transaction order is generated, and order information in the transaction order is used as the transaction result data.
Specifically, the transaction terminal refers to a transaction device that performs identity recognition by acquiring biological characteristics and performs a transaction based on the identity recognition, such as a face-brushing payment machine; the transaction amount refers to the amount of the corresponding transaction in the transaction process.
The transaction processing based on the transaction information means that a transaction account of a target participating user and a transaction account of a transaction participating party, which are bound with the identity of the user, are obtained based on identification information of both transaction parties contained in the transaction information, and transaction transfer from the transaction account of the target participating user to the transaction account of the transaction participating party is completed according to a transaction amount contained in the transaction information, so that a transaction order is generated.
The first judgment result means that the transaction amount is larger than a preset transaction amount threshold value in the item; correspondingly, the first transaction interruption information refers to the generated reminding information for interrupting the transaction according to the fact that the transaction amount is larger than the transaction amount threshold, for example, "the transaction is interrupted because the transaction amount exceeds the authorized amount".
Along the use example, under the condition that a user u is determined to be a project member of a project, acquiring purchase information uploaded by a face-brushing payment machine, wherein the purchase information comprises a purchase amount p1, a preset transaction amount threshold value is p2, and p1 is greater than p2, which indicates that the purchase amount exceeds an authorized amount, generating purchase interruption information, namely that the transaction is interrupted because the purchase amount p1 is greater than the authorized amount p2, and taking the purchase interruption information as transaction result information;
if p1 is not greater than p2, which indicates that the purchase amount does not exceed the authorized amount, determining a merchant account according to a merchant code c1 contained in the purchase information, determining an authorized account corresponding to the user u, and transferring money from the authorized account to the merchant account according to the purchase amount p1 to generate a purchase order, specifically, the order information in the purchase order includes: the user u uses the information of the user code c2, the merchant code c1, the transfer amount p1, the bought mineral water and the like in the project, and the order information is used as the transaction result information.
In addition, in addition to the above-mentioned transaction amount threshold as the transaction condition, a scene type of the transaction may also be used as the transaction condition, so as to avoid a loss caused by a target participating user, and further ensure security of the transaction, in an optional implementation manner provided by an embodiment of the present specification, after the step of obtaining the transaction information uploaded by the transaction terminal of the transaction participating party in the transaction process is executed, and before the step of determining whether the transaction amount included in the transaction information is greater than the transaction amount threshold preset in the item is executed, the method further includes:
determining the scene type of the transaction according to the transaction information;
judging whether a target authorized scene type which is the same as the scene type exists in authorized scene types preset for the user in the project;
if yes, indicating that the scene type is authorized, executing the step of judging whether the transaction amount is smaller than a transaction amount threshold value preset in the item according to the transaction amount contained in the transaction information;
if the transaction result data does not exist, the scene type is not authorized, second transaction interruption information is generated based on a second judgment result of scene judgment, and the second transaction interruption information is used as the transaction result data.
Specifically, it is determined whether a target authorization scene type that is the same as the scene type exists in the authorization scene types preset in the project for the user, for example, the authorization scene types include a supermarket and a convenience store, and if the scene type of the user transaction is a convenience store, the target authorization scene type is a convenience store.
The second judgment result indicates that the target authorization scene type which is the same as the scene type does not exist in the authorization scene types; correspondingly, the second transaction interruption information refers to the generated reminding information for interrupting the transaction according to the fact that the target authorization scene type which is the same as the scene type does not exist in the authorization scene type, for example, "the transaction is interrupted because the scene type of the transaction is not the authorization scene type".
According to the above example, under the condition that the user u is determined to be a project member of the project, acquiring purchase information uploaded by a face-brushing payment machine, determining that the scene type of mineral water purchased by the user u is a convenience store according to a merchant code c1 contained in the purchase information, and determining whether a target authorized scene type same as the purchased scene type exists in the authorized scene type preset by the user u in the project if the authorized scene type preset by the user u is a supermarket or convenience store, wherein the determination result is that whether the target authorized scene type same as the purchased scene type exists in the authorized scene type preset by the user u in the project, and the scene type purchased by the user u is authorized, executing the step of determining whether the purchase amount p1 is smaller than a purchase amount threshold value preset in the project according to the purchase amount p1 contained in the purchase information;
if the judgment result of judging whether the target authorized scene type which is the same as the purchased scene type exists in the authorized scene types preset by the user u in the item is not existed, indicating that the scene type of the mineral water purchased by the user u is not authorized, generating purchase interruption information: "transaction interruption because the purchased scene type is not the authorized scene type", this purchase interruption information is taken as the transaction result information.
Step S106, under the condition that the user is marked as an offline state in the item, determining a target participating user in the item, which has an identity binding relationship with the user.
On the basis of judging whether the user is a project member of the project according to the identity characteristic image of the user, further judging whether the corresponding identity state of the user in the project is marked as an offline state, if so, indicating that the target participating user is lost or missing under the condition that the target participating user cannot contact the user, marking the user as the offline state in the project, and determining the target participating user having an identity binding relationship with the user in the project so as to obtain the contact way of the target participating user and enable the user to contact the target participating user; if not, the user is not in the loss of connection state, and no operation is required.
In a specific implementation, the identity state of the user may also be marked as a contact state, a normal state, and the like, which is not limited herein.
Following the above example, in the event that user u is marked in the project as an unlink state, the target user code c3 of the target participating user in the project that is identity bound to user u is determined.
Step S108, sending the identity verification result aiming at the user to at least one of the target participant user and the transaction participant.
In practical application, when the identity state of the user is determined to be an offline state, the identity verification result aiming at the user is sent to a target participant user and/or a transaction participant who has a binding relationship with the user.
Specifically, the step of sending the identity verification result aiming at the user to the target participating user and/or the transaction participating party having the binding relationship with the user means that the target participating user and/or the transaction participating party are reminded that the user is in the loss-of-contact state, the position information of the user is reminded, and a related contact way is provided so as to contact the user.
In a first optional implementation manner provided in this description embodiment, the sending of the identity verification result for the user to the target participating user is specifically implemented in the following manner:
determining position information of the transaction terminal and participant information of the transaction participants based on the equipment identification of the transaction terminal contained in the transaction information;
generating help seeking information aiming at the user according to the position information, the participant information and the transaction result information;
sending a help-seeking notification aiming at the user in the loss-of-contact state to the target participating user based on the help-seeking information.
In practical application, in the implementation process of sending the identity verification result aiming at the user to the target participant user, the participant information comprises the names, contact telephones and other information of the participants; the help seeking information comprises position information of a transaction terminal for the user to perform transaction operation, participant information of a transaction participant and transaction result information for the transaction between the user and the transaction participant; based on the method, the help seeking notification is sent to the target participating user according to the help seeking information, so that the target participating user can know the position of the user, the contact way of contacting with the user and the transaction condition of the user, and the target participating user can contact with the transaction participant and further contact with the user after receiving the help seeking notification.
In specific implementation, in order to ensure that the target participating user can receive help from the user in time and help the user in time, multiple notification modes such as short message notification, telephone notification, push message in the project and the like can be adopted for concurrent notification.
According to the above example, the position LI of the face-brushing payment machine tool is determined according to the machine tool code d1 of the face-brushing payment machine tool contained in the purchase information, the contact phone p1 of the merchant is determined according to the merchant code c1 contained in the purchase information, and then help seeking information for the user u is generated according to the position LI, the contact phone pn1 of the merchant, the user code c2 of the user u in the item contained in the purchase order and the transfer amount p1, wherein the help seeking information is that the amount consumed by the user u at the position LI is p1, and the contact phone of the merchant is pn1, and the help seeking information is notified to the target participating user in a short message and telephone mode.
In addition to the foregoing sending the identity verification result for the user to the target participating user, in a second optional implementation manner provided in this specification, the sending the identity verification result for the user to the transaction participant is specifically implemented in the following manner:
acquiring contact information of the target participating user;
generating help seeking information for the user based on the contact information and the transaction result information;
and issuing a help-seeking notice aiming at the loss of contact state of the user to the transaction terminal according to the help-seeking information.
In practical application, in the implementation process of sending the identity verification result aiming at the user to the transaction participation, the contact information of the target participation user comprises the contact telephone, the address and other information of the target participation user; the help seeking information comprises contact information of a target participating user bound with the user existing identity and transaction result information of transaction between the user and a transaction participating party; based on the method, the help seeking notification is sent to the transaction terminal according to the help seeking information, so that the transaction participant can know that the user is in an offline state, and how to contact the target participant user and the transaction condition of the user, so that the transaction participant can contact the target participant user after receiving the help seeking notification, and further the target participant user is in contact with the user.
In specific implementation, in order to ensure that the transaction participants can receive help from the user in time and the user can be rescued in time, the contact information of the transaction participants can be obtained through the transaction participant information contained in the transaction information, and further, according to the contact information, a plurality of notification modes such as short message notification, telephone notification and message pushing in the transaction terminal are adopted for concurrent notification.
It should be noted that, in order to ensure the information security of the target participating user, a help-seeking notification may be sent to the transaction terminal by means of two-dimensional code encryption or hiding a plurality of characters in the contact manner.
According to the above example, the contact telephone pn2 of the target participating user is obtained according to the target participating user code c3, and the help seeking information "user u is in an unlink state and consumes the amount p1 according to the merchant code c1 contained in the purchase information, the user code c2 of the user u in the item and the transfer amount p1 contained in the purchase order" is generated for the user u, and the contact telephone of the target participating user with the identity bound is pn2 ", so that the help seeking information is notified to the face brushing payment machine tool in a message pushing mode.
In addition to the two specific implementation manners of sending the identity verification result for the user, in a third optional implementation manner provided in the embodiment of the present specification, in a case that the user is a child, the identity verification result for the user is sent to both the target participating user and the transaction participant, which is specifically implemented in the following manner:
acquiring contact information of the target participating user, and determining position information of the transaction terminal and participant information of the transaction participants based on the equipment identifier of the transaction terminal contained in the transaction information;
generating help seeking information aiming at the children according to the contact information, the position information, the participant information and the transaction result information;
and sending a help-seeking notice aiming at the state that the children are out of contact to the transaction terminal and the target participant user according to the help-seeking information.
Specifically, the specific implementation manner of generating the help information for the child is similar to that of generating the help information for the user, and the specific implementation manner of generating the help information for the user is referred to, and is not repeated herein; sending the help-seeking notification for the child in the loss-of-contact state is similar to the specific implementation manner of sending the help-seeking notification for the user in the loss-of-contact state, and reference may be made to the specific implementation manner of sending the help-seeking notification for the user in the loss-of-contact state, which is not described herein again.
In summary, the present specification provides an identity verification method, which performs identity recognition on a user by acquiring an identity feature image of the user acquired by the user and a transaction participant in a transaction process, and determines whether the user is a project member of a project; under the condition that a user is a project member of a project, transaction processing is carried out, whether the user is marked as an offline state in the project or not is further judged, identity verification whether the user is in the offline state or not is achieved in the transaction process, a target participating user in the project and the user with identity binding relation is determined under the condition that the user is marked as the offline state, and a help-seeking notice aiming at the user is sent to at least one of the target participating user and a transaction participating party, so that the target participating user and/or the transaction participating party can track the user in the offline state according to the transaction carried out by the user, and meanwhile, the user in the offline state can enjoy transaction service, and thus material help is obtained.
In the following, with reference to fig. 2, the identity verification method provided in this specification is further described by taking an application of the identity verification method in a face-brushing payment scenario as an example. Fig. 2 shows a processing flow chart of an identity verification method applied to a face-brushing payment scenario according to an embodiment of the present specification, and specific steps include step S202 to step S226.
Step S202, acquiring the facial images of the user collected by the user and the transaction participants in the payment process.
Wherein the user may be a member of a special group such as elderly, children or disabled.
Specifically, before the step of obtaining the facial image of the user collected by the user and the transaction participant in the payment process is executed, the method further includes:
acquiring a payment authorization request submitted by the user in the project;
generating a payment authorization protocol for the target project member to carry out payment authorization to the user based on payment authorization information which is carried in the payment authorization request and submitted aiming at a payment authorization option; the payment authorization protocol comprises at least one authorization scene type and/or payment amount threshold value authorized by the target item member to the user;
and sending an authorization completion instruction aiming at the payment authorization request based on the payment authorization protocol.
And step S204, carrying out image recognition on the face image to obtain the face characteristics of the user.
And step S206, carrying out similarity comparison on the human face features and member human face features corresponding to the member human face images of the project members prestored in the project to obtain feature similarity.
Step S208, judging whether the user is a project member of the project or not by judging whether the feature similarity is larger than a preset similarity threshold or not;
if yes, indicating that the user is a member of the project, executing the following step S210;
if not, indicating that the user is not a member of the project in the project, executing a conventional payment process.
And the participating users in the project establish the identity binding relationship with the project members in a mode of identity registration for the project members, and mark the identity states of the project members.
Specifically, the identity registration for the project member is realized by the following method:
acquiring a member registration request submitted by a participating user;
taking the face image carried in the member registration request as a member face image, and storing the member face image in a feature image library of the project;
based on the identity relationship information carried in the member registration request, the member face image and the participating user are subjected to identity binding;
and sending a registration completion instruction aiming at the member registration request under the condition that the identity binding is successful.
Step S210, obtaining payment information uploaded by the payment terminal of the transaction participant in the payment process.
And step S212, determining the scene type of payment according to the payment information.
Step S214, judging whether a target authorized scene type which is the same as the scene type exists in the authorized scene types preset in the project for the user;
if yes, indicating that the scene type is authorized, executing the following step S216;
if the payment result data does not exist, the scene type is not authorized, second payment interruption information is generated based on a second judgment result of scene judgment, and the second payment interruption information is used as the payment result data.
Step S216, judging whether the payment amount contained in the payment information is larger than a preset payment amount threshold value in the project;
if the payment amount is larger than the authorized amount, first payment interruption information is generated based on a first judgment result of the amount judgment, and the first payment interruption data is used as payment result data;
if not, indicating that the payment amount does not exceed the authorized amount, the following step S218 is performed.
Step S218, performing payment processing based on the payment information, generating a payment order, and using order information in the payment order as payment result data.
Step S220, under the condition that the user is marked as an offline state in the project, determining a target participating user in the project, wherein the target participating user has an identity binding relationship with the user.
Specifically, the target participating user is a parent of the user, and the user is registered as a project member in the project, so that the user can send help seeking information through the project under the condition of loss of contact, and further obtain corresponding help.
Step S222, obtaining contact information of the target participating user, and determining location information of the payment terminal and participant information of the transaction participant based on the device identifier of the payment terminal included in the payment information.
Step S224, generating help seeking information aiming at the user according to the contact information, the position information, the participant information and the payment result information.
Step S226, according to the help information, sending help notification aiming at the condition that the user is in the loss of contact state to the payment terminal and the target participating user.
The specification provides an identity verification method, which comprises the steps of carrying out identity recognition on a user by acquiring a face image of the user, acquired by the user and a transaction participant in a payment process, and judging whether the user is a project member of a project; under the condition that the user is a member of the project, whether the user is marked as an offline state in the project is further judged, whether the user is the identity verification of the offline state in the payment process is realized, under the condition that the user is marked as the offline state, a target participating user which has an identity binding relationship with the user in the project is determined, and a help-seeking notice aiming at the user is sent to at least one of the target participating user and the transaction participating party, so that the target participating user and/or the transaction participating party can track the user in the offline state according to the payment made by the user, and meanwhile, the user in the offline state can enjoy the payment service, thereby obtaining the help of substances.
The embodiment of the identity verification device provided by the specification is as follows:
corresponding to the above method embodiment, the present specification further provides an embodiment of an identity verification apparatus, and fig. 3 shows a schematic diagram of an identity verification apparatus provided in an embodiment of the present specification. As shown in fig. 3, the apparatus includes:
an obtaining module 302, configured to obtain an identity feature image of a user collected by the user and a transaction participant in a transaction process;
a judging module 304, configured to judge whether the user is a project member of a project according to the identity feature image; the method comprises the following steps that a participating user in a project establishes an identity binding relationship with a project member in a mode of identity registration for the project member, and marks the identity state of the project member;
if yes, running a determining module 306, where the determining module 306 is configured to determine a target participating user in the project, who has an identity binding relationship with the user, if the user is marked as an offline state in the project;
a sending module 308 configured to send an identity verification result for the user to at least one of the target participant user and the transaction participant.
Optionally, the identity verification apparatus further includes:
the information acquisition module is configured to acquire transaction information uploaded by a transaction terminal of the transaction participant in the transaction process;
a threshold judging module configured to judge whether a transaction amount contained in the transaction information is greater than a transaction amount threshold preset in the item;
if the first transaction interruption data is larger than the first transaction interruption data, operating a first generation module, wherein the first generation module is configured to generate first transaction interruption information based on a first judgment result of the amount judgment, and the first transaction interruption data is used as transaction result data;
and if the transaction result data is not larger than the preset transaction result data, operating an order generation module, wherein the order generation module is configured to perform transaction processing based on the transaction information, generate a transaction order and take the order information in the transaction order as the transaction result data.
Optionally, the identity verification apparatus further includes:
a determining type module configured to determine a scene type of a transaction according to the transaction information;
a judging type module configured to judge whether a target authorized scene type same as the scene type exists in authorized scene types preset for the user in the project;
if yes, operating the judgment threshold module;
and if the second transaction interruption information does not exist, operating a second generation module, wherein the second generation module is configured to generate second transaction interruption information based on a second judgment result of the scene judgment, and the second transaction interruption information is used as the transaction result data.
Optionally, the sending module 308 includes:
a determination information submodule configured to determine location information of the transaction terminal and participant information of the transaction participant based on the device identifier of the transaction terminal included in the transaction information;
a first generation information sub-module configured to generate help information for the user according to the location information, the party information, and the transaction result information;
a first sending notification sub-module configured to send, to the target participating user, a help-seeking notification for the user in the loss-of-contact state based on the help-seeking information.
Optionally, the sending module 308 includes:
a first contact information obtaining sub-module configured to obtain contact information of the target participant user;
a second generated information sub-module configured to generate help information for the user based on the contact information and the transaction result information;
and the second sending notification submodule is configured to issue a help-seeking notification aiming at the user in the loss-of-contact state to the transaction terminal according to the help-seeking information.
Optionally, the determining module 304 includes:
the characteristic obtaining sub-module is configured to perform image recognition on the identity characteristic image to obtain the identity characteristic of the user;
the comparison submodule is configured to compare the identity characteristics with member characteristics corresponding to member characteristic images of the project members pre-stored in the project to obtain characteristic similarity;
and the judging member submodule is configured to judge whether the user is a project member of the project by judging whether the feature similarity is larger than a preset similarity threshold value.
Optionally, the identity registration is performed for the project member by operating the following sub-modules:
the acquisition request submodule is configured to acquire a member registration request submitted by a participating user;
the storage sub-module is configured to store the feature images carried in the member registration request as member feature images in a feature image library of the project;
the identity binding submodule is configured to bind the identity of the member characteristic image and the identity of the participating user based on identity relationship information carried in the member registration request;
and the sending instruction sub-module is configured to send a registration completion instruction for the member registration request under the condition that the identity binding is successful.
Optionally, the identity verification apparatus further includes:
an obtaining authorization request module configured to obtain a transaction authorization request submitted for the user in the item;
a generation protocol module configured to generate a transaction authorization protocol for the target item member to perform transaction authorization to the user based on transaction authorization information submitted for a transaction authorization option carried in the transaction authorization request; the transaction authorization protocol comprises at least one authorization scenario type and/or transaction amount threshold value authorized by the target item member to the user;
a send complete instruction module configured to send an authorization complete instruction for the transaction authorization request based on the transaction authorization protocol.
Optionally, in a case that the user is a child, the determining module 304 includes:
a second contact information obtaining sub-module configured to obtain contact information of the target participating user, and determine location information of the transaction terminal and participant information of the transaction participants based on the device identifier of the transaction terminal included in the transaction information;
a third generated information sub-module configured to generate help information for the child based on the contact information, the location information, the party information, and the transaction result information;
a third sending notification sub-module configured to send a help-seeking notification for the child in the loss-of-contact state to the transaction terminal and the target participant user according to the help-seeking information.
Optionally, the identity feature image includes at least one of the following: face images, iris images and fingerprint images.
The above is an exemplary scheme of the identity verification apparatus of this embodiment. It should be noted that the technical scheme of the identity verification apparatus and the technical scheme of the identity verification method described above belong to the same concept, and details that are not described in detail in the technical scheme of the identity verification apparatus can be referred to the description of the technical scheme of the identity verification method described above.
The present specification provides an embodiment of a computing device as follows:
FIG. 4 illustrates a block diagram of a computing device 400 provided in accordance with one embodiment of the present description. The components of the computing device 400 include, but are not limited to, a memory 410 and a processor 420. Processor 420 is coupled to memory 410 via bus 430 and database 450 is used to store data.
Computing device 400 also includes access device 440, access device 440 enabling computing device 400 to communicate via one or more networks 460. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. Access device 440 may include one or more of any type of network interface (e.g., a Network Interface Card (NIC)) whether wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 400, as well as other components not shown in FIG. 4, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 4 is for purposes of example only and is not limiting as to the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 400 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smartphone), wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 400 may also be a mobile or stationary server.
The present specification provides a computing device comprising a memory 410, a processor 420, and computer instructions stored on the memory and executable on the processor, the processor 420 being configured to execute the following computer-executable instructions:
acquiring an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process;
judging whether the user is a project member of the project or not according to the identity characteristic image; the participating users in the project establish identity binding relations with the project members in a mode of identity registration for the project members and mark the identity states of the project members;
if so, determining a target participating user having an identity binding relationship with the user in the project under the condition that the user is marked as an offline state in the project;
and sending an identity verification result aiming at the user to at least one of the target participant user and the transaction participant.
The above is an illustrative scheme of a computing device of the present embodiment. It should be noted that the technical solution of the computing device and the technical solution of the identity verification method described above belong to the same concept, and details that are not described in detail in the technical solution of the computing device can be referred to the description of the technical solution of the identity verification method described above.
This specification provides one example of a computer-readable storage medium, comprising:
the present specification provides a computer readable storage medium storing computer instructions that, when executed by a processor, are operable to:
acquiring an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process;
judging whether the user is a project member of the project or not according to the identity characteristic image; the method comprises the following steps that a participating user in a project establishes an identity binding relationship with a project member in a mode of identity registration for the project member, and marks the identity state of the project member;
if yes, determining a target participant user in the project, which has an identity binding relationship with the user, under the condition that the user is marked as an offline state in the project;
and sending an identity verification result aiming at the user to at least one of the target participant user and the transaction participant.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium and the technical solution of the above identity verification method belong to the same concept, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the above identity verification method.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer-readable medium may contain suitable additions or subtractions depending on the requirements of legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer-readable media may not include electrical carrier signals or telecommunication signals in accordance with legislation and patent practice.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts, but those skilled in the art should understand that the present embodiment is not limited by the described acts, because some steps may be performed in other sequences or simultaneously according to the present embodiment. Further, those skilled in the art should also appreciate that the embodiments described in this specification are preferred embodiments and that acts and modules referred to are not necessarily required for an embodiment of the specification.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are intended only to aid in the description of the specification. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the embodiments and the practical application, to thereby enable others skilled in the art to best understand and utilize the embodiments. The specification is limited only by the claims and their full scope and equivalents.

Claims (13)

1. An identity verification method, comprising:
acquiring an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process;
judging whether the user is a project member of the project or not according to the identity characteristic image; the method comprises the following steps that a participating user in a project establishes an identity binding relationship with a project member in a mode of identity registration for the project member, and marks the identity state of the project member, wherein the project is a project for identity verification of the user and providing help for the user in an offline state;
if yes, judging whether the transaction meets a transaction condition preset in the project or not according to transaction information uploaded by a transaction terminal of a transaction participant in the transaction process;
if yes, performing corresponding transaction processing according to the transaction information to generate transaction result information; if not, interrupting the transaction, and taking the interruption information as transaction result information;
determining a target participating user in the project, who has an identity binding relationship with the user, under the condition that the user is marked as an offline state in the project;
and sending the identity verification result and the transaction result information aiming at the user to at least one of the target participating user and the transaction participating party.
2. The identity verification method according to claim 1, wherein the step of judging whether the transaction meets the transaction conditions preset in the item according to the transaction information uploaded by the transaction terminal of the transaction participant during the transaction process comprises the steps of:
acquiring transaction information uploaded by a transaction terminal of the transaction participant in the transaction process;
judging whether the transaction amount contained in the transaction information is larger than a preset transaction amount threshold value in the item;
if yes, performing corresponding transaction processing according to the transaction information to generate transaction result information; if not, interrupting the transaction, and taking the interruption information as transaction result information, wherein the transaction result information comprises:
if the number of the transaction interruption information is larger than the preset value, generating first transaction interruption information based on a first judgment result of the amount judgment, and taking the first transaction interruption information as transaction result information;
and if not, performing transaction processing based on the transaction information to generate a transaction order, and taking order information in the transaction order as the transaction result information.
3. The identity verification method of claim 2, wherein before the step of determining whether the transaction amount included in the transaction information is greater than the threshold value of the transaction amount preset in the item is executed, the method further comprises:
determining the scene type of the transaction according to the transaction information;
judging whether a target authorized scene type which is the same as the scene type exists in authorized scene types preset for the user in the project;
if yes, executing the step of judging whether the transaction amount contained in the transaction information is larger than a transaction amount threshold value preset in the item;
and if the second transaction interruption information does not exist, generating second transaction interruption information based on a second judgment result of scene judgment, and taking the second transaction interruption information as the transaction result information.
4. The identity verification method of claim 2, said sending an identity verification result for the user to at least one of the target participant user and the transaction participant, comprising:
determining position information of the transaction terminal and participant information of the transaction participants based on the equipment identification of the transaction terminal contained in the transaction information;
generating help seeking information aiming at the user according to the position information, the participant information and the transaction result information;
sending a help-seeking notification aiming at the user in the loss-of-contact state to the target participating user based on the help-seeking information.
5. The identity verification method of claim 2, said sending an identity verification result for the user to at least one of the target participant user and the transaction participant, comprising:
acquiring contact information of the target participating user;
generating help seeking information for the user based on the contact information and the transaction result information;
and issuing a help-seeking notice aiming at the loss of contact state of the user to the transaction terminal according to the help-seeking information.
6. The identity verification method of claim 1, wherein the determining whether the user is a project member of a project according to the identity feature image comprises:
carrying out image recognition on the identity characteristic image to obtain the identity characteristic of the user;
comparing the identity characteristics with member characteristics corresponding to member characteristic images of the project members prestored in the project to obtain characteristic similarity;
and judging whether the user is a project member of the project or not by judging whether the feature similarity is larger than a preset similarity threshold or not.
7. The identity verification method of claim 1, wherein the identity registration for project members is implemented by:
acquiring a member registration request submitted by a participating user;
taking the characteristic image carried in the member registration request as a member characteristic image, and storing the member characteristic image in a characteristic image library of the project;
based on identity relationship information carried in the member registration request, identity binding is carried out on the member characteristic image and the participating user;
and sending a registration completion instruction aiming at the member registration request under the condition that the identity binding is successful.
8. The identity verification method of claim 1, wherein before the step of obtaining the identity characteristic image of the user collected by the user and the transaction participant during the transaction process is executed, the method further comprises:
obtaining a transaction authorization request submitted by the user in the project;
generating a transaction authorization protocol for the target item member to carry out transaction authorization to the user based on transaction authorization information which is carried in the transaction authorization request and is submitted aiming at a transaction authorization option; the transaction authorization protocol comprises at least one authorization scenario type and/or transaction amount threshold value authorized by the target item member to the user;
and sending an authorization completion instruction aiming at the transaction authorization request based on the transaction authorization protocol.
9. The identity verification method of claim 2, wherein the sending of the identity verification result for the user to at least one of the target participant user and the transaction participant in the case that the user is a child, comprises:
acquiring contact information of the target participating user, and determining position information of the transaction terminal and participant information of the transaction participants based on the equipment identifier of the transaction terminal contained in the transaction information;
generating help seeking information aiming at the children according to the contact information, the position information, the participant information and the transaction result information;
and sending a help-seeking notice aiming at the state that the child is lost to be connected to the transaction terminal and the target participating user according to the help-seeking information.
10. The identity verification method of claim 1, the identity feature image comprising at least one of: face images, iris images and fingerprint images.
11. An identity verification device comprising:
the acquisition module is configured to acquire an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process;
the judging module is configured to judge whether the user is a project member of a project according to the identity characteristic image; the method comprises the following steps that a participating user in a project establishes an identity binding relationship with a project member in a mode of identity registration for the project member, and marks the identity state of the project member, wherein the project is a project for identity verification of the user and providing help for the user in an offline state;
if yes, operating a determining module, wherein the determining module is configured to judge whether the transaction meets a transaction condition preset in the project according to transaction information uploaded by a transaction terminal of a transaction participant in the transaction process; if yes, performing corresponding transaction processing according to the transaction information to generate transaction result information; if not, interrupting the transaction, and taking the interruption information as transaction result information; determining a target participating user in the project, who has an identity binding relationship with the user, under the condition that the user is marked as an offline state in the project;
a sending module configured to send an identity verification result and transaction result information for the user to at least one of the target participant user and the transaction participant.
12. A computing device, comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
acquiring an identity characteristic image of a user, which is acquired by the user and a transaction participant in a transaction process;
judging whether the user is a project member of the project or not according to the identity characteristic image; the method comprises the following steps that a participating user in a project establishes an identity binding relationship with a project member in a mode of identity registration for the project member, and marks the identity state of the project member, wherein the project is a project for identity verification of the user and providing help for the user in an offline state;
if yes, judging whether the transaction meets the transaction conditions preset in the item or not according to transaction information uploaded by the transaction terminal of the transaction participant in the transaction process;
if yes, performing corresponding transaction processing according to the transaction information to generate transaction result information; if not, interrupting the transaction, and taking the interruption information as transaction result information;
determining a target participating user in the project, who has an identity binding relationship with the user, under the condition that the user is marked as an offline state in the project;
and sending the identity verification result and the transaction result information aiming at the user to at least one of the target participating user and the transaction participating party.
13. A computer readable storage medium storing computer instructions which, when executed by a processor, carry out the steps of the identity verification method of any one of claims 1 to 10.
CN202010383085.1A 2020-05-08 2020-05-08 Identity verification method and device Active CN111582874B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202211145843.1A CN115439129A (en) 2020-05-08 2020-05-08 Identity verification method and device
CN202010383085.1A CN111582874B (en) 2020-05-08 2020-05-08 Identity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010383085.1A CN111582874B (en) 2020-05-08 2020-05-08 Identity verification method and device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202211145843.1A Division CN115439129A (en) 2020-05-08 2020-05-08 Identity verification method and device

Publications (2)

Publication Number Publication Date
CN111582874A CN111582874A (en) 2020-08-25
CN111582874B true CN111582874B (en) 2022-09-27

Family

ID=72112156

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202211145843.1A Pending CN115439129A (en) 2020-05-08 2020-05-08 Identity verification method and device
CN202010383085.1A Active CN111582874B (en) 2020-05-08 2020-05-08 Identity verification method and device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202211145843.1A Pending CN115439129A (en) 2020-05-08 2020-05-08 Identity verification method and device

Country Status (1)

Country Link
CN (2) CN115439129A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112269978B (en) * 2020-10-22 2022-11-15 蚂蚁胜信(上海)信息技术有限公司 Image acquisition method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404860A (en) * 2015-11-13 2016-03-16 北京旷视科技有限公司 Method and device for managing information of lost person
CN106897726A (en) * 2015-12-21 2017-06-27 北京奇虎科技有限公司 The finding method and device of Missing Persons
CN108877036A (en) * 2018-07-24 2018-11-23 安徽富煌科技股份有限公司 A kind of public transport charge system with high-accuracy face identification functions

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109190509B (en) * 2018-08-13 2023-04-25 创新先进技术有限公司 Identity recognition method, device and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404860A (en) * 2015-11-13 2016-03-16 北京旷视科技有限公司 Method and device for managing information of lost person
CN106897726A (en) * 2015-12-21 2017-06-27 北京奇虎科技有限公司 The finding method and device of Missing Persons
CN108877036A (en) * 2018-07-24 2018-11-23 安徽富煌科技股份有限公司 A kind of public transport charge system with high-accuracy face identification functions

Also Published As

Publication number Publication date
CN111582874A (en) 2020-08-25
CN115439129A (en) 2022-12-06

Similar Documents

Publication Publication Date Title
CN102483806B (en) Face recognition is used to set up AD HOC network
CN110175842A (en) Transfer account method, system, calculating equipment and storage medium based on block chain
CN111652749B (en) Information checking method and device
CN112907338B (en) Service processing method and device
CN112966168B (en) Business label query method and device for realizing privacy protection
CN111582874B (en) Identity verification method and device
CN111343200B (en) Credit-based service agent method and device
JP2007515722A (en) Discover common contacts
CN110620784A (en) Credit-based interactive processing method and device
Xue et al. An access control system for intelligent buildings
CN110751493B (en) Risk prevention and control method and device based on historical reservation orders
CN112150252A (en) Credit-based service processing method and device
US9165327B1 (en) Method and apparatus for managing business and social contacts
CN113420230A (en) Matching consultation pushing method based on group chat, related device, equipment and medium
CN110808978B (en) Real name authentication method and device
CN111010395B (en) Credit-based information identifier generation method and device
CN110555593B (en) Method and device for processing issue of credit contract system
CN112732736A (en) Credit updating method and device
CN112328937A (en) Information delivery method and device
CN110675170A (en) Credit-based certificate guarantee method and device
CN111382360B (en) Information pushing method and device
CN114500629B (en) Monitoring processing method and device under credit contract system
CN110175624B (en) Project admission auditing method and device
CN108921414B (en) Social network trust degree calculation method based on evidence theory
CN113051473B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211220

Address after: Room 610, floor 6, No. 618, Wai Road, Huangpu District, Shanghai 200010

Applicant after: Ant Shengxin (Shanghai) Information Technology Co.,Ltd.

Address before: 801-11, Section B, 8th floor, 556 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province, 310013

Applicant before: Alipay (Hangzhou) Information Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant